03419nam 22007455 450 99646621820331620200630081902.03-319-26823-610.1007/978-3-319-26823-1(CKB)4340000000001221(SSID)ssj0001585004(PQKBManifestationID)16265698(PQKBTitleCode)TC0001585004(PQKBWorkID)14865087(PQKB)11527443(DE-He213)978-3-319-26823-1(MiAaPQ)EBC6285866(MiAaPQ)EBC5587995(Au-PeEL)EBL5587995(OCoLC)932170404(PPN)190529598(EXLCZ)99434000000000122120151119d2015 u| 0engurnn|008mamaatxtccrCryptology and Network Security[electronic resource] 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings /edited by Michael Reiter, David Naccache1st ed. 2015.Cham :Springer International Publishing :Imprint: Springer,2015.1 online resource (X, 257 p. 41 illus. in color.) Security and Cryptology ;9476Bibliographic Level Mode of Issuance: Monograph3-319-26822-8 This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs.Security and Cryptology ;9476Data encryption (Computer science)Computer securityManagement information systemsComputer scienceComputer communication systemsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Data encryption (Computer science).Computer security.Management information systems.Computer science.Computer communication systems.Cryptology.Systems and Data Security.Management of Computing and Information Systems.Computer Communication Networks.005.82Reiter Michaeledthttp://id.loc.gov/vocabulary/relators/edtNaccache Davidedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466218203316Cryptology and Network Security772198UNISA01731nam0 2200385 i 450 UBO254110420231121125859.08815097376IT2005-9153 20051108d2004 ||||0itac50 baitaitz01i xxxe z01nAuschwitz e gli intellettualila shoah nella cultura del dopoguerraEnzo TraversoBolognaIl mulino[2004]250 p.21 cm.Intersezioni260001CFI00004002001 Intersezioni260EbreiPersecuzione1938-1945Giudizi degli intellettualiFIRRMLC414141IEbreiSterminio1941-1945Interpretazioni politiche, filosofiche e letterarieFIRRMLC278761IShoahStoria e memoriaFIRRMLC297044I940.5318Seconda guerra mondiale. 1939-1945. Olocausto21Traverso, EnzoRAVV043792070144489ITIT-0120051108IT-RM028 IT-RM0166 IT-RM1605 IT-FR0017 Biblioteca Universitaria AlessandrinaRM028 Biblioteca Nazionale dell’Ebraismo Italiano “Tullia Zevi”RM0166 Biblioteca Della Persona - Istituto Internazionale Jacques MaritainRM1605 Biblioteca umanistica Giorgio ApreaFR0017 NUBO2541104Biblioteca umanistica Giorgio Aprea 52MAG 1/2311 52FLS0000290965 VMB RS A 2018121120181211 01 28 42 52Auschwitz e gli intellettuali740449UNICAS