LEADER 01115nam0-22003491i-450- 001 990000997430403321 005 20071015130351.0 010 $a3-540-08942-X 035 $a000099743 035 $aFED01000099743 035 $a(Aleph)000099743FED01 035 $a000099743 100 $a20001205d1978----km-y0itay50------ba 101 0 $aeng 200 1 $aStochastic Processes in Nonequilibrium Systems$eSitges International School of Statistical Mechanics, June 1978 Sitges, Barcelona, Spain$fEdited by L. Garrido, P. Seglar and P.J. Shepherd 210 $aBerlin [etc.]$cSpringer-Verlag$d1978 225 1 $aLecture notes in physics$v84$iMonographs 610 0 $aProbabilità 610 0 $aStatistica 676 $a519 700 1$aGarrido,$bL.$047094 701 1$aSeglar,$bP.$047095 701 1$aShepherd,$bJ.$0346326 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000997430403321 952 $a18-176$b11224$fFI1 952 $a10 B II 357$b9875$fDINEL 959 $aFI1 959 $aDINEL 996 $aStochastic Processes in Nonequilibrium Systems$9354307 997 $aUNINA LEADER 01803nam 2200397 n 450 001 996392063603316 005 20221108064556.0 035 $a(CKB)1000000000674850 035 $a(EEBO)2240870927 035 $a(UnM)9958347800971 035 $a(EXLCZ)991000000000674850 100 $a19940719d1645 uy 101 0 $aeng 135 $aurbn||||a|bb| 200 10$aIn the 150 page of the book called, An exact collection of the Parliaments remonstrances, declarations, &c. published by speciall order of the House of Commons, March 24. 1642. we find there a question answered fit for all men to take notice of in these times$b[electronic resource] 210 $a[London $cs.n.$d1645] 215 $a1 sheet ([1] p.) 300 $aAnonymous. By John Lilburne. 300 $aAnnotations on Thomason copy (669.f.10[33]): at head of title: "Lilburnes"; "London. 30 August 1645". 300 $aImprint from Wing. 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 606 $aPrerogative, Royal$zEngland$vEarly works to 1800 607 $aGreat Britain$xPolitics and government$y1642-1649$vEarly works to 1800 608 $aBroadsides$zEngland$y17th century.$2rbgenr 615 0$aPrerogative, Royal 700 $aLilburne$b John$f1614?-1657.$01001077 712 02$aEngland and Wales.$bParliament. 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bCu-RivES 906 $aBOOK 912 $a996392063603316 996 $aIn the 150 page of the book called, An exact collection of the Parliaments remonstrances, declarations, &c. published by speciall order of the House of Commons, March 24. 1642. we find there a question answered fit for all men to take notice of in these times$92339514 997 $aUNISA LEADER 03586nam 22008535 450 001 9910483462803321 005 20251113191157.0 010 $a3-319-12280-0 024 7 $a10.1007/978-3-319-12280-9 035 $a(CKB)3710000000269697 035 $a(SSID)ssj0001372580 035 $a(PQKBManifestationID)11780203 035 $a(PQKBTitleCode)TC0001372580 035 $a(PQKBWorkID)11305030 035 $a(PQKB)10912017 035 $a(DE-He213)978-3-319-12280-9 035 $a(MiAaPQ)EBC6298891 035 $a(MiAaPQ)EBC5587583 035 $a(Au-PeEL)EBL5587583 035 $a(OCoLC)894505177 035 $a(PPN)18209782X 035 $a(EXLCZ)993710000000269697 100 $a20141017d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptology and Network Security $e13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings /$fedited by Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XVI, 401 p. 52 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8813 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-12279-7 320 $aIncludes bibliographical references and index. 327 $aEncryption -- Cryptanalysis -- Malware analysis -- Privacy and identification systems -- Types of network protocol design -- Analysis work. 330 $aThis book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8813 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputer networks 606 $aCoding theory 606 $aInformation theory 606 $aElectronic data processing$xManagement 606 $aCryptology 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aCoding and Information Theory 606 $aIT Operations 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputer networks. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aElectronic data processing$xManagement. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aCoding and Information Theory. 615 24$aIT Operations. 676 $a005.82 702 $aGritzalis$b Dimitris$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKiayias$b Aggelos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAskoxylakis$b Ioannis$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483462803321 996 $aCryptology and Network Security$92968064 997 $aUNINA