LEADER 01279cam0-22004571i-450- 001 990006116770403321 005 20140328111701.0 010 $a88-02-04655-7 035 $a000611677 035 $aFED01000611677 035 $a(Aleph)000611677FED01 035 $a000611677 100 $a20000112d1993----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------001yy 200 1 $a<>imposta di successione$ecommento aggiornato alla L. 30-12-1991, n. 413$fGianfranco Gallo-Orsi, Maurizio Gallo-Orsi 210 $aTorino$cUTET$d1993 215 $aXVI, 475 p.$d25 cm 225 1 $a<>vita del diritto$v5 300 $aIn appendice: testi di legge 676 $a343.0532 676 $a343.04 676 $a346.05 700 1$aGallo-Orsi,$bGianfranco$039843 701 1$aGallo-Orsi,$bMaurizio$0420220 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006116770403321 952 $aDI V-947$b12919$fDEC 952 $aDT V/77$b12919$fDEC 952 $aCOLLEZ. 454 (5)$b21009$fFGBC 952 $aH-106$b3454 dip.$fDDRC 952 $a18-A-150$b5210$fDDCP 959 $aDEC 959 $aDEC 959 $aFGBC 959 $aDDRC 959 $aDDCP 996 $aImposta di successione$9575475 997 $aUNINA LEADER 05823nam 22009255 450 001 9910484083503321 005 20251226203533.0 010 $a3-540-73458-9 024 7 $a10.1007/978-3-540-73458-1 035 $a(CKB)1000000000490678 035 $a(SSID)ssj0000318277 035 $a(PQKBManifestationID)11283550 035 $a(PQKBTitleCode)TC0000318277 035 $a(PQKBWorkID)10310321 035 $a(PQKB)11047590 035 $a(DE-He213)978-3-540-73458-1 035 $a(MiAaPQ)EBC3061535 035 $a(MiAaPQ)EBC6511674 035 $a(Au-PeEL)EBL6511674 035 $a(OCoLC)191469965 035 $a(PPN)123728282 035 $a(BIP)34164904 035 $a(BIP)14225593 035 $a(EXLCZ)991000000000490678 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Privacy $e12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings /$fedited by Josef Pieprzyk, Hossein Ghodosi, Ed Dawson 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XIV, 476 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4586 300 $aIncludes index. 311 08$a3-540-73457-0 320 $aIncludes bibliographical references and index. 327 $aStream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks -- Strengthening NLS Against Crossword Puzzle Attack -- Hashing -- A New Strategy for Finding a Differential Path of SHA-1 -- Preimage Attack on the Parallel FFT-Hashing Function -- Second Preimages for Iterated Hash Functions and Their Implications on MACs -- On Building Hash Functions from Multivariate Quadratic Equations -- Biometrics -- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication -- Soft Generation of Secure Biometric Keys -- Secret Sharing -- Flaws in Some Secret Sharing Schemes Against Cheating -- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters -- Cryptanalysis -- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128 -- Analysis of the SMS4 Block Cipher -- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme -- Public Key Cryptography -- : A Hardware-Oriented Trapdoor Cipher -- Anonymity on Paillier?s Trap-Door Permutation -- Generic Certificateless Key Encapsulation Mechanism -- Double-Size Bipartite Modular Multiplication -- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography -- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM -- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards -- Authentication -- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication -- Certificateless Signature Revisited -- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures -- Hash-and-Sign with Weak Hashing Made Secure -- ?Sandwich?Is Indeed Secure: How to Authenticate a Message with Just One Hashing -- Threshold Anonymous Group Identification and Zero-Knowledge Proof -- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions -- E-Commerce -- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users -- Efficient and Secure Comparison for On-Line Auctions -- Practical Compact E-Cash -- Security -- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks -- On Proactive Perfectly Secure Message Transmission. 330 $aHere is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4586 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aData protection 606 $aComputer networks 606 $aCoding theory 606 $aInformation theory 606 $aAlgorithms 606 $aCryptology 606 $aIT Operations 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aCoding and Information Theory 606 $aAlgorithms 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 0$aData protection. 615 0$aComputer networks. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aIT Operations. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aCoding and Information Theory. 615 24$aAlgorithms. 676 $a005.8 702 $aGhodosi$b Hossein 702 $aDawson$b Ed 702 $aPieprzyk$b Josef$f1949- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484083503321 996 $aInformation Security and Privacy$93395200 997 $aUNINA