LEADER 01182nam a22003011i 4500 001 991003981609707536 005 20030929151958.0 008 031111s1988 it |||||||||||||||||ita 035 $ab12502042-39ule_inst 035 $aARCHE-053531$9ExL 040 $aDip.to Lingue$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a153.9 100 1 $aDoise, Willem$0120540 245 13$aLa costruzione sociale dell'intelligenza /$cWillem Doise, Gabriel Mugny 260 $aBologna :$bIl mulino,$c1988 300 $a272 p. ;$c21 cm 440 0$aStudi e ricerche ;$v144 500 $aTrad. di Paola De Paolis 650 4$aPsicologia cognitiva$xSviluppi 650 4$aIntelligenza$xProcessi mentali 700 1 $aMugny, Gabriel$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0120541 765 0 $tdeveloppement social de l'intelligence 907 $a.b12502042$b02-04-14$c13-11-03 912 $a991003981609707536 945 $aLE012 153.9 DOI$g1$i2012000172104$lle012$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i12938737$z13-11-03 996 $aCostruzione sociale dell'intelligenza$91446586 997 $aUNISALENTO 998 $ale012$b13-11-03$cm$da $e-$fita$git $h3$i1 LEADER 01523nam 2200421 450 001 9910376424403321 005 20230808201904.0 010 $a1-4503-4841-6 035 $a(CKB)3710000001156667 035 $a(WaSeSS)IndRDA00103985 035 $a(EXLCZ)993710000001156667 100 $a20180829d2016 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aSSPREW-6 $eproceedings of the 6th Software Security, Protection, and Reverse Engineering Workshop 2016 : December 5-6, 2016, Los Angeles, CA, USA /$fprogram chairs, Mila Dalla Preda, Natalia Stakhanova ; sponsor, ACM 210 1$aNew York :$cACM,$d2016. 215 $a1 online resource (85 pages) 517 1 $aSoftware Security, Protection, and Reverse Engineering Workshop-six 517 1 $aProceedings of the sixth Workshop on Software Security, Protection, and Reverse Engineering 606 $aSoftware protection$vCongresses 606 $aReverse engineering$vCongresses 606 $aComputer software$xSecurity measures$vCongresses 615 0$aSoftware protection 615 0$aReverse engineering 615 0$aComputer software$xSecurity measures 676 $a005 702 $aPreda$b Mila Dalla 702 $aStakhanova$b Natalia 712 02$aAssociation for Computing Machinery, 801 0$bWaSeSS 801 1$bWaSeSS 906 $aBOOK 912 $a9910376424403321 996 $aSSPREW-6$92289961 997 $aUNINA LEADER 03780nam 22005895 450 001 9910299288003321 005 20251113211405.0 010 $a981-10-7850-5 024 7 $a10.1007/978-981-10-7850-7 035 $a(CKB)4100000001795012 035 $a(DE-He213)978-981-10-7850-7 035 $a(MiAaPQ)EBC6303255 035 $a(MiAaPQ)EBC5579641 035 $a(Au-PeEL)EBL5579641 035 $a(OCoLC)1020270024 035 $a(PPN)223956112 035 $a(EXLCZ)994100000001795012 100 $a20180115d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMobile Internet Security $eFirst International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers /$fedited by Ilsun You, Fang-Yie Leu, Hsing-Chung Chen, Igor Kotenko 205 $a1st ed. 2018. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2018. 215 $a1 online resource (X, 175 p. 90 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v797 311 08$a981-10-7849-1 327 $aPerformance on clustering routing for naturally deployed wireless sensor networks -- Mobile security assurance for automotive software through ArchiMate -- A generalized data inconsistency detection model for wireless sensor networks -- Building a frame-based cyber security learning game -- personal identification using time and frequency domain features of ECG lead-I -- A secure color-code key exchange protocol for mobile chat application -- Design and implement SPEEX speech technology on ARM processor -- A discrete wavelet transformation based fast and secure transmission of images for group communication -- An automated graph based approach to risk assessment for computer networks with mobile components -- Assessment of computer network resilience under impact of cyber attacks on the basis of stochastic networks conversion -- The cryptanalysis of WPA & WPA2 Using the parallel-computing with GPUs -- A policy management system based on multi-dimensional attribution label -- Access controlfor cross-border transfer of sensor data -- Security analysis oriented physical components modeling in quantum key distribution -- A novel hybrid architecture for high speed regular expression matching. 330 $aThis book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2016, held in Taichung, Taiwan, in July 2016. The 15 revised full papers presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v797 606 $aData protection 606 $aElectronic digital computers$xEvaluation 606 $aData and Information Security 606 $aSystem Performance and Evaluation 615 0$aData protection. 615 0$aElectronic digital computers$xEvaluation. 615 14$aData and Information Security. 615 24$aSystem Performance and Evaluation. 676 $a004.67 702 $aYou$b Ilsun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLeu$b Fang-Yie$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChen$b Hsing-Chung$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKotenko$b Igor$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299288003321 996 $aMobile Internet Security$91961597 997 $aUNINA