LEADER 01008nam0-22002891i-450- 001 990001292460403321 005 20080121151740.0 035 $a000129246 035 $aFED01000129246 035 $a(Aleph)000129246FED01 035 $a000129246 100 $a20001205d1986----km-y0itay50------ba 101 0 $aeng 200 1 $aGeometry of normed linear spaces$eproceedings of a Conference held, in honor of Mahlon Marsh Day, at the University of Illinois at Urbana-Champaign, June 9-12, 1983$fedited by R.G. Bartle, N.T. Peck, A.L. Peressini and J.J. Uhl 210 $aProvidence (RI)$cAmerican Mathematical Society$d1986 225 1 $aContemporary mathematics$v52 702 1$aBartle,$bRobert Gardner$f<1927-2003> 702 1$aPeck,$bN.T. 702 1$aPeressini,$bA.l. 702 1$aUhl,$bJ.J. 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990001292460403321 952 $aC-1-(52$b2425$fMA1 959 $aMA1 996 $aGeometry of normed linear spaces$9383659 997 $aUNINA LEADER 03033nam 22007455 450 001 9910483471603321 005 20251226203255.0 010 $a3-319-26823-6 024 7 $a10.1007/978-3-319-26823-1 035 $a(CKB)4340000000001221 035 $a(SSID)ssj0001585004 035 $a(PQKBManifestationID)16265698 035 $a(PQKBTitleCode)TC0001585004 035 $a(PQKBWorkID)14865087 035 $a(PQKB)11527443 035 $a(DE-He213)978-3-319-26823-1 035 $a(MiAaPQ)EBC6285866 035 $a(MiAaPQ)EBC5587995 035 $a(Au-PeEL)EBL5587995 035 $a(OCoLC)932170404 035 $a(PPN)190529598 035 $a(EXLCZ)994340000000001221 100 $a20151119d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptology and Network Security $e14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings /$fedited by Michael Reiter, David Naccache 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (X, 257 p. 41 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9476 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-26822-8 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9476 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aComputer networks 606 $aCryptology 606 $aData and Information Security 606 $aIT Operations 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aIT Operations. 615 24$aComputer Communication Networks. 676 $a005.82 702 $aReiter$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNaccache$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483471603321 996 $aCryptology and Network Security$92968064 997 $aUNINA