LEADER 05130nam 22008655 450 001 996466369503316 005 20230412073533.0 010 $a1-280-94923-6 010 $a9786610949236 010 $a3-540-72738-8 024 7 $a10.1007/978-3-540-72738-5 035 $a(CKB)1000000000490320 035 $a(EBL)3061560 035 $a(SSID)ssj0000288988 035 $a(PQKBManifestationID)11222855 035 $a(PQKBTitleCode)TC0000288988 035 $a(PQKBWorkID)10401186 035 $a(PQKB)10922024 035 $a(DE-He213)978-3-540-72738-5 035 $a(MiAaPQ)EBC3061560 035 $a(MiAaPQ)EBC6386330 035 $a(PPN)123162645 035 $a(EXLCZ)991000000000490320 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aApplied Cryptography and Network Security$b[electronic resource] $e5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings /$fedited by Jonathan Katz, Moti Yung 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (508 p.) 225 1 $aSecurity and Cryptology ;$v4521 300 $aDescription based upon print version of record. 311 $a3-540-72737-X 320 $aIncludes bibliographical references and index. 327 $aSignature Schemes I -- Generic Transformation to Strongly Unforgeable Signatures -- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure -- Merkle Signatures with Virtually Unlimited Signature Capacity -- Computer and Network Security -- Midpoints Versus Endpoints: From Protocols to Firewalls -- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme -- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus -- Cryptanalysis -- Cryptanalysis of the TRMC-4 Public Key Cryptosystem -- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack -- A Timing Attack on Blakley?s Modular Multiplication Algorithm, and Applications to DSA -- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis -- Group-Oriented Security -- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity -- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme -- Bayesian Methods for Practical Traitor Tracing -- Cryptographic Protocols -- A New Protocol for Conditional Disclosure of Secrets and Its Applications -- An Unconditionally Secure Protocol for Multi-Party Set Intersection -- Privacy-Preserving Set Union -- Anonymous Authentication -- Universal Accumulators with Efficient Nonmembership Proofs -- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes -- Identity-Based Cryptography -- Identity-Based Proxy Re-encryption -- A More Natural Way to Construct Identity-Based Identification Schemes -- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions -- Certified E-Mail Protocol in the ID-Based Setting -- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks -- Efficient Content Authentication in Peer-to-Peer Networks -- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks -- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains -- BAP: Broadcast Authentication Using Cryptographic Puzzles -- Efficient Implementation -- Compressed XTR -- Sliding Window Method for NTRU -- Signature Schemes II -- Efficient Certificateless Signature Schemes -- Security Mediated Certificateless Signatures -- Gradually Convertible Undeniable Signatures. 410 0$aSecurity and Cryptology ;$v4521 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aApplication software 606 $aComputers and civilization 606 $aElectronic data processing?Management 606 $aComputer Communication Networks 606 $aCryptology 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aComputers and Society 606 $aIT Operations 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aApplication software. 615 0$aComputers and civilization. 615 0$aElectronic data processing?Management. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aComputers and Society. 615 24$aIT Operations. 