LEADER 01649nam0-22003011i-450 001 990007444820403321 005 20200622105127.0 035 $a000744482 035 $aFED01000744482 035 $a(Aleph)000744482FED01 035 $a000744482 100 $a20030604g18771886km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------001yy 200 1 $aCorso di diritto commerciale$fesposto da Ercole Vidari 210 $aMilano$cHoepli$d1877-1886 215 $a9 v.$d22 cm 327 1 $a1.: Introduzione ; Libro I, delle persone. Parte I, persone singole$a2.: Libro I, delle persone. Parte II, società commerciali$a3.: Libro I, delle persone. Parte II, società commerciali. Libro II, delle cose$a4.: Libro III, dei contratti : notizie generali, compera e vendita, trasporto (sulle strade ferrate e sui "tramways")$a5.: Libro III, dei contratti (continua) : deposito, pegno, conto corrente, assicurazioni terrestri ; Libro III. Parte III, contratti del commercio marittimo : titolo preliminare, sulle navi e sui proprietari di navi$a6.: Libro III. Parte III, contratti del commercio marittimo$a7.: Libro III. Parte III, contratti del commercio marittimo (cont. e fine) ; Parte IV, della cambiale$a8.: Libro III. Parte IV, della cambiale ; Libro IV. Parte I, fallimento$a9.: Libro IV. Parte I, fallimento ; Libro IV. Parte II, giurisdizione e competenza 451 $1001000600316 700 1$aVidari,$bErcole$0225067 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990007444820403321 952 $aDirez. V$b07337$fDDR 959 $aDDR 996 $aCorso di diritto commerciale$9581679 997 $aUNINA LEADER 00841nam a2200241 i 4500 001 991001548539707536 005 20020502200621.0 008 930923s1991 uk ||| | eng 035 $ab11529052-39ule_inst 035 $aPRUMB63229$9ExL 040 $aDip. di SSSC - Sociologia$bita 100 1 $aWhite, Kevin$0528132 245 14$aThe Sociology of Health and Illness /$cKevin White 260 $aLondon :$bSage,$c1991 300 $a134 p. ;$c21 cm. 490 0 $aCurrent sociology ;$v39 650 4$aSociologia$xStudi 907 $a.b11529052$b01-03-17$c01-07-02 912 $a991001548539707536 945 $aLE021 NGBISA36$g1$iLE021N-10525$lle021$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i11726064$z01-07-02 996 $aSociology of Health and Illness$9814971 997 $aUNISALENTO 998 $ale021$b01-01-93$cm$da $e-$feng$guk $h4$i1 LEADER 04898nam 22007575 450 001 9910427669803321 005 20251113175159.0 010 $a3-030-62576-1 024 7 $a10.1007/978-3-030-62576-4 035 $a(CKB)4100000011586092 035 $a(DE-He213)978-3-030-62576-4 035 $a(MiAaPQ)EBC6403601 035 $a(PPN)252506774 035 $a(EXLCZ)994100000011586092 100 $a20201029d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProvable and Practical Security $e14th International Conference, ProvSec 2020, Singapore, November 29 ? December 1, 2020, Proceedings /$fedited by Khoa Nguyen, Wenling Wu, Kwok Yan Lam, Huaxiong Wang 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XIII, 423 p. 123 illus., 14 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12505 311 08$a3-030-62575-3 327 $aSignature Schemes -- Group Signature without Random Oracles from Randomizable Signatures -- Constant-size Lattice-Based Group Signature with Forward Security in the Standard Model -- A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model -- Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers -- Short Lattice Signatures in the Standard Model with Efficient Tag Generation -- One-Time Delegation of Unlinkable Signing Rights and Its Application -- Watermarkable Signature with Computational Function Preserving -- Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments -- Encryption Schemes and NIZKs -- Semi-Adaptively Secure Offine Witness Encryption from Puncturable Witness PRF.-Improved Indistinguishability for Searchable Symmetric Encryption -- Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions -- A Practical NIZK Argument for Confidential Transactions over Account-model Blockchain -- Secure Machine Learning and Multiparty Computation -- Secure Cumulative Reward Maximization in Linear Stochastic Bandits -- Secure Transfer Learning for Machine Fault Diagnosis under Different Operating Conditions -- Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring -- Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses -- Secret Sharing Schemes -- Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles -- Optimal Threshold Changeable Secret Sharing with New Threshold Change Range -- Security Analyses -- Key Recovery under Plaintext Checking Attack on LAC -- Security of Two NIST Candidates in the Presence of Randomness Reuse. 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020. The 20 full papers presented were carefully reviewed and selected from 59 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: signature schemes, encryption schemes and NIZKS, secure machine learning and multiparty computation, secret sharing schemes, and security analyses. * The conference was held virtually due to the COVID-19 pandemic. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12505 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer engineering 606 $aComputer networks 606 $aData structures (Computer science) 606 $aInformation theory 606 $aSoftware engineering 606 $aComputers 606 $aCryptology 606 $aComputer Engineering and Networks 606 $aComputer Engineering and Networks 606 $aData Structures and Information Theory 606 $aSoftware Engineering 606 $aComputing Milieux 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aSoftware engineering. 615 0$aComputers. 615 14$aCryptology. 615 24$aComputer Engineering and Networks. 615 24$aComputer Engineering and Networks. 615 24$aData Structures and Information Theory. 615 24$aSoftware Engineering. 615 24$aComputing Milieux. 676 $a005.8 702 $aNguyen$b Khoa 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910427669803321 996 $aProvable and practical security$92113467 997 $aUNINA