LEADER 00764cam1 22002411 450 001 SOBE00016806 005 20110725114847.0 100 $a20110725g00009999|||||ita|0103 ba 101 $aita 102 $aIT 200 1 $a<>Odi di Pindaro$ftradotte ed illustrate da Antonio Mezzanotte 210 $aPisa$cpresso Niccolò Capurro co' caratteri di F. Didot 215 $av.$d22 cm 463 1$1001SOBE00016808$12000 $a3 / Pindaro 463 1$1001SOBE00016809$12000 $a4 / Pindaro 700 0$aPindarus$3A600200032789$4070$0152794 702 1$aMezzanotte, Antonio$3SOBA00000601$4070 801 0$aIT$bUNISOB$c20110725$gRICA 912 $aSOBE00016806 940 $aM 102 Monografia moderna SBN 941 $aM 996 $aOdi di Pindaro$91085568 997 $aUNISOB LEADER 01830oam 2200469 a 450 001 9910699028303321 005 20100114152625.0 035 $a(CKB)5470000002399605 035 $a(OCoLC)436878115 035 $a(EXLCZ)995470000002399605 100 $a20090916d2009 ua 0 101 0 $aeng 135 $aurbn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHearing on racial disproportionality in foster care$b[electronic resource] $ehearing before the Subcommittee on Income Security and Family Support of the Committee on Ways and Means, U.S. House of Representatives, One Hundred Tenth Congress, second session, July 31, 2008 210 1$aWashington :$cU.S. G.P.O.,$d2009. 215 $a1 online resource (iii, 126 pages) $cillustrations 300 $aTitle from title screen (viewed on Aug. 25, 2009). 300 $a"Serial no. 110-94." 320 $aIncludes bibliographical references. 517 $aHearing on racial disproportionality in foster care 606 $aFoster children$zUnited States 606 $aAfrican American children$zUnited States 606 $aFoster home care$zUnited States 606 $aSocial work with African American children 606 $aSocial work with minorities$zUnited States 606 $aSocial service and race relations$zUnited States 615 0$aFoster children 615 0$aAfrican American children 615 0$aFoster home care 615 0$aSocial work with African American children. 615 0$aSocial work with minorities 615 0$aSocial service and race relations 801 0$bGPO 801 1$bGPO 801 2$bGPO 906 $aBOOK 912 $a9910699028303321 996 $aHearing on racial disproportionality in foster care$93508870 997 $aUNINA LEADER 03990nam 2200613 a 450 001 9910483950503321 005 20200520144314.0 010 $a3-642-15317-8 024 7 $a10.1007/978-3-642-15317-4 035 $a(CKB)2670000000045050 035 $a(SSID)ssj0000446763 035 $a(PQKBManifestationID)11312217 035 $a(PQKBTitleCode)TC0000446763 035 $a(PQKBWorkID)10504672 035 $a(PQKB)10729923 035 $a(DE-He213)978-3-642-15317-4 035 $a(MiAaPQ)EBC3065872 035 $a(PPN)149025386 035 $a(EXLCZ)992670000000045050 100 $a20100715d2010 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity and cryptography for networks $e7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010 : proceedings /$fJuan A. Garay, Roberto De Prisco (eds.) 205 $a1st ed. 2010. 210 $aBerlin ;$aNew York $cSpringer$d2010 215 $a1 online resource (VII, 474 p. 54 illus.) 225 1 $aLNCS sublibrary. SL 4, Security and cryptology 225 1 $aLecture notes in computer science,$x0302-9743 ;$v6280 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-15316-X 320 $aIncludes bibliographical references and index. 327 $aEncryption I -- Time-Specific Encryption -- Public-Key Encryption with Efficient Amortized Updates -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor in Lattice-Based Cryptography -- Cryptanalysis -- Differential Fault Analysis of LEX -- Generalized RC4 Key Collisions and Hash Collisions -- Hash Functions -- On the Indifferentiability of the Grøstl Hash Function -- Side Channel Attacks and Leakage Resilience -- Algorithmic Tamper-Proof Security under Probing Attacks -- Leakage-Resilient Storage -- Encryption II -- Searching Keywords with Wildcards on Encrypted Data -- Threshold Attribute-Based Signcryption -- Cryptographic Protocols I -- Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption -- Improved Primitives for Secure Multiparty Integer Computation -- How to Pair with a Human -- Authentication and Key Agreement -- A New Security Model for Authenticated Key Agreement -- A Security Enhancement and Proof for Authentication and Key Agreement (AKA) -- Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model -- Cryptographic Primitives and Schemes -- Kleptography from Standard Assumptions and Applications -- Provably Secure Convertible Undeniable Signatures with Unambiguity -- History-Free Aggregate Message Authentication Codes -- Lattice-Based Cryptography -- Recursive Lattice Reduction -- Adaptively Secure Identity-Based Identification from Lattices without Random Oracles -- Groups Signatures and Authentication -- The Fiat?Shamir Transform for Group and Ring Signature Schemes -- Get Shorty via Group Signatures without Encryption -- Group Message Authentication -- Cryptographic Protocols II -- Fast Secure Computation of Set Intersection -- Distributed Private-Key Generators for Identity-Based Cryptography -- Anonymity -- Solving Revocation with Efficient Update of Anonymous Credentials. 410 0$aLNCS sublibrary.$nSL 4,$pSecurity and cryptology. 410 0$aLecture notes in computer science ;$v6280. 606 $aComputer networks$xSecurity measures$vCongresses 606 $aComputer security$vCongresses 606 $aCryptography$vCongresses 615 0$aComputer networks$xSecurity measures 615 0$aComputer security 615 0$aCryptography 676 $a005.8 701 $aGaray$b Juan A$01754850 701 $aDe Prisco$b Roberto$01754851 712 12$aSCN 2010 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483950503321 996 $aSecurity and cryptography for networks$94191361 997 $aUNINA