LEADER 01560nam 2200349Ka 450 001 9910696688103321 005 20080528172209.0 035 $a(CKB)5470000002379977 035 $a(OCoLC)229182694 035 $a(EXLCZ)995470000002379977 100 $a20080528d2008 ua 0 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aReview of the Interior Columbia River Technical Recovery Team's analyses of survival changes needed to meet viability criteria$b[electronic resource] /$fRichard Alldredge ... [and others] 210 1$aPortland, Or. :$cIndependent Scientific Advisory Board for the Northwest Power and Conservation Council, Columbia River Basin Indian Tribes, and National Marine Fisheries Service,$d[2008] 215 $a10 pages $cdigital, PDF file 225 1 $aISAB ;$v2008-1 300 $aTitle from title screen (viewed on May 28, 2008). 300 $a"March 7, 2008." 606 $aChinook salmon$xPopulation viability analysis$zColumbia River Watershed 606 $aSteelhead (Fish)$xPopulation viability analysis$zColumbia River Watershed 615 0$aChinook salmon$xPopulation viability analysis 615 0$aSteelhead (Fish)$xPopulation viability analysis 701 $aAlldredge$b Richard$01390576 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910696688103321 996 $aReview of the Interior Columbia River Technical Recovery Team's analyses of survival changes needed to meet viability criteria$93477665 997 $aUNINA LEADER 05033nam 22007335 450 001 9910484580203321 005 20251113182332.0 010 $a3-319-05302-7 024 7 $a10.1007/978-3-319-05302-8 035 $a(CKB)3710000000095012 035 $a(DE-He213)978-3-319-05302-8 035 $a(SSID)ssj0001187184 035 $a(PQKBManifestationID)11795387 035 $a(PQKBTitleCode)TC0001187184 035 $a(PQKBWorkID)11263292 035 $a(PQKB)10264466 035 $a(MiAaPQ)EBC3101173 035 $a(PPN)177824484 035 $a(EXLCZ)993710000000095012 100 $a20140320d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFoundations and Practice of Security $e6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers /$fedited by Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XIII, 444 p. 134 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8352 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-05301-9 327 $aOn the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case -- On the Feasibility of a Censorship Resistant Decentralized Naming System -- A General Framework for Group Authentication and Key Exchange Protocols -- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange -- Model-Based Specification and Validation of Security and Dependability Patterns -- Enforcing Information Flow by Combining Static and Dynamic Analysis -- Fault Injection to Reverse Engineer DES-like Cryptosystems -- Software Camouflage -- Investigation of Parameters Influencing the Success of Optical Fault Attacks -- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework -- Quantitative Evaluation of Enforcement Strategies -- Collusion Resistant Inference Control for Cadastral Databases -- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model -- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations -- Computational Soundness of Symbolic Blind Signatures under Active Attacker -- Improved Davies-Murphys Attack on DES Revisited -- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts -- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs -- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks -- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs -- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation -- Evaluation of Software-Oriented Block Ciphers on Smartphones -- Don?t Push it: Breaking iButton Security -- Discovering Flaws in IDS through Analysis of their Inputs -- On the Reverse Engineering of the Citadel Botnet -- The Carna Botnet Through the Lens of a Network Telescope. 330 $aThis book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of Security, FPS 2013, held in La Rochelle, France, in October 2013. The 25 revised full papers presented together with a keynote address were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on security protocols, formal methods, physical security, attack classification and assessment, access control, cipher attacks, ad-hoc and sensor networks, resilience and intrusion detection. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8352 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aCoding theory 606 $aInformation theory 606 $aCryptology 606 $aData and Information Security 606 $aCoding and Information Theory 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aCoding and Information Theory. 676 $a005.8 702 $aDanger$b Jean Luc$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDebbabi$b Mourad$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMarion$b Jean-Yves$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZincir Heywood$b Nur$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484580203321 996 $aFoundations and Practice of Security$94159644 997 $aUNINA