LEADER 01074nam0 22002891i 450 001 SUN0030849 005 20110405101046.504 010 $a04-15-08424-5 100 $a20041217d1993 |0engc50 ba 101 $aeng 102 $aGB 105 $a|||| ||||| 200 1 $aBasic mathematics for economists$fMike Rosser 210 $aLondon$aNew York$cRoutledge$d1993 215 $ax, 474 p.$d24 cm. 606 $aEconomia matematica$2FI$3SUNC005248 620 $aGB$dLondon$3SUNL000015 676 $a510.24339$v21 700 1$aRosser$b, M. J.$3SUNV025470$0728445 712 $aRoutledge$3SUNV000388$4650 790 1$aRosser, Mike$zRosser, M. J.$3SUNV025471 801 $aIT$bSOL$c20181109$gRICA 912 $aSUN0030849 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA$d00 CONS XX.Ca.14 $e00 21630 995 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA$h21630$kCONS XX.Ca.14$op$qa 996 $aBasic mathematics for economists$91430540 997 $aUNICAMPANIA LEADER 03810nam 22007815 450 001 996200343003316 005 20200703093919.0 010 $a3-662-46497-7 024 7 $a10.1007/978-3-662-46497-7 035 $a(CKB)3710000000379735 035 $a(SSID)ssj0001465757 035 $a(PQKBManifestationID)11917436 035 $a(PQKBTitleCode)TC0001465757 035 $a(PQKBWorkID)11478954 035 $a(PQKB)10138064 035 $a(DE-He213)978-3-662-46497-7 035 $a(MiAaPQ)EBC6283114 035 $a(MiAaPQ)EBC5590929 035 $a(Au-PeEL)EBL5590929 035 $a(OCoLC)1066185726 035 $a(PPN)184894824 035 $a(EXLCZ)993710000000379735 100 $a20150309d2015 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTheory of Cryptography$b[electronic resource] $e12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II /$fedited by Yevgeniy Dodis, Jesper Buus Nielsen 205 $a1st ed. 2015. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2015. 215 $a1 online resource (XX, 700 p. 67 illus.) 225 1 $aSecurity and Cryptology ;$v9015 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-662-46496-9 327 $aPseudorandom Functions and Applications -- Proofs and Verifiable Computation -- Differential Privacy -- Functional Encryption -- Obfuscation. 330 $aThe two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation. 410 0$aSecurity and Cryptology ;$v9015 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputers 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputation by Abstract Devices$3https://scigraph.springernature.com/ontologies/product-market-codes/I16013 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputers. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputation by Abstract Devices. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aDiscrete Mathematics in Computer Science. 676 $a001.5436 702 $aDodis$b Yevgeniy$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNielsen$b Jesper Buus$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996200343003316 996 $aTheory of Cryptography$9772206 997 $aUNISA LEADER 02446oam 2200601 450 001 9910717308403321 005 20210804093815.0 035 $a(CKB)4330000001829867 035 $a(OCoLC)682140058$z(OCoLC)631649430$z(OCoLC)667969086$z(OCoLC)984765711$z(OCoLC)1153329544 035 $a(OCoLC)994330000001829867 035 $a(EXLCZ)994330000001829867 100 $a20101117d1998 ua 0 101 0 $aeng 135 $aurbn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 13$aAn estimated potentiometric surface of the Death Valley region, Nevada and California, developed using geographic information system and automated interpolation techniques /$fby Frank A. D'Agnese, Claudia C. Faunt, and A. Keith Turner 210 1$aDenver, Colorado :$cU.S. Geological Survey,$d1998. 215 $a1 online resource (iii, 15 pages) $cillustrations, maps 225 1 $aWater-resources investigations report ;$v97-4052 300 $a"Prepared in cooperation with the Nevada Operations Office, U.S. Department of Energy, under Interagency Agreement DE-AI08-97NV12033." 320 $aIncludes bibliographical references (pages 13-15). 606 $aGroundwater$zDeath Valley (Calif. and Nev.) 606 $aWater table$zDeath Valley (Calif. and Nev.) 606 $aGeographic information systems$zDeath Valley (Calif. and Nev.) 606 $aGeographic information systems$2fast 606 $aGroundwater$2fast 606 $aWater table$2fast 607 $aUnited States$zDeath Valley$2fast 615 0$aGroundwater 615 0$aWater table 615 0$aGeographic information systems 615 7$aGeographic information systems. 615 7$aGroundwater. 615 7$aWater table. 700 $aD'Agnese$b Frank A.$01384547 702 $aFaunt$b Claudia C. 702 $aTurner$b A. Keith$f1941- 712 02$aGeological Survey (U.S.), 712 02$aUnited States.$bDepartment of Energy.$bNevada Operations Office. 801 0$bOCLCE 801 1$bOCLCE 801 2$bOCLCQ 801 2$bOCLCO 801 2$bOCLCF 801 2$bOCLCQ 801 2$bCOP 801 2$bGPO 906 $aBOOK 912 $a9910717308403321 996 $aAn estimated potentiometric surface of the Death Valley region, Nevada and California, developed using geographic information system and automated interpolation techniques$93476811 997 $aUNINA