LEADER 00945nam 2200277la 450 001 9910482870503321 005 20221108010408.0 035 $a(UK-CbPIL)2090361615 035 $a(CKB)4940000000609257 035 $a(EXLCZ)994940000000609257 100 $a20210618d1548 uy | 101 0 $alat 135 $aurcn||||a|bb| 200 10$aDe meteoris, compendium, ex Aristotele, Plinio et Pontano / [Johann Lonitzer]$b[electronic resource] 210 $aFrankfurt am Main $cChristiani Egenolphi$d1548 215 $aOnline resource (40 leaves , (8vo)) 300 $aReproduction of original in The Wellcome Library, London. 700 $aLonicer$b Johann$f1499-1569.$0851468 701 $aAristotle$04207 701 $aPliny$b the Elder$0851469 801 0$bUk-CbPIL 801 1$bUk-CbPIL 906 $aBOOK 912 $a9910482870503321 996 $aDe meteoris, compendium, ex Aristotele, Plinio et Pontano$91901049 997 $aUNINA LEADER 01863nam 2200385 n 450 001 996386598003316 005 20221108035355.0 035 $a(CKB)1000000000614464 035 $a(EEBO)2240952342 035 $a(UnM)99870280 035 $a(EXLCZ)991000000000614464 100 $a19940823d1642 uh | 101 0 $aeng 135 $aurbn||||a|bb| 200 12$aA declaration of the Lords and Commons assembled in Parliament$b[electronic resource] $efor the protection of Sir George Chudleigh, Sir John Northcott, Sir Samuel Rolle, and Sir Nicholas Martyn, in the countie of Devon, who have lately beene proclaimed traytors by his Majestie 210 $a[London] $cDecemb. 21. London printed for Iohn Wright in the Old-Bayly$d1642 215 $a1 sheet ([1] p.) 300 $aMay also have been printed as part of: True newes from Devonshire and Cornwall. 300 $aPlace of publication from Wing (2nd ed.). 300 $a"Die Martis, 20 Decemb. 1642. It is further ordered by the Lords and Commons assembled in Parliament, that this declaration be forthwith printed, and published in all parish churches, and chappels, in the county of Devon, by the vicars, and curates thereof. Iohn Browne Cler. Parliament." 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 606 $aTreason$zGreat Britain$vEarly works to 1800 607 $aDevon (England)$xHistory$vEarly works to 1800 607 $aCornwall (England : County)$xHistory$vEarly works to 1800 607 $aGreat Britain$xHistory$yCivil War, 1642-1649$vEarly works to 1800 615 0$aTreason 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996386598003316 996 $aA declaration of the Lords and Commons assembled in Parliament$92297858 997 $aUNISA LEADER 04571nam 2200601Ia 450 001 9910484681403321 005 20200520144314.0 010 $a1-280-39056-5 010 $a9786613568489 010 $a3-642-17455-8 024 7 $a10.1007/978-3-642-17455-1 035 $a(CKB)2670000000056692 035 $a(SSID)ssj0000446678 035 $a(PQKBManifestationID)11298846 035 $a(PQKBTitleCode)TC0000446678 035 $a(PQKBWorkID)10496423 035 $a(PQKB)10474384 035 $a(DE-He213)978-3-642-17455-1 035 $a(MiAaPQ)EBC3066140 035 $a(PPN)149890621 035 $a(EXLCZ)992670000000056692 100 $a20101022d2010 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPairing-Based Cryptography--Pairing 2010 $e4th International Conference, Yamanaka Hot Spring, Japan, December 2010. proceedings /$fMarc Joye, Atsuko Miyaji, Akira Otsuka, (eds.) 205 $a1st ed. 2010. 210 $aBerlin ;$aNew York $cSpringer$d2010 215 $a1 online resource (XIII, 467 p. 37 illus.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v6487 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-17454-X 327 $aEfficient Software Implementation -- An Analysis of Affine Coordinates for Pairing Computation -- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto?Naehrig Curves -- Invited Talk 1 -- Some Security Topics with Possible Applications for Pairing-Based Cryptography -- Digital Signatures -- A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange -- Anonymizable Signature and Its Construction from Pairings -- Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches -- Cryptographic Protocols -- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication -- Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares -- Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability -- Key Agreement -- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange -- Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement -- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys -- Invited Talk 2 -- Pairing-Based Non-interactive Zero-Knowledge Proofs -- Applications: Code Generation, Time-Released Encryption, Cloud Computing -- Designing a Code Generator for Pairing Based Cryptographic Functions -- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability -- Optimal Authenticated Data Structures with Multilinear Forms -- Point Encoding and Pairing-Friendly Curves -- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves -- Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time -- A New Method for Constructing Pairing-Friendly Abelian Surfaces -- Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves -- ID-Based Encryption Schemes -- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks -- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts -- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman -- Invited Talk 3 -- A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties -- Efficient Hardware, FPGAs, and Algorithms -- Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves -- A Variant of Miller?s Formula and Algorithm -- Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree -- High Speed Flexible Pairing Cryptoprocessor on FPGA Platform. 410 0$aLecture notes in computer science ;$v6487. 517 3 $aPairing 2010 606 $aCryptography$vCongresses 606 $aComputer security$vCongresses 615 0$aCryptography 615 0$aComputer security 676 $a005.8/2 701 $aJoye$b Marc$01737373 701 $aMiyaji$b Atsuka$01762566 701 $aOtsuka$b Akira$01762567 712 12$aInternational Conference on Pairing-Based Cryptography 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484681403321 996 $aPairing-Based Cryptography--Pairing 2010$94202575 997 $aUNINA