LEADER 01287nam--2200373---450- 001 990001629610203316 005 20040804180736.0 010 $a88-244-9768-3 035 $a000162961 035 $aUSA01000162961 035 $a(ALEPH)000162961USA01 035 $a000162961 100 $a20040504d2001----km-y0enga50------ba 101 $aita 102 $aIT 200 1 $aFormulario del procedimento penale davanti al Giudice di pace$enormativa di riferimento, note di commento$fa cura di Ernesto Aghina e Paolo Piccialli 210 $aNapoli$cEdizioni giuridiche Simone$d2001 215 $a285 p.$d24 cm$e1 CD-ROM 225 $a<> formulari con CD ROM$vL 201/A 410 0 $12001$a<> formulari con CD ROM$vL 201/A 606 $aProcesso penale$xFormulari 606 $aGiudice di pace$xCompetenza penale 606 $aAtti processuali penali$xFormulari 676 $a345.4505 700 $aAGHINA,$bErnesto$0237108 701 $aPICCIALLI,$bPaolo$0438300 912 $a990001629610203316 951 $aIG X 488$b40224 G.$cIG X$d00133324 959 $aBK 969 $aGIU 979 $aMARIA$b10$c20040504$lUSA01$h0948 979 $aVITALE$b90$c20040804$lUSA01$h1807 996 $aFormulario del procedimento penale davanti al Giudice di pace$9944000 997 $aUNISA LEADER 03507nam 22008055 450 001 9910349394903321 005 20251225205303.0 010 $a9783030038076 010 $a3030038076 024 7 $a10.1007/978-3-030-03807-6 035 $a(CKB)4100000007111091 035 $a(DE-He213)978-3-030-03807-6 035 $a(MiAaPQ)EBC6302603 035 $a(PPN)232470871 035 $a(EXLCZ)994100000007111091 100 $a20181104d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTheory of Cryptography $e16th International Conference, TCC 2018, Panaji, India, November 11?14, 2018, Proceedings, Part I /$fedited by Amos Beimel, Stefan Dziembowski 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XVII, 720 p. 80 illus., 11 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11239 311 08$a9783030038069 311 08$a3030038068 327 $aMemory-based functions and complexity theory -- Two-round MPC protocols -- Zero knowledge -- Information-theoretic cryptography -- Trapdoor permutations and signatures -- Coin-tossing and fairness -- Functional and identity-based encryption. 330 $aThe two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11239 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aComputers and civilization 606 $aComputer networks 606 $aElectronic data processing$xManagement 606 $aCryptology 606 $aData and Information Security 606 $aLegal Aspects of Computing 606 $aComputers and Society 606 $aComputer Communication Networks 606 $aIT Operations 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aComputers and civilization. 615 0$aComputer networks. 615 0$aElectronic data processing$xManagement. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aLegal Aspects of Computing. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aIT Operations. 676 $a005.82 676 $a005.824 702 $aBeimel$b Amos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDziembowski$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349394903321 996 $aTheory of Cryptography$93000229 997 $aUNINA