LEADER 00838nam0-22002891i-450- 001 990003586790403321 005 20100630112422.0 035 $a000358679 035 $aFED01000358679 035 $a(Aleph)000358679FED01 035 $a000358679 100 $a20030910d1950----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $ay-------001yy 200 1 $aCapital imports and the american balance of payments 1934-39$fA.I. Bloomfield 210 $aChicago$cs.e.$d1950 700 1$aBloomfield,$bArthur Irving$0119631 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003586790403321 952 $aSE 018.03.03-$b03159$fDECSE 952 $aF1-F4.121$b174$fDECTS 959 $aDECSE 959 $aDECTS 996 $aCapital imports and the american balance of payments 1934-39$9493766 997 $aUNINA LEADER 06296nam 22008415 450 001 9910768186303321 005 20251116234346.0 010 $a3-540-39650-0 024 7 $a10.1007/b13237 035 $a(CKB)1000000000212171 035 $a(SSID)ssj0000322136 035 $a(PQKBManifestationID)11937853 035 $a(PQKBTitleCode)TC0000322136 035 $a(PQKBWorkID)10299213 035 $a(PQKB)10625663 035 $a(DE-He213)978-3-540-39650-5 035 $a(MiAaPQ)EBC3088681 035 $a(PPN)155192175 035 $a(EXLCZ)991000000000212171 100 $a20121227d2003 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Security - ESORICS 2003 $e8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings /$fedited by Einar Snekkenes, Dieter Gollmann 205 $a1st ed. 2003. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2003. 215 $a1 online resource (X, 350 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2808 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-20300-1 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aSignature and Access Control Policies for XML Documents -- Authorization and Access Control in Adaptive Workflows -- Flexible Regulation of Distributed Coalitions -- Initiator-Resilient Universally Composable Key Exchange -- Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing -- Precisely Answering Multi-dimensional Range Queries without Privacy Breaches -- Passive Attack Analysis for Connection-Based Anonymity Systems -- Rapid Mixing and Security of Chaum?s Visual Electronic Voting -- Towards Accountable Management of Privacy and Identity Information -- A Toolkit for Managing Enterprise Privacy Policies -- Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card -- Hardware Encapsulation of Security Services -- A Formal Security Model of the Infineon SLE 88 Smart Card Memory Management -- Bridging Model-Based and Language-Based Security -- An On-the-Fly Model-Checker for Security Protocol Analysis -- Symmetric Authentication within a Simulatable Cryptographic Library -- An Improved Reference Flow Control Model for Policy-Based Intrusion Detection -- Visualisation for Intrusion Detection -- On the Detection of Anomalous System Call Arguments. 330 $aESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer - curity in Europe. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together - searchersinthisarea,bypromotingtheexchangeofideaswithsystemdevelopers and by encouraging links with researchers in related areas. ESORICS is coordinated by an independent steering committee. In the past it took place every two years at various locations throughout Europe. Starting this year, it will take place annually. ESORICS 2003 was organized by Gjøvik University College, and took place in Gjøvik, Norway, October 13?15, 2003. The program committee received 114 submissions, originating from 26 co- tries on all continents. Half the papers originated in Europe (57). The most dominant countries were: UK (16), USA (14), Germany (6), South Korea (6), Sweden (6), Italy (5), France (4) and Poland (4). Each submission was reviewed by at least three program committee members or other experts. The program committee chair and co-chair were not allowed to submit papers. The ?nal sel- tion of papers was made at a program committee meeting followed by a week of e-mail discussions. Out of the 114 papers received, only 19 got accepted (17%). In comparison, ESORICS 2000and 2002received 75and 83papersand accepted 19% and 16%, respectively. The program re?ected the full range of security research, including access control, cryptographic protocols, privacy enhancing technologies, security m- els, authentication, and intrusion detection. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2808 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aOperating systems (Computers) 606 $aDatabase management 606 $aComputers and civilization 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aOperating systems (Computers) 615 0$aDatabase management. 615 0$aComputers and civilization. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aDatabase Management. 615 24$aComputers and Society. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aSnekkenes$b Einar$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGollmann$b Dieter$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aEuropean Symposium on Research in Computer Security. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910768186303321 996 $aComputer Security - ESORICS 2003$92179787 997 $aUNINA