01171cam1 22002773 450 SOB02232720220204111112.020040211g00009999|||||ita|0103 bafreFR<<Le >>droit de la nature et des gensSamuel Pufendorftraduction de Jean BarbeyracCaenCentre de philosophie politique et juridique de l'Universite de Caenv.27 cmBibliothèque de philosophie politique et juridique - Centre de philospphie politique et juridique URA-CNRSRist. anast. dell'ed.: Bale, 1732001LAEC000191202001 *Bibliothèque de philosophie politique et juridique - Centre de philospphie politique et juridique URA-CNRS001SOBE000695442000 1 / Samuel Pufendorf001SOBE000695452000 2 / Samuel PufendorfPufendorf, Samuel : von <1632-1694>AF00009358070251922BAREYRAC, JeanAF00023659070ITUNISOB20220204RICASOB022327M 102 Monografia moderna SBNMDroit de la nature et des gens1676779UNISOB03411nam 22007095 450 99620729520331620200705143623.03-319-17533-510.1007/978-3-319-17533-1(CKB)3710000000404072(SSID)ssj0001501534(PQKBManifestationID)11830237(PQKBTitleCode)TC0001501534(PQKBWorkID)11446464(PQKB)10037824(DE-He213)978-3-319-17533-1(MiAaPQ)EBC6285242(MiAaPQ)EBC5588308(Au-PeEL)EBL5588308(OCoLC)907468310(PPN)185489109(EXLCZ)99371000000040407220150408d2015 u| 0engurnn|008mamaatxtccrInformation Security Practice and Experience[electronic resource] 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings /edited by Javier Lopez, Yongdong Wu1st ed. 2015.Cham :Springer International Publishing :Imprint: Springer,2015.1 online resource (XIV, 576 p. 76 illus.) Security and Cryptology ;9065Bibliographic Level Mode of Issuance: Monograph3-319-17532-7 System Security -- Stream Cipher -- Analysis -- Key Exchange Protocol -- Elliptic Curve Cryptography -- Authentication -- Attribute-Based Encryption -- Mobile Security.- Theory -- Implementation -- Privacy and Indistinguishability.This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015. The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.Security and Cryptology ;9065Computer securityData encryption (Computer science)Management information systemsComputer scienceSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computer security.Data encryption (Computer science).Management information systems.Computer science.Systems and Data Security.Cryptology.Management of Computing and Information Systems.005.8Lopez Javieredthttp://id.loc.gov/vocabulary/relators/edtWu Yongdongedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996207295203316Information Security Practice and Experience772300UNISA