LEADER 00976nam0-2200337---450- 001 990009411130403321 005 20110802162444.0 010 $a978-88-579-0015-5 035 $a000941113 035 $aFED01000941113 035 $a(Aleph)000941113FED01 035 $a000941113 100 $a20110802d2010----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $a--------001yy 200 1 $aCelle a combustibile$etecnologia e possibilità applicative$f[Marco Noro] 205 $a2 ed.. 210 $aPalermo$cDario Flaccovio$d2010 215 $a219 p.$cill$d24 cm 225 1 $aCollana AiCARR, cultura e tecnologia per energia uomo e ambiente$i2 610 0 $aEnergia elettrica$aProduzione 676 $a621.31242 700 1$aNoro,$bMarco$0304861 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990009411130403321 952 $a13 D 52 41$b17341$fFINBC 959 $aFINBC 996 $aCelle a combustibile$9709828 997 $aUNINA LEADER 00991nam0-2200313---450- 001 990009226390403321 005 20101013103835.0 035 $a000922639 035 $aFED01000922639 035 $a(Aleph)000922639FED01 035 $a000922639 100 $a20100922d1996----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------001yy 200 1 $aProdigi e cronaca religiosa$euno studio sulla storiografia latina arcaica$fLaura Sacchetti 210 $aRoma$c[s.n.]$d1996 215 $ap. 258$d24 cm 225 1 $aAtti dell'Accademia nazionale dei Lincei$iClasse di scienze morali, storiche e filologiche$iMemorie$v8 320 $aBibliografia: 253-255 321 0 $aIndice degli storici: p. 256-258 700 1$aSacchetti,$bLaura$0508647 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990009226390403321 952 $aArangio Ruiz 10$b2 Arangio Ruiz$fDDR 959 $aDDR 996 $aProdigi e cronaca religiosa$9776459 997 $aUNINA LEADER 03488nam 22007335 450 001 9910739422903321 005 20251226203139.0 010 $a3-642-36594-9 024 7 $a10.1007/978-3-642-36594-2 035 $a(CKB)3520000000003542 035 $a(SSID)ssj0000870849 035 $a(PQKBManifestationID)11499169 035 $a(PQKBTitleCode)TC0000870849 035 $a(PQKBWorkID)10820721 035 $a(PQKB)10308406 035 $a(DE-He213)978-3-642-36594-2 035 $a(MiAaPQ)EBC3093486 035 $a(PPN)168330261 035 $a(EXLCZ)993520000000003542 100 $a20130217d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTheory of Cryptography $e10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings /$fedited by Amit Sahai 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XII, 726 p. 34 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v7785 300 $aInternational conference proceedings. 311 08$a3-642-36593-0 320 $aIncludes bibliographical references and author index. 327 $aStudy of known paradigms -- Approaches, and techniques, directed towards their better understanding and utilization -- Discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones -- Formulation and treatment of new cryptographic problems -- Study of notions of security and relations among them -- Modeling and analysis of cryptographic algorithms -- Study of the complexity assumptions used in cryptography. 330 $aThis book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013. The 36 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers cover topics such as study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones; formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v7785 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputer science 606 $aAlgorithms 606 $aCryptology 606 $aData and Information Security 606 $aTheory of Computation 606 $aAlgorithms 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputer science. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aTheory of Computation. 615 24$aAlgorithms. 676 $a005.8/2 702 $aSahai$b Amit$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aTheory of Cryptography Conference. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910739422903321 996 $aTheory of Cryptography$93000229 997 $aUNINA