01569nlm0 22004571i 450 9900092552704033219783540785248000925527FED01000925527(Aleph)000925527FED0100092552720100926d2008----km-y0itay50------baengDEdrnn-008mamaaTheory of CryptographyRisorsa elettronicaFifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsedited by Ran CanettiBerlin ; HeidelbergSpringer2008Lecture Notes in Computer Science0302-97434948Documento elettronicoTestoFormato html, pdfCanetti,RanITUNINAREICATUNIMARCFull text per gli utenti Federico IIhttp://dx.doi.org/10.1007/978-3-540-78524-8EB990009255270403321Algorithm Analysis and Problem ComplexityComputational complexityComputer scienceComputer ScienceComputer softwareComputers and SocietyData EncryptionData encryption (Computer science)Data protectionDiscrete Mathematics in Computer ScienceInformation SystemsManagement of Computing and Information SystemsSystems and Data SecurityTheory of Cryptography772206UNINA01074cam a2200253 i 450099100361706970753620021219124404.0021128s1999 it 100 0 ita db1183965x-39ule_instLE02736849ExLDip.to Studi GiuridiciitaFemmes-esclaves :modèles d'interprétation anthropologique, économique, juridique :atti del 21. Colloquio internazionale GIREA, Lacco Ameno-Ischia, 27-29 ottobre 1994 /a cura di Francesca Reduzzi Merola, Alfredina Storchi MarinoNapoli :Jovene,1999vii, 426 p. ;24 cmDiaphora ;9DonnaCondizioneAntichitàCongressiReduzzi Merola, FrancescaStorchi Marino, Alfredina.b1183965x27-04-1720-12-02991003617069707536LE027 R-XXII 581LE027-10956le027-E0.00-no 00000.i1209130320-12-02Femmes-esclaves900465UNISALENTOle02701-01-02ma -itait 01