03362nam0 22004693i 450 CAG042145220170908093253.0849607576120030110d2002 ||||0itac50 baitaitz01i xxxe z01nOceano mareAlessandro BariccoRomaLa biblioteca di Repubblica2002221 p.22 cmÂLa Âbiblioteca di Repubblica. Novecento53Suppl. al quotidiano: La RepubblicaEd. speciale per La Repubblica.001MIL05424002001 ÂLa Âbiblioteca di Repubblica. Novecento53Oceano mare.CFI0341911CFIV075277251768Narrativa italianaFIRNAPC232157I853NARRATIVA ITALIANA14853.91408NARRATIVA ITALIANA. 1945-. Raccolte21Baricco, AlessandroCFIV075277070160567ITIT-NA007920030110IT-BN0077IT-SA0200IT-NA0537IT-AV0137IT-NA0311IT-SA0272IT-AV0126IT-NA0700IT-NA0598IT-NA0580IT-NA0312IT-NA0249CAG0421452RIBAB - Biblioteca comunale S.Anselmo 45GENERALE 853 BAR 1 45 0000053495 B D 2010112520101125Biblioteca Comunale Simone Augelluzzi 63MOD 25 E 40 63 0000199375 B 2014032020140320Biblioteca Comunale di Villaricca 68LETTER. Biblioteca di RepubblicaL 1. n.53 68 0000028715 B 1 v.D 2003020120030201Biblioteca Comunale "Nunzia Festa"1 v.1 v. 94ADULTI I 1248 94 0000033215 B 1 v.T 201106161 v.1 v. 94ADULTI I 1748 94 0000040465 B 1 v.T 2011112520111125Biblioteca del Circolo Artistico Politecnico BEBIBLIOTECAArmadio 13 A 70 BE 0000023325 B 1 v.Z 2015071520150715Biblioteca Edith Stein dell'Istituto Santa Teresa del Gesù Bambino1 v. ESSALA ES 853 BAR ES 0000015695 B 1 v.T 2012051020120510Biblioteca civica "Can. Marciano De Leo"1 v. FRB 002. 113 FR 0000008565 B 1 v.T 2012072320120723Biblioteca del Liceo scientifico Alfonso Maria de' Liguori LABIBLIOTECA853 BARIA LA 0000002665 B FD 1 v.D 2013111520131115Biblioteca del Pontificio Santuario Beata Vergine del Rosario1 v. PSSALA A C.17.2. 10 PS 0000019315 B 1 v.Z 2015120720151207Istituto Salesiano Sacro Cuore1 v.1 v. SC35 05 023 SC01 0000138975 B 1 v.T 2009051920090519Biblioteca di cultura vesuviana1 v. SGSALA B V/5. 11 SG 0000066795 B 1 v.T 2014092420140924 45 63 68 94 BE ES FR LA PS SC SGOceano mare251768UNISANNIO10157nam 22008295 450 99646600090331620200703161445.03-642-29101-510.1007/978-3-642-29101-2(CKB)3360000000365980(SSID)ssj0000666158(PQKBManifestationID)11447253(PQKBTitleCode)TC0000666158(PQKBWorkID)10664515(PQKB)10665532(DE-He213)978-3-642-29101-2(MiAaPQ)EBC3070134(PPN)168313677(EXLCZ)99336000000036598020120402d2012 u| 0engurnn#008mamaatxtccrInformation Security Practice and Experience[electronic resource] 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings /edited by Mark D. Ryan, Ben Smyth, Guilin Wang1st ed. 2012.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2012.1 online resource (XIII, 406 p. 68 illus.)Security and Cryptology ;7232International conference proceedings.3-642-29100-7 Includes bibliographical references and author index.A Pre-computable Signature Scheme with Efficient Verification for RFID /Fuchun Guo, Yi Mu, Willy Susilo and Vijay Varadharajan --Redactable Signatures for Independent Removal of Structure and Content /Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga and Hermann de Meer --Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring /Xianhui Lu, Bao Li, Qixiang Mei and Yamin Liu --Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack /Chong-zhi Gao, Dongqing Xie and Baodian Wei --Computational Soundness of Indistinguishability Properties without Computable Parsing /Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto and Hideki Sakurada --New Impossible Differential Attacks on Camellia /Dongxia Bai and Leibo Li --Impossible Differential Attacks on Reduced-Round LBlock /Ya Liu, Dawu Gu, Zhiqiang Liu and Wei Li --New Truncated Differential Cryptanalysis on 3D Block Cipher /Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta.iPIN and mTAN for Secure eID Applications /Johannes Braun, Moritz Horsch and Alexander Wiesmaier --Secure Distributed Computation of the Square Root and Applications /Manuel Liedel --Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization /Tian Shuo, He Yeping and Ding Baozeng --Structure-Based RSA Fault Attacks /Benjamin Michéle, Juliane Krämer and Jean-Pierre Seifert --Fault Analysis of the KATAN Family of Block Ciphers /Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo and Jennifer Seberry --Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher /Yanfeng Wang, Wenling Wu and Xiaoli Yu --On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers /Zhenfei Zhang, Thomas Plantard and Willy Susilo --Partial Key Exposure on RSA with Private Exponents Larger Than N /Marc Joye and Tancrède Lepoint --Linear Cryptanalysis of Reduced-Round ICEBERG /Yue Sun and Meiqin Wang --Overcoming Significant Noise: Correlation-Template-Induction Attack /An Wang, Man Chen, Zongyue Wang and Yaoling Ding.Part 1.Spatio (Temporal) Data Modeling and Visualisation --Usability of Spatio-Temporal Uncertainty Visualisation Methods /Hansi Senaratne, Lydia Gerharz, Edzer Pebesma and Angela Schwering --Line Simplification in the Presence of Non-Planar