LEADER 00973nam0-22003251--450- 001 990005979560403321 005 20060712122942.0 035 $a000597956 035 $aFED01000597956 035 $a(Aleph)000597956FED01 035 $a000597956 100 $a20000112g19611964km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay---n---001yy 200 1 $a<>attuazione del rapporto obbligatorio$eappunti delle lezioni$fUgo Natoli 210 $aMilano$cGiuffrè$d1961-1964 215 $a4 v. (238; 175; 313; 279 p.)$d22 cm 676 $a346.450 2$v19$zita 700 1$aNatoli,$bUgo$f<1915?1992> 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990005979560403321 952 $aVIII F 712 (1)$b74385$fFGBC 952 $aVIII F 712 (2)$b74385$fFGBC 952 $aVIII F 680 (3)$b70241$fFGBC 952 $aVIII F 680 (4)$b73456$fFGBC 959 $aFGBC 996 $aAttuazione del rapporto obbligatorio$9583211 997 $aUNINA LEADER 01142nam--2200373---450- 001 990002764330203316 005 20060621083555.0 010 $a88-7493-082-8 035 $a000276433 035 $aUSA01000276433 035 $a(ALEPH)000276433USA01 035 $a000276433 100 $a20060621d2006----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay|||z|||001yy 200 1 $a<>Italia del Colle$e1946-2006: sessant'anni di storia attraverso i dieci presidenti$fMarcello Staglieno$gprefazione di Giulio Andreotti 210 $aMilano$cBoroli$d2006 215 $a366 p.$d23 cm 225 2 $aStoria, storie, memorie 410 0$12001$aStoria, storie, memorie 607 $aItalia$xPresidenti$z1946-2006 607 $aItalia$xStoria$z1946-2006 676 $a945.0920922 700 1$aSTAGLIENO,$bMarcello$0136294 702 1$aANDREOTTI,$bGiulio 801 0$aIT$bsalbc$gISBD 912 $a990002764330203316 951 $aX.3.B. 255$b189796 L.M.$cX.3.$d00126835 959 $aBK 969 $aUMA 979 $aANNAMARIA$b90$c20060621$lUSA01$h0835 996 $aItalia del Colle$9997859 997 $aUNISA LEADER 05004nam 22009255 450 001 9910483850803321 005 20251226200334.0 010 $a3-540-76969-2 024 7 $a10.1007/978-3-540-76969-9 035 $a(CKB)1000000000490476 035 $a(SSID)ssj0000317075 035 $a(PQKBManifestationID)11246644 035 $a(PQKBTitleCode)TC0000317075 035 $a(PQKBWorkID)10287272 035 $a(PQKB)10893313 035 $a(DE-He213)978-3-540-76969-9 035 $a(MiAaPQ)EBC4975801 035 $a(MiAaPQ)EBC336929 035 $a(MiAaPQ)EBC6698741 035 $a(Au-PeEL)EBL336929 035 $a(OCoLC)191471550 035 $a(Au-PeEL)EBL6698741 035 $a(PPN)123729173 035 $a(MiAaPQ)EBC5595530 035 $a(EXLCZ)991000000000490476 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptology and Network Security $e6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings /$fedited by Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XII, 286 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4856 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-76968-4 320 $aIncludes bibliographical references and index. 327 $aSignatures -- Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles -- A Generic Construction for Universally-Convertible Undeniable Signatures -- Fast Digital Signature Algorithm Based on Subgraph Isomorphism -- Efficient ID-Based Digital Signatures with Message Recovery -- Network Security -- Achieving Mobility and Anonymity in IP-Based Networks -- Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary -- Forward-Secure Key Evolution in Wireless Sensor Networks -- A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations -- An Intelligent Network-Warning Model with Strong Survivability -- Running on Karma ? P2P Reputation and Currency Systems -- Secure Keyword Search and Private Information Retrieval -- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption -- Extended Private Information Retrieval and Its Application in Biometrics Authentications -- Public Key Encryption -- Strongly Secure Certificateless Public Key Encryption Without Pairing -- Intrusion Detection -- Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems -- Email Security -- How to Secure Your Email Address Book and Beyond -- Denial of Service Attacks -- Toward Non-parallelizable Client Puzzles -- Authentication -- Anonymity 2.0 ? X.509 Extensions Supporting Privacy-Friendly Authentication. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. The 17 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4856 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aCryptology 606 $aData and Information Security 606 $aIT Operations 606 $aComputers and Society 606 $aAlgorithms 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 0$aAlgorithms. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aData and Information Security. 615 24$aIT Operations. 615 24$aComputers and Society. 615 24$aAlgorithms. 676 $a005.8 686 $aDAT 461f$2stub 702 $aBao$b Feng$cDr, 712 02$aInternational Association for Cryptologic Research. 712 12$aInternational Conference on Cryptology and Network Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483850803321 996 $aCryptology and Network Security$92968064 997 $aUNINA