LEADER 01381nam0 2200337 i 450 001 SUN0126014 005 20200417122334.538 010 $d0.00 017 70$2N$a9783030105730 100 $a20200107d2019 |0engc50 ba 101 $aeng 102 $aCH 105 $a|||| ||||| 200 1 $a*Porcelain to Silica Bricks$eThe Extreme Ceramics of William Weston Young (1776-1847)$fHowell G. M. Edwards 205 $aCham : Springer, 2019 210 $aXVIII$d200 p.$cill. ; 24 cm 215 $aPubblicazione in formato elettronico 620 $aCH$dCham$3SUNL001889 676 $a543.65$cSpettrometria di massa. Spettroscopia di massa$v22 676 $a502.82$cMicroscopia$v22 676 $a620.1$cScienza dei materiali$v22 676 $a620.14$cCeramica e materiali affini$v22 700 1$aEdwards$b, Howell G. M.$3SUNV097433$0767418 712 $aSpringer$3SUNV000178$4650 790 1$aEdwards, H. G. M.$zEdwards, Howell G. M.$3SUNV103821 801 $aIT$bSOL$c20200921$gRICA 856 4 $uhttps://link.springer.com/book/10.1007%2F978-3-030-10573-0#toc 912 $aSUN0126014 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI SCIENZE E TECNOLOGIE AMBIENTALI BIOLOGICHE E FARMACEUTICHE$d17CONS e-book 2113 $e17BIB2113 49 20200107 996 $aPorcelain to Silica Bricks$91737600 997 $aUNICAMPANIA LEADER 03516nam 22007935 450 001 9910483621203321 005 20251226195928.0 010 $a3-319-39555-6 024 7 $a10.1007/978-3-319-39555-5 035 $a(CKB)3710000000734799 035 $a(DE-He213)978-3-319-39555-5 035 $a(MiAaPQ)EBC6306808 035 $a(MiAaPQ)EBC5595650 035 $a(Au-PeEL)EBL5595650 035 $a(OCoLC)951807257 035 $a(PPN)194378349 035 $a(EXLCZ)993710000000734799 100 $a20160608d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security $e14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings /$fedited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XIV, 668 p. 110 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9696 311 08$a3-319-39554-8 327 $aAuthentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use. 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. . 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9696 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aElectronic data processing$xManagement 606 $aComputer science 606 $aComputers and civilization 606 $aData and Information Security 606 $aCryptology 606 $aComputer Communication Networks 606 $aIT Operations 606 $aTheory of Computation 606 $aComputers and Society 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aElectronic data processing$xManagement. 615 0$aComputer science. 615 0$aComputers and civilization. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aIT Operations. 615 24$aTheory of Computation. 615 24$aComputers and Society. 676 $a005.82 702 $aManulis$b Mark$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSadeghi$b Ahmad-Reza$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSchneider$b Steve$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483621203321 996 $aApplied Cryptography and Network Security$9771881 997 $aUNINA