Topological Relationships /Padraig Corcoran, Peter Mooney and Michela Bertolotto --Critical Remarks on the Use of Conceptual Schemas in Geospatial Data Modelling-A Schema Translation Perspective /Tatjana Kutzner and Andreas Donaubauer --Part 2.Spatial Data Infrastructures, Geo Web Services and Geo Semantic Web --Towards an Active Directory of Geospatial Web Services /Francisco J. Lopez-Pellicer, Walter Rentería-Agualimpia, Javier Nogueras-Iso, F. Javier Zarazaga-Soria and Pedro R. Muro-Medrano --Spatial Sensor Web for the Prediction of Electric Power Supply System Behaviour /Miloš Bogdanović, Nataša Veljković and Leonid Stoimenov --Live Geoinformation with Standardized Geoprocessing Services /Theodor Foerster, Bastian Baranski and Harald Borsutzky --Interlinking Geospatial Information in the Web of Data /Luis M. Vilches-Blázquez, Víctor Saquicela and Oscar Corcho --Part 3.Modelling and Management of Uncertainty, Spatio (Temporal) Data Quality and Metadata --QualESTIM: Interactive Quality Assessment of Socioeconomic Data Using Outlier Detection /Christine Plumejeaud and Marlène Villanova-Oliver --Distributed Integration of Spatial Data with Different Positional Accuracies /Alberto Belussi and Sara Migliorini --Through a Fuzzy Spatiotemporal Information System for Handling Excavation Data /Asma Zoghlami, Cyril de Runz, Herman Akdag and Dominique Pargny --Part 4.Mobility of Persons, Objects and Systems, Transports and Flows --Using Weather Information to Improve Route Planning /Paul Litzinger, Gerhard Navratil, Åke Sivertun and Daniela Knorr --Simulation of Laser Attacks against Aircrafts /Václav Talhofer, Teodor Baláž, František Racek, Alois Hofmann and Šárka Hošková-Mayerová --Automated Traffic Route Identification Through the Shared Nearest Neighbour Algorithm /Maribel Yasmina Santos, Joaquim P. Silva, João Moura-Pires and Monica Wachowicz --Part 5.Spatial Analysis, Geostatistics, and Geo Information Retrieval --Comparing Support Vector Regression and Statistical Linear Regression for Predicting Poverty Incidence in Vietnam /Cornelius Senf and Tobia Lakes --Do Expressive Geographic Queries Lead to Improvement in Retrieval Effectiveness? /Damien Palacio, Christian Sallaberry, Guillaume Cabanac, Gilles Hubert and Mauro Gaio --The GP-SET Method: A Spatial and Temporal Probabilistic Model for Geoprospective /Stéphane Bourrelly and Christine Voiron-Canicio --Part 6.Modelling and Spatial Analysis of Urban Dynamics, Urban GIS --Predicting Spatiotemporal Distribution of Transient Occupants in Urban Areas /Toshihiro Osaragi and Takeshi Hoshino --Towards Urban Fabrics Characterization Based on Buildings Footprints /Rachid Hamaina, Thomas Leduc and Guillaume Moreau --The Use of Point Pattern Statistics in UrbanAnalysis /Ioannis Pissourios, Pery Lafazani, Stavros Spyrellis, Anastasia Christodoulou and Myron Myridis --Part 7.GIS and Spatial Analysis for Global Change Modelling, Impact on Space --Beach-Dune Morphological Relationships at Youghal Beach, Cork /Sarah Kandrot --A New Method for Computing the Drainage Network Based on Raising the Level of an Ocean Surrounding the Terrain /Salles V. G. Magalhães, Marcus V. A. Andrade, W. Randolph Franklin and Guilherme C. Pena --Part 8.Geographic Information Science: Links with other Disciplines and Citizens --Geographic Information Science as a Common Cause for Interdisciplinary Research /Thomas Blaschke, Josef Strobl, Lothar Schrott, Robert Marschallinger and Franz Neubauer, et al. --Enhancing the Quality of Volunteered Geographic Information: A Constraint-Based Approach /Olga Yanenko and Christoph Schlieder.This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012. The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are oranized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential attacks, oblivious transfer, internet security, key management, applied cryptography, pins, fundamentals, fault attacks, and key recovery.Security and Cryptology ;7232Data encryption (Computer science)Computer securityComputer communication systemsInformation storage and retrievalComputers and civilizationManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Information Storage and Retrievalhttps://scigraph.springernature.com/ontologies/product-market-codes/I18032Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Computer security.Computer communication systems.Information storage and retrieval.Computers and civilization.Management information systems.Computer science.Cryptology.Systems and Data Security.Computer Communication Networks.Information Storage and Retrieval.Computers and Society.Management of Computing and Information Systems.005.8Ryan Mark Dedthttp://id.loc.gov/vocabulary/relators/edtSmyth Benedthttp://id.loc.gov/vocabulary/relators/edtWang Guilinedthttp://id.loc.gov/vocabulary/relators/edtBOOK996466000903316Information Security Practice and Experience772300UNISA