LEADER 01507nam 2200517 a 450 001 9910782745403321 005 20230721004542.0 010 $a0-8018-9220-1 010 $a1-4356-9259-4 035 $a(CKB)1000000000705367 035 $a(OCoLC)646769600 035 $a(CaPaEBR)ebrary10256386 035 $a(SSID)ssj0000109679 035 $a(PQKBManifestationID)11127711 035 $a(PQKBTitleCode)TC0000109679 035 $a(PQKBWorkID)10058828 035 $a(PQKB)10560388 035 $a(MiAaPQ)EBC3318383 035 $a(Au-PeEL)EBL3318383 035 $a(CaPaEBR)ebr10256386 035 $a(OCoLC)923193121 035 $a(EXLCZ)991000000000705367 100 $a20060717d2007 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe bees of the world$b[electronic resource] /$fCharles D. Michener 205 $a2nd ed. 210 $aBaltimore $cJohns Hopkins University Press$d2007 215 $a1 online resource (972 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-8018-8573-6 320 $aIncludes bibliographical references (p. 833-904) and indexes. 606 $aBees$vClassification 615 0$aBees 676 $a595.79/9 700 $aMichener$b Charles Duncan$f1918-$086177 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910782745403321 996 $aBees of the world$9807735 997 $aUNINA LEADER 04290nam 22007935 450 001 9910508446903321 005 20251225173422.0 010 $a3-030-90428-8 024 7 $a10.1007/978-3-030-90428-9 035 $a(CKB)5470000001298861 035 $a(MiAaPQ)EBC6796429 035 $a(Au-PeEL)EBL6796429 035 $a(OCoLC)1282005124 035 $a(PPN)258297697 035 $a(BIP)82061436 035 $a(BIP)81776457 035 $a(DE-He213)978-3-030-90428-9 035 $a(EXLCZ)995470000001298861 100 $a20211030d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aE-Business and Telecommunications $e17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8?10, 2020, Revised Selected Papers /$fedited by Mohammad S. Obaidat, Jalel Ben-Othman 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (243 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1484 311 08$a3-030-90427-X 327 $aAn Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems -- Security and Complexity of a New Variant of the McEliece Cryptosystem using Non-linear Convolutional Codes -- A Secure Distributed Hash-Based Encryption suited for Big Data Systems -- An Assurance Framework and Process for Hybrid Systems -- PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE -- Practically Efficient Attribute-based Encryption for Compartmented and Multilevel Access Structures -- Analysis of In-place Randomized Bit-flipping Decoders for the Design of LDPC and MDPC Code-based Cryptosystems -- Business Analyst Tasks for Requirement Elicitation -- Chained Transaction Protocol Automated Verification using Cl-AtSe -- Overall Feasibility of RF Energy Harvesting for IoT. 330 $aThe present book includes extended and revised versions of a set of selected papers presented at the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020, held as an online web-based event (due to the COVID-19 pandemic) in July 2020. ICETE 2020 is a joint conference aimed at bringing together researchers, engineers and practitioners interested in information and communication technologies, including data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, and wireless networks and mobile systems.The 10 full papers included in the volume were carefully selected from the 30 submissions accepted to participate in the conference. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1484 606 $aComputer networks 606 $aApplication software 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer systems 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aData and Information Security 606 $aMobile and Network Security 606 $aCryptology 606 $aComputer System Implementation 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer systems. 615 14$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aData and Information Security. 615 24$aMobile and Network Security. 615 24$aCryptology. 615 24$aComputer System Implementation. 676 $a621.382 702 $aObaidat$b Mohammad S. 702 $aBen-Othman$b Jalel 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910508446903321 996 $aE-Business and Telecommunications$91961627 997 $aUNINA