LEADER 00865nam 2200253la 450 001 9910482937403321 005 20210618142927.0 035 $a(UK-CbPIL)2090325971 035 $a(CKB)5500000000106019 035 $a(EXLCZ)995500000000106019 100 $a20210618d1492 uy | 101 0 $alat 135 $aurcn||||a|bb| 200 10$aSpica. Versilogus sive De componendis versibus opusculum$b[electronic resource] 210 $aVenice $cGirolamo de' Paganini, 1492-1497$d1492 215 $aOnline resource (v.) 300 $aReproduction of original in Biblioteca Nazionale Centrale di Firenze. 700 $aMancinelli$b Antonio$f1452-approximately 1505.$0859553 801 0$bUk-CbPIL 801 1$bUk-CbPIL 906 $aBOOK 912 $a9910482937403321 996 $aSpica. Versilogus sive De componendis versibus opusculum$92249786 997 $aUNINA LEADER 05127nam 22007095 450 001 9910768472703321 005 20200629175104.0 010 $a3-540-49784-6 024 7 $a10.1007/BFb0055851 035 $a(CKB)1000000000210985 035 $a(SSID)ssj0000322140 035 $a(PQKBManifestationID)11247761 035 $a(PQKBTitleCode)TC0000322140 035 $a(PQKBWorkID)10282306 035 $a(PQKB)11691436 035 $a(DE-He213)978-3-540-49784-4 035 $a(PPN)155200720 035 $a(EXLCZ)991000000000210985 100 $a20121227d1998 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Security - ESORICS 98$b[electronic resource] $e5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings /$fedited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann 205 $a1st ed. 1998. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d1998. 215 $a1 online resource (X, 382 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1485 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-65004-0 327 $aFixed vs. variable-length patterns for detecting suspicious process behavior -- A tool for pro-active defense against the buffer overrun attack -- A kernelized architecture for multilevel secure application policies -- Dealing with multi-policy security in large open distributed systems -- A flexible method for information system security policy specification -- On the security of some variants of the RSA signature scheme -- Side channel cryptanalysis of product ciphers -- On the security of digital tachographs -- An authorization model and its formal semantics -- Authorization in CORBA security -- Rules for designing multilevel Object-Oriented Databases -- Byte code verification for Java smart cards based on model checking -- Towards formalizing the Java security architecture of JDK 1.2 -- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets -- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video -- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system -- The ?ticket? concept for copy control based on embedded signalling -- Panel session: Watermarking -- Authentication and payment in future mobile systems -- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks -- A mix-mediated anonymity service and its payment -- A subjective metric of authentication -- A sound logic for analysing electronic commerce protocols -- Kerberos Version IV: Inductive analysis of the secrecy goals. 330 $aThis book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998. The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1485 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aManagement information systems 606 $aComputer science 606 $aComputer networks 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aData encryption (Computer science) 615 0$aOperating systems (Computers) 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aOperating Systems. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aQuisquater$b Jean-Jacques$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeswarte$b Yves$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMeadows$b Catherine$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGollmann$b Dieter$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aEuropean Symposium on Research in Computer Security 906 $aBOOK 912 $a9910768472703321 996 $aComputer Security - ESORICS 98$92004615 997 $aUNINA