LEADER 02495nas1 2200481 n 450 001 990008968270403321 005 20240229084249.0 011 $a0017-0070 035 $a000896827 035 $aFED01000896827 035 $a(Aleph)000896827FED01 035 $a000896827 091 $2CNR$aP 00045133 100 $a20161109b19621996km-y0itaa50------ba 101 0 $aita 102 $aIT 110 $aauu-------- 200 1 $aGiornale botanico italiano [1962] 207 1$a1962-1996 210 $aFirenze$cSocieta botanica italiana 423 0$1001000893431$12001$aBullettino della Società Botanica Italiana 430 0$1001000901764$12001$aNuovo giornale botanico italiano [1927] 440 0$1001000902477$12001$aPlant Biosystems (Firenze. Testo stampato) 530 0 $aGiornale botanico italiano [1962] 675 $a58 676 $a580 712 02$aSocietà botanica italiana 801 0$aIT$bACNP$c20090723 859 4 $uhttp://acnp.cib.unibo.it/cgi-ser/start/it/cnr/dc-p1.tcl?catno=31160&person=false&language=ITALIANO&libr=&libr_th=unina1$zBiblioteche che possiedono il periodico 901 $aSE 912 $a990008968270403321 958 $aBiblioteca. Orto Botanico. Facoltà di Scienze Matematiche, Fisiche e Naturali dell'Università Federico II$b1967-1989;$fNAP06 958 $aBiblioteca. Dipartimento di Scienze biologiche. Sez. di Biologia vegetale. Università degli studi di Napoli Federico II$b1962-1974;$fDBV 958 $aBiblioteca del Dipartimento di Biologia Strutturale e Funzionale.$b1965-1996.$cLAC.$fNAP01 959 $aNAP06 959 $aDBV 959 $aNAP01 996 $aGiornale botanico italiano$9795736 997 $aUNINA AP1 8 $6866-01$aNA016 Biblioteca. Orto Botanico. Facoltà di Scienze Matematiche, Fisiche e Naturali dell'Università Federico II$ev. Foria,223, Napoli (NA)$m(081) 449759$m(081) 450165$nit AP1 8 $6866-02$aNA163 Biblioteca. Dipartimento di Scienze biologiche. Sez. di Biologia vegetale. Università degli studi di Napoli Federico II$ev. Foria,223, Napoli (NA)$m(081) 440681$m(081) 450165$nit AP1 8 $6866-03$aNA247 Biblioteca del Dipartimento di Biologia Strutturale e Funzionale.$eCompl. Univ. Monte S. Angelo, Via Cintia, 80126 Napoli (NA)$m081.679220; 081.679298$m081.679233$nit AP2 40$aacnp.cib.unibo.it$nACNP Italian Union Catalogue of Serials$uhttp://acnp.cib.unibo.it/cgi-ser/start/it/cnr/df-p.tcl?catno=31160&language=ITALIANO&libr=&person=&B=1&libr_th=unina&proposto=NO LEADER 06543nam 22007335 450 001 9910349408403321 005 20251225201935.0 010 $a9783319998077 010 $a3319998072 024 7 $a10.1007/978-3-319-99807-7 035 $a(CKB)4100000006674843 035 $a(DE-He213)978-3-319-99807-7 035 $a(MiAaPQ)EBC6299033 035 $a(PPN)230538371 035 $a(EXLCZ)994100000006674843 100 $a20180905d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Practice and Experience $e14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings /$fedited by Chunhua Su, Hiroaki Kikuchi 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIV, 624 p. 111 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11125 300 $aIncludes index. 311 08$a9783319998060 311 08$a3319998064 327 $aSystem Security -- Macros Finder: Do You Remember LOVELETTER -- Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection -- Universal Wavelet Relative Distortion: A New Counter Forensic Attack on Photo Response Non-Uniformity based Source Camera Identification -- Compact Ring Signature in the Standard Model for Blockchain -- Public key cryptography -- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE -- An Almost Non-Interactive Order Preserving Encryption Scheme -- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding -- Searchable and functional encryption -- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits -- Constrained (Verifiable) Pseudorandom Function from Functional Encryption -- Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption (Invited paper) -- (Post-quantum) Signature schemes -- Certificateless Public Key Signature Schemes from Standard Algorithms -- A New Design of Online/Offline Signatures Based on Lattice -- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case -- Achieving Almost-Full Security for Lattice-based Fully Dynamic Group Signatures with Verifier-local Revocation -- Entanglement between Hash Encodings and Signatures from ID Schemes with Non-Binary Challenges: a Case Study on Lightweight Code-based Signatures -- Security Protocols -- Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes -- Keyword-Based Delegable Proofs of Storage -- A Generic Framework for Accountable Optimistic Fair Exchange Protocol -- Network Security -- Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification -- A Two-Stage Classifier Approach for Network Intrusion Detection -- DSH: Deniable Secret Handshake Framework -- Authentication -- Non-adaptive Group-Testing Aggregate MAC Scheme -- TMGMap: Designing Touch Movement-based Geographical Password Authentication on Smartphones -- Seeing is believing: authenticating users with what they see and remember -- Side-channel Attacks -- T SM: Elliptic Curve Scalar Multiplication Algorithm Secure against Single-Trace Attacks -- Recovering Memory Access Sequence with Differential Flush+Reload Attack -- Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE -- Security for Cyber-Physical Systems -- Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices (Invited Paper) -- Regulating IoT messages -- A security cycle clock synchronization method based on mobile reference nodes in Wireless Sensor Networks -- Security in Mobile Environment -- Attribute-based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare -- Privacy-preserving data collection for mobile phone sensing tasks -- Secure Computation and Data Privacy -- M-ORAM Revisited: Security and Construction Updates -- Secure Computation of Inner Product of Vectors with Distributed Entries & its Applications to SVM -- (k,l)-clustering for Transactional Data Streams Anonymization -- Cryptographic Protocols -- A New Insight - Proxy Re-Encryption under LWE with Strong Anti-Collusion -- Hierarchical Secret Sharing Schemes Secure against Rushing Adversary:nn Cheater Identification and Robustness -- An Efficient and Provably Secure Private Polynomial Evaluation Scheme -- Efficient Traceable Oblivious Transfer and Its Applications. 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols. . 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11125 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aComputers 606 $aArtificial intelligence 606 $aData and Information Security 606 $aCryptology 606 $aComputer Communication Networks 606 $aComputing Milieux 606 $aArtificial Intelligence 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aComputers. 615 0$aArtificial intelligence. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aComputing Milieux. 615 24$aArtificial Intelligence. 676 $a005.8 702 $aSu$b Chunhua$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKikuchi$b Hiroaki$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349408403321 996 $aInformation Security Practice and Experience$9772300 997 $aUNINA