LEADER 01134nam a2200325 i 4500 001 991001122259707536 005 20020507183654.0 008 960201s1955 us ||| | eng 020 $a0387943919 035 $ab10804018-39ule_inst 035 $aLE01307383$9ExL 040 $aDip.to Matematica$beng 082 0 $a320.900151 084 $aAMS 90D 084 $aAMS 92G 084 $aAMS 92K10 100 1 $aTaylor, Alan D.$0133075 245 10$aMathematics and politics :$bstrategy, voting, power and proof /$cAlan D. Taylor 260 $aNew York :$bSpringer-Verlag,$c1955 300 $axiv, 284 p. ;$c24 cm. 500 $aIncludes bibliographical references and index 650 4$aGame theory 650 4$aPolitical science-Mathematical models 650 4$aSocial choice-Mathematical models 907 $a.b10804018$b21-09-06$c28-06-02 912 $a991001122259707536 945 $aLE013 92K TAY11 (1995)$g1$i2013000045283$lle013$o-$pE0.00$q-$rl$s- $t0$u1$v13$w1$x0$y.i10908407$z28-06-02 996 $aMathematics and politics$9925836 997 $aUNISALENTO 998 $ale013$b01-01-96$cm$da $e-$feng$gus $h0$i1 LEADER 03794nam 22008055 450 001 9910349416603321 005 20251225203519.0 010 $a9783319989891 010 $a3319989898 024 7 $a10.1007/978-3-319-98989-1 035 $a(CKB)4100000005471800 035 $a(DE-He213)978-3-319-98989-1 035 $a(MiAaPQ)EBC6304056 035 $a(PPN)229916244 035 $a(EXLCZ)994100000005471800 100 $a20180806d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Security $e23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II /$fedited by Javier Lopez, Jianying Zhou, Miguel Soriano 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIX, 571 p. 104 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11099 311 08$a9783319989884 311 08$a331998988X 327 $aSoftware security -- Blockchain & machine Learning -- Hardware security -- Attacks -- Malware & vulnerabilities -- Protocol security -- Privacy (I) -- CPS and IoT security -- Mobile security -- Database & web security -- Cloud security -- Applied crypto (I) -- Privacy (II) -- Multi-party computation -- SDN security -- Applied crypto (II). 330 $aThe two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. . 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11099 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aComputer engineering 606 $aComputer networks 606 $aData and Information Security 606 $aCryptology 606 $aComputers and Society 606 $aLegal Aspects of Computing 606 $aComputer Engineering and Networks 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aComputer engineering. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 615 24$aComputer Engineering and Networks. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aLo?pez$b Javier$g(Javier Lo?pez-Mun?oz),$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhou$b Jianying$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSoriano$b Miguel$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349416603321 996 $aComputer & security$9878224 997 $aUNINA