LEADER 02291oam 2200625zu 450 001 9910132523503321 005 20210803002559.0 010 $a9782336321141 010 $a2336321149 035 $a(CKB)3460000000133199 035 $a(SSID)ssj0001366906 035 $a(PQKBManifestationID)12587119 035 $a(PQKBTitleCode)TC0001366906 035 $a(PQKBWorkID)11426142 035 $a(PQKB)10727151 035 $a(MiAaPQ)EBC30609048 035 $a(Au-PeEL)EBL30609048 035 $a(FR-PaCSA)88842291 035 $a(FRCYB88842291)88842291 035 $a(OCoLC)1388492564 035 $a(Perlego)3116147 035 $a(EXLCZ)993460000000133199 100 $a20160829d2013 uy 101 0 $afre 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 10$a10 artistes sur le divan 205 $a1st ed. 210 31$a[Place of publication not identified]$cAcademia L'Harmattan$d2013 215 $a1 online resource (204 pages) 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9782806101150 311 08$a2806101158 330 8 $aDans cet ouvrage ine?dit, dix artistes de renomme?e internationale s'expriment sur le divan a? propos des quatre grandes e?nigmes de notre Humanite?: le pe?re - la femme - le sexe - la mort. Les se?ances ont e?te? transcrites sans aucune censure et un apport the?orique psychanalytique comple?te le propos. Voila? les ingre?dients qui font la richesse et l'originalite? de cet ouvrage. La? ou? l'inconscient se tait, les artistes peuvent-ils e?clairer la psychanalyse? 517 1 $aDix artistes sur le divan 606 $aArtists$xPsychology$vInterviews 606 $aArtists 606 $aPsychoanalysis and art 606 $aVisual Arts$2HILCC 606 $aArt, Architecture & Applied Arts$2HILCC 606 $aVisual Arts - General$2HILCC 615 0$aArtists$xPsychology 615 0$aArtists. 615 0$aPsychoanalysis and art. 615 7$aVisual Arts 615 7$aArt, Architecture & Applied Arts 615 7$aVisual Arts - General 700 $aGosselin$b Guidino$01244028 801 0$bPQKB 906 $aBOOK 912 $a9910132523503321 996 $a10 artistes sur le divan$92885662 997 $aUNINA LEADER 06345nam 22008535 450 001 9910483083703321 005 20251226200319.0 010 $a3-540-49610-6 024 7 $a10.1007/11937807 035 $a(CKB)1000000000283886 035 $a(SSID)ssj0000318275 035 $a(PQKBManifestationID)11249825 035 $a(PQKBTitleCode)TC0000318275 035 $a(PQKBWorkID)10310155 035 $a(PQKB)11601784 035 $a(DE-He213)978-3-540-49610-6 035 $a(MiAaPQ)EBC3068558 035 $a(PPN)123139783 035 $a(EXLCZ)991000000000283886 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Cryptology $eSecond SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings /$fedited by Helger Lipmaa, Moti Yung, Donghai Lin 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XII, 308 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4318 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-49608-4 320 $aIncludes bibliographical references and index. 327 $aDigital Signature Schemes -- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ?05 -- Identity-Based Key-Insulated Signature with Secure Key-Updates -- Efficient Intrusion-Resilient Signatures Without Random Oracles -- Sequences and Stream Ciphers -- New Constructions of Large Binary Sequences Family with Low Correlation -- On the Rate of Coincidence of Two Clock-Controlled Combiners -- Symmetric-Key Cryptography -- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining -- OPMAC: One-Key Poly1305 MAC -- A General Construction of Tweakable Block Ciphers and Different Modes of Operations -- Cryptographic Schemes -- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme -- Efficient Short Signcryption Scheme with Public Verifiability -- A Revocation Scheme Preserving Privacy -- Network Security -- Deterministic Packet Marking with Link Signatures for IP Traceback -- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System -- A Network Security Policy Model and Its Realization Mechanism -- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic -- Access Control -- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty -- Design and Implementation of Fast Access Control That Supports the Separation of Duty -- Computer and Applications Security -- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models -- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks -- Application and Evaluation of Bayesian Filter for Chinese Spam -- Web and Media Security -- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes.-An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses -- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes. 330 $aThe second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Software, the Chinese Academy of Sciences, the Graduate University of Chinese Academy of Sciences and the National Natural Science Foundations of China. The c- ference proceedings, with contributed papers, are published by Springer in this volume of Lecture Notes in Computer Science (LNCS). The research areas covered by Inscrypt have been gaining increased visibility recently since modern computing and communication infrastructures and app- cations require increased security, trust and safety. Indeed important fundam- tal, experimental and applied work has been done in wide areasof cryptography and information security research in recent years. Accordingly, the program of Inscrypt 2006 covered numerous ?elds of research within these areas. The International Program Committee of the conference received a total of 225 submissions, from which only 23 submissions were selected for presentation at the regular papers track and are part of this volume. In addition to this track, the conference also hosted a short paper track of 13 presentations that were carefully selected as well. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, technical remarks and strict selection criteria the papers were selected to the various tracks. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4318 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aComputer networks 606 $aAlgorithms 606 $aCryptology 606 $aData and Information Security 606 $aIT Operations 606 $aComputers and Society 606 $aComputer Communication Networks 606 $aAlgorithms 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 0$aComputer networks. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aIT Operations. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aAlgorithms. 676 $a005.8/2 701 $aLipmaa$b Helger$01758768 701 $aYung$b Moti$01071902 701 $aLin$b Dongdai$01751547 712 12$aInscrypt 2006 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483083703321 996 $aInformation security and cryptology$94197020 997 $aUNINA