LEADER 05079nam 22008295 450 001 996466296903316 005 20200703030426.0 010 $a1-280-38765-3 010 $a9786613565570 010 $a3-642-14081-5 024 7 $a10.1007/978-3-642-14081-5 035 $a(CKB)2670000000045029 035 $a(SSID)ssj0000446546 035 $a(PQKBManifestationID)11291494 035 $a(PQKBTitleCode)TC0000446546 035 $a(PQKBWorkID)10496707 035 $a(PQKB)11567197 035 $a(DE-He213)978-3-642-14081-5 035 $a(MiAaPQ)EBC3065919 035 $a(PPN)149024649 035 $a(EXLCZ)992670000000045029 100 $a20100924d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Privacy$b[electronic resource] $e15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, Proceedings /$fedited by Ron Steinfeld, Philip Hawkes 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XII, 403 p. 40 illus.) 225 1 $aSecurity and Cryptology ;$v6168 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-14080-7 320 $aIncludes bibliographical references and index. 327 $aSymmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. 410 0$aSecurity and Cryptology ;$v6168 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 607 $aSydney <2010>$2swd 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8 702 $aSteinfeld$b Ron$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHawkes$b Philip$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aACISP 2010 906 $aBOOK 912 $a996466296903316 996 $aInformation Security and Privacy$9772014 997 $aUNISA LEADER 02284nam0 22004453i 450 001 MIL0304491 005 20231121125544.0 010 $a8802050139 100 $a19970103d1996 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $aOpere filosofiche$fdi George Berkeley$ga cura di Silvia Parigi 210 $aTorino$cUnione tipografico-editrice torinese$dİ1996 215 $a710 p., [6] carte di tav.$cill.$d24 cm 225 | $aClassici della filosofia 300 $aContiene: Saggio per una nuova teoria della visione, Trattato sui principi delta conoscenza umana, Tre dialoghi tra Hylas e Philonous, Saggi pubblicati sul Guardian (1713); Sul movimento; Corrispondenza filosofica tra George Berkeley e Samuel Johnson (1729-1730); La teoria della visione difesa e chiarita; Siris. 410 0$1001CFI0006330$12001 $aClassici della filosofia 606 $aFilosofia occidentale moderna$2FIR$3RMLC317518$9I 676 $a102$9Filosofia. Miscellanea.$v21 676 $a192$9FILOSOFIA OCCIDENTALE MODERNA. ISOLE BRITANNICHE$v20 676 $a192$9Filosofia occidentale moderna. Isole Britanniche.$v21 700 1$aBerkeley$b, George$3CFIV044075$4070$044816 702 1$aParigi$b, Silvia$3CFIV058924 790 1$aBerckeley$b, Georg$3MILV320449$zBerkeley, George 790 1$aBerkeley$b, Giorgio$3UTOV551580$zBerkeley, George 801 3$aIT$bIT-01$c19970103 850 $aIT-RM028 $aIT-RM0289 $aIT-RM0313 $aIT-RM0418 $aIT-FR0084 $aIT-FR0017 899 $aBiblioteca Universitaria Alessandrina$bRM028 899 $aBiblioteca Statale A. Baldini$bRM0289 899 $aBIBLIOTECA CASANATENSE$bRM0313 899 $aBIBLIOTECA ACCADEMIA NAZ. DEI LINCEI E CORSINIANA$bRM0418 899 $aBiblioteca Del Monumento Nazionale Di Montecassino$bFR0084 899 $aBiblioteca umanistica Giorgio Aprea$bFR0017 912 $aMIL0304491 950 0$aBiblioteca umanistica Giorgio Aprea$d 52S.L. 102 UTET Ber$e 52FLS0000122245 VMN RS $fC $h20130722$i20130722 977 $a 01$a 04$a 07$a 10$a 25$a 52 996 $aOpere filosofiche$9657389 997 $aUNICAS