LEADER 02313nam0 2200469 i 450 001 VAN00132764 005 20240806100837.663 017 70$2N$a9783319007625 100 $a20210325d2014 |0itac50 ba 101 $aeng 102 $aCH 105 $a|||| ||||| 200 1 $aBeyond Standard Model Phenomenology at the LHC$eDoctoral Thesis accepted by the Katholieke Universiteit Leuven and the Université Catholique de Louvain, Belgium$fPriscila de Aquino 210 $aCham$cSpringer$d2014 215 $axiii, 158 p.$cill.$d24 cm 410 1$1001VAN00104193$12001 $aSpringer theses$erecognizing outstanding Ph.D. research$1210 $aBerlin$cSpringer$d2010- 500 1$3VAN00134735$aBeyond Standard Model Phenomenology at the LHC$91768718 606 $a81-XX$xQuantum theory [MSC 2020]$3VANC019967$2MF 606 $a81Q60$xSupersymmetry and quantum mechanics [MSC 2020]$3VANC033997$2MF 606 $a81R40$xSymmetry breaking in quantum theory [MSC 2020]$3VANC035238$2MF 606 $a81T13$xYang-Mills and other gauge theories in quantum field theory [MSC 2020]$3VANC023357$2MF 606 $a83Axx$xSpecial relativity [MSC 2020]$3VANC023562$2MF 610 $aBeyond Standard Model Physics$9KW:K 610 $aComputation of Feynman Graphs$9KW:K 610 $aExperimental Search for Extra Dimensions$9KW:K 610 $aGravitons and Gravitinos$9KW:K 610 $aHelicity amplitudes$9KW:K 610 $aSpin-2 Particles$9KW:K 610 $aSpin-3/2 Particles$9KW:K 610 $aSupersymmetric Particle Physics$9KW:K 610 $aSupersymmetry and supergravity$9KW:K 620 $aCH$dCham$3VANL001889 700 1$ade Aquino$bPriscila$3VANV106590$0791340 712 $aSpringer $3VANV108073$4650 801 $aIT$bSOL$c20241115$gRICA 856 4 $uhttp://doi.org/10.1007/978-3-319-00762-5$zE-book ? Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o Shibboleth 899 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$1IT-CE0120$2VAN08 912 $fN 912 $aVAN00132764 950 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$d08DLOAD e-book 1962 $e08eMF1962 20210325 996 $aBeyond Standard Model Phenomenology at the LHC$91768718 997 $aUNICAMPANIA LEADER 05713nam 22008535 450 001 9910144210003321 005 20251116234454.0 010 $a3-540-39871-6 024 7 $a10.1007/b94819 035 $a(CKB)1000000000212280 035 $a(SSID)ssj0000326467 035 $a(PQKBManifestationID)11243997 035 $a(PQKBTitleCode)TC0000326467 035 $a(PQKBWorkID)10296350 035 $a(PQKB)11034090 035 $a(DE-He213)978-3-540-39871-4 035 $a(MiAaPQ)EBC3087761 035 $a(PPN)155165127 035 $a(EXLCZ)991000000000212280 100 $a20121227d2004 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity Protocols $e10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers /$fedited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe 205 $a1st ed. 2004. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2004. 215 $a1 online resource (VIII, 248 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2845 300 $aIncludes index. 311 08$a3-540-20830-5 327 $a(Transcript) -- Keynote Address -- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties -- Is Entity Authentication Necessary? -- A Structured Operational Modelling of the Dolev-Yao Threat Model -- On Trust Establishment in Mobile Ad-Hoc Networks -- Legally Authorized and Unauthorized Digital Evidence -- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing -- Contractual Access Control -- Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks -- Analyzing Delegation Properties -- Combinatorial Optimization of Countermeasures against Illegal Copying -- Protocols with Certified-Transfer Servers -- An Architecture for an Adaptive Intrusion-Tolerant Server -- Supporting Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks -- Delegation of Signalling Rights -- Mobile IPv6 Security -- Concluding Discussion: Accounting for Resources -- Back to the Beginning. 330 $aOnce again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was ?Discerning the Protocol Participants.? Security protocols are usually described in terms of the active participants ? Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the meaning of a run. These silent partners to the protocol have their own security policies, and assumptionsaboutidentity,authorizationandcapabilityneedtobere-examined when the agenda of a hidden participant may change. We hope that the position papers published here, which have been rewritten and rethought in the light of the discussions at the workshop, will be of interest, not just for the speci?c contributions they make but also for the deeper issues which they expose. In order to identify these issues more clearly, we include transcripts for some of the discussions which took place in Cambridge during the workshop. What would you have liked to add? Do let us know. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2845 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aComputers and civilization 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aOperating systems (Computers) 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputers and Society. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aChristianson$b Bruce$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCrispo$b Bruno$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMalcolm$b James A$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRoe$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Workshop on Security Protocols 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910144210003321 996 $aSecurity Protocols$9772025 997 $aUNINA