676 $a005.8 702 $aYung$b Moti 702 $aKatz$b Jonathan$f1974- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466369503316 996 $aApplied Cryptography and Network Security$9771881 997 $aUNISA LEADER 03234nam 2200589Ia 450 001 9910784414003321 005 20230607221038.0 010 $a1-280-36471-8 010 $a9786610364718 010 $a0-471-43804-9 035 $a(CKB)1000000000355823 035 $a(EBL)141372 035 $a(OCoLC)70720642 035 $a(SSID)ssj0000312592 035 $a(PQKBManifestationID)11258994 035 $a(PQKBTitleCode)TC0000312592 035 $a(PQKBWorkID)10332151 035 $a(PQKB)10393934 035 $a(MiAaPQ)EBC141372 035 $a(Au-PeEL)EBL141372 035 $a(CaPaEBR)ebr10026394 035 $a(CaONFJC)MIL36471 035 $a(EXLCZ)991000000000355823 100 $a20000726d2001 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aValue investing in commodity futures$b[electronic resource] $ehow to profit with scale trading /$fHal Masover 210 $aNew York $cJohn Wiley$dc2001 215 $a1 online resource (224 p.) 225 1 $aWiley trading advantage 300 $aIncludes index. 311 $a0-471-34881-3 327 $aVALUE INVESTING IN COMMODITY FUTURES; FOREWORD; ACKNOWLEDGMENTS; CONTENTS; Introduction; PART I AN INTRODUCTION TO A BETTER METHOD OF TRADING; Chapter 1 Scale Trading: Elegance in Trading; Chapter 2 How to Know When to Start Scale Trading; Chapter 3 Why Is Scale Trading Better Than Other Types of Trading?; PART II LEARNING THE FUNDAMENTALS; Chapter 4 Fundamentals the Right Way; Chapter 5 Grain Market Fundamentals; Chapter 6 Livestock Market Fundamentals; Chapter 7 Metals Market Fundamentals; Chapter 8 Energy Market Fundamentals; Chapter 9 Softs Market Fundamentals 327 $aChapter 10 Using Seasonal Information the Right WayPART III SCALE TRADING IN ACTION; Chapter 11 How to Construct a Scale; Chapter 12 Taking Profits; Chapter 13 The Dreaded Contract Rollovers; Chapter 14 Options; Chapter 15 Don't Skip This Chapter: Choosing a Broker; Appendix I Getting a Handle on Commodity Futures: A Primer for Beginning Traders; Appendix II Other Possibly Profitable Methods; Appendix III How to Construct a Scale on Your Computer; Glossary; Index 330 $aThe only complete guide to an increasingly popular approach to futures trading This book outlines a highly successful alternative approach to trading commodity futures, specially tailored to today's low-priced commodities markets. Unlike technical analysis, which uses statistics to inform trading decisions, scale trading is a form of fundamental analysis in which a trader slowly buys prices as they reach bottom and sells them as they climb back up. Hal Masover describes scaling techniques that work in every commodity market, including metals, energies, utilities, and agriculture. And 410 0$aWiley trading advantage. 606 $aCommodity futures 606 $aFutures 615 0$aCommodity futures. 615 0$aFutures. 676 $a332.63/28 700 $aMasover$b Hal$01522416 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784414003321 996 $aValue investing in commodity futures$93762092 997 $aUNINA LEADER 01306cam0-2200457---450 001 990004091490403321 005 20241119101951.0 010 $a88-15-01796-8 035 $a000409149 035 $aFED01000409149 035 $a(Aleph)000409149FED01 035 $a000409149 100 $a19990604d1988----km-y0itay50------ba 101 1 $aita$cger 102 $aIT 105 $ay-------001yy 200 1 $a<>origini della scienza in Grecia$fKurt von Fritz 210 $aBologna$cil Mulino$d1988 215 $a340 p.$d21 cm 225 1 $aCollezione di testi e di studi$iStoria e critica della scienza 454 0$1001000446872 610 0 $aScienze$aAntichitą$aStoria 610 0 $aFilosofia greca 610 0 $aScienze$aGrecia antica 676 $a182 676 $a509.38 676 $a901.9 676 $a509.38 700 1$aFritz,$bKurt von$f<1900-1985>$055743 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a990004091490403321 952 $a114-E-45$b4528$fMA1 952 $a180 FRIK 001$bBIBL.5148$fFLFBC 952 $aP.1 A/FG 501 BIS$bBibl. 2015/649$fFLFBC 952 $aDDR-XXVIII B 001.21$b1221 ddr$fDDR$m21-9638 959 $aMA1 959 $aFLFBC 959 $aDDR 996 $aOrigini della scienza in Grecia$9813600 997 $aUNINA