LEADER 01416nam a2200337 a 4500 001 991001595119707536 005 20230516144051.0 008 220620m20042005it a f 001 i 020 $a8881330237 035 $ab13396742-39ule_inst 040 $aDip.to di Studi Storicfi$bita 082 04$a945.38507 100 1 $aManci, Sigismondo Antonio$0623550 245 10$aDiario /$cSigismondo Antonio Manci ; a cura di Marco Stenico 260 $aTrento :$bSocieta di Studi trentini di Scienze storiche 300 $a3 v. :$bill. ;$c24 cm 440 0$aCollana di monografie ;$v66-68 505 $g1.: 1756-1762. - 2004. - 275 p. 505 $g2.: 1762-1776. - 2005. - 305 p. 505 $g3.: 1776-1793 / saggio introduttivo di Claudio Donati. - 2005. - 521 p. 650 4$aTrentino$y1756-1793 700 1 $aStenico, Marco 700 1 $aDonati, Claudio 907 $a.b13396742$b21-09-06$c21-04-06 912 $a991001595119707536 945 $aLE023 945.3 MAN 1 1 V.1$cV.1$g1$i2023000084977$lle023$o-$pE22.00$q-$rl$s-$t0$u0$v0$w0$x0$y.i1422561x$z21-04-06 945 $aLE023 945.3 MAN 1 1V.2$cV. 2$g1$i2023000085080$lle023$o-$pE24.00$q-$rl$s-$t0$u0$v0$w0$x0$y.i14225669$z21-04-06 945 $aLE023 945.3 MAN 1 1V.3$cV. 3$g1$i2023000084960$lle023$o-$pE28.00$q-$rl$s-$t0$u0$v0$w0$x0$y.i14225657$z21-04-06 996 $aDiario$91090771 997 $aUNISALENTO 998 $ale023$b- -$cm$da$e-$fita$git$h0$i0 LEADER 01348nam 2200337 450 001 9910724393303321 005 20230702095444.0 035 $a(CKB)5470000002601558 035 $a(NjHacI)995470000002601558 035 $a(EXLCZ)995470000002601558 100 $a20230702d2019 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a03 Editors' preface; Indian Recordings (Schomerus 1929) /$fUlla Remmer 210 1$a[Place of publication not identified] :$cVerlag der O?sterreichischen Akademie der Wissenschaften,$d2019. 215 $a1 online resource (2 pages) 330 $aThe CD publication features 30 sound recordings, chiefly recitations of classical Tamil poetry, made by Hilko Wiardo Schomerus in Madras (Chennai) in 1929. What is new and special about this release is the publication of the sources, of which hitherto no (or only little) notice has been taken. 517 $a03 Editors' preface; Indian Recordings 606 $aTamil poetry 615 0$aTamil poetry. 676 $a894.811171 700 $aRemmer$b Ulla$0863089 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910724393303321 996 $a03 Editors' preface; Indian Recordings (Schomerus 1929)$93394734 997 $aUNINA LEADER 05004nam 22008175 450 001 9910349306203321 005 20250426005450.0 010 $a3-030-29729-2 024 7 $a10.1007/978-3-030-29729-9 035 $a(CKB)4100000008959012 035 $a(DE-He213)978-3-030-29729-9 035 $a(MiAaPQ)EBC5927586 035 $a(PPN)254819265 035 $a(EXLCZ)994100000008959012 100 $a20190813d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security Workshops $eACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5?7, 2019, Proceedings /$fedited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIV, 193 p. 41 illus., 28 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11605 311 08$a3-030-29728-4 327 $aSiMLA - Security in Machine Learning and its Applications -- Risk-based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics -- Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks -- Cloud S&P - Cloud Security and Privacy -- Graphene: A Secure Cloud Communication Architecture -- A Survey on Machine Learning applications for Software Defined Network Security -- AIBlock - Application Intelligence and Blockchain Security -- A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations -- BSIEM-IoT: A Blockchain-based and Distributed SIEM for the Internet of Things -- Towards Blockchained Challenge-based Collaborative Intrusion Detection -- AIoTS - Artificial Intelligence and Industrial Internet-of-Things Security -- Enhancement to the Privacy-aware Authentication for Wi-Fi based Indoor Positioning Systems -- Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set -- Strong Leakage Resilient Encryption by Hiding Partial Ciphertext. 330 $aThis book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. They stem from the following workshops: AIBlock 2019: First International Workshop on Application Intelligence and Blockchain Security AIoTS 2019: First International Workshop on Articial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2019: First International Workshop on Cloud Security and Privacy PriDA 2019: First InternationalWorkshop on Privacy-preserving Distributed Data Analysis SiMLA 2019: First International Workshop on Security in Machine Learning and its Applications. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11605 606 $aData protection 606 $aComputer networks 606 $aComputer networks$xSecurity measures 606 $aCryptography 606 $aData encryption (Computer science) 606 $aMachine learning 606 $aApplication software 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aMobile and Network Security 606 $aCryptology 606 $aMachine Learning 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer networks$xSecurity measures. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aMachine learning. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 615 24$aCryptology. 615 24$aMachine Learning. 615 24$aComputer and Information Systems Applications. 676 $a005.82 676 $a005.82 702 $aZhou$b Jianying$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeng$b Robert$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Zhou$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMajumdar$b Suryadipta$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMeng$b Weizhi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Lingyu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Kehuan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349306203321 996 $aApplied cryptography and network security workshops$92278657 997 $aUNINA