LEADER 01899oam 2200529 450 001 9910704946203321 005 20131218112314.0 035 $a(CKB)5470000002446284 035 $a(OCoLC)864590868 035 $a(EXLCZ)995470000002446284 100 $a20131203d2013 ua 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aUnited States Department of Justice $ehearing before the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, May 15, 2013 210 1$aWashington :$cU.S. Government Printing Office,$d2013. 215 $a1 online resource (iii, 231 pages) $cillustrations 300 $aTitle from title screen (viewed on December 3, 2013). 300 $aPaper version available for sale by the Superintendent of Documents, United States Government Printing Office. 300 $a"Serial no. 113-43." 517 $aUnited States Department of Justice 606 $aBombings$zMassachusetts$zBoston 606 $aDomestic terrorism$zUnited States 606 $aTerrorism investigation$zMassachusetts$zBoston 606 $aTerrorism investigation$zUnited States 606 $aHate crimes$zUnited States 606 $aSikhs$zUnited States 606 $aWhistle blowing$zMinnesota$zSaint Paul 606 $aDiscrimination in housing$zMinnesota$zSaint Paul 615 0$aBombings 615 0$aDomestic terrorism 615 0$aTerrorism investigation 615 0$aTerrorism investigation 615 0$aHate crimes 615 0$aSikhs 615 0$aWhistle blowing 615 0$aDiscrimination in housing 801 0$bGPO 801 1$bGPO 801 2$bSEN 801 2$bGPO 906 $aBOOK 912 $a9910704946203321 996 $aUnited States Department of Justice$93137862 997 $aUNINA LEADER 01249cam0-22004211i-450 001 990001759130403321 005 20250430115912.0 010 $a88-204-7445-X 035 $a000175913 035 $aFED01000175913 035 $a(Aleph)000175913FED01 100 $a20030910d1992----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------101yy 200 1 $aManlio Rossi-Doria e la Basilicata: il Mezzogiorno difficile$eun convegno e scritti di Manlio Rossi-Doria 210 $aMilano$cFrancoAngeli$dc1992 215 $a313 p.$d22 cm 225 1 $aQuaderni QA$iDocumenti$v2 610 0 $aEconomia agraria 610 0 $aBasilicata$aEconomia 676 $a333 702 1$aRossi-Doria,$bManlio$f<1905-1988> 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990001759130403321 952 $a945.77 ROSM 01$b2025/930$fFLFBC 952 $aN03.340$b5711$fDECTS 952 $a60 333 CECC 1992$b3680$fFAGBC 952 $aCOLLEZ. 1466 (2)$b19907$fFSPBC 952 $a284 SEZ. ANDRIELLO$b284$fDARPU 959 $aFLFBC 959 $aDECTS 959 $aFAGBC 959 $aFSPBC 959 $aDARPU 996 $aManlio Rossi-Doria e la Basilicata: il Mezzogiorno difficile$91561453 997 $aUNINA LEADER 07173nam 22008775 450 001 9910484539803321 005 20251226202141.0 010 $a3-540-32424-0 010 $a3-540-30855-5 024 7 $a10.1007/11599548 035 $a(CKB)1000000000213560 035 $a(SSID)ssj0000318274 035 $a(PQKBManifestationID)11247223 035 $a(PQKBTitleCode)TC0000318274 035 $a(PQKBWorkID)10308553 035 $a(PQKB)11304554 035 $a(DE-He213)978-3-540-32424-9 035 $a(MiAaPQ)EBC3067823 035 $a(PPN)123098963 035 $a(EXLCZ)991000000000213560 100 $a20100411d2005 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Cryptology $eFirst SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings /$fedited by Dengguo Feng, Dongdai Lin, Moti Yung 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XII, 428 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v3822 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$aPrinted edition: 9783540308553 320 $aIncludes bibliographical references and index. 327 $aInvited Talks -- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography -- You Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security Proofs of Some Identity Based Encryption Schemes -- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess?s Scheme -- ID-Based Signature Scheme Without Trusted PKG -- Security Modelling -- Specifying Authentication Using Signal Events in CSP -- Modeling RFID Security -- Systems Security -- Enforcing Email Addresses Privacy Using Tokens -- Efficient Authentication of Electronic Document Workflow -- Signature Schemes -- Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms -- Efficient Group Signatures from Bilinear Pairing -- Enhanced Aggregate Signatures from Pairings -- Constructing Secure Proxy Cryptosystem -- Symmetric Key Mechanisms -- Towards a General RC4-Like Keystream Generator -- HCTR: A Variable-Input-Length Enciphering Mode -- The kth-Order Quasi-Generalized Bent Functions over Ring Z p -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP -- An Improved Secure Two-Party Computation Protocol -- Threshold Cryptography -- Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes -- ID-Based Threshold Unsigncryption Scheme from Pairings -- Intrusion Detection Systems -- Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach -- The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control -- Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid FeatureSelection -- Protocol Cryptanalysis -- Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes -- An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption -- ECC Algorithms -- A Remark on Implementing the Weil Pairing -- Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC -- Applications -- Key Management for Secure Overlay Multicast -- Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN -- Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault -- Secret Sharing -- Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes -- New Methods to Construct Cheating Immune Multisecret Sharing Scheme -- Denial of Service Attacks -- Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation -- MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. 330 $aThe ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer?s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v3822 606 $aCryptography 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aComputer networks 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aComputers and civilization 606 $aCryptology 606 $aCoding and Information Theory 606 $aComputer Communication Networks 606 $aOperating Systems 606 $aAlgorithms 606 $aComputers and Society 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer networks. 615 0$aOperating systems (Computers). 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aCoding and Information Theory. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aAlgorithms. 615 24$aComputers and Society. 676 $a005.8 701 $aFeng$b Dengguo$0997280 701 $aLin$b Dongdai$01751547 701 $aYung$b Moti$01071902 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484539803321 996 $aInformation security and cryptology$94192779 997 $aUNINA