LEADER 01739nam 2200421 a 450 001 9910695341603321 005 20061016114158.0 035 $a(CKB)5470000002369335 035 $a(OCoLC)73173123 035 $a(EXLCZ)995470000002369335 100 $a20061016d2006 ua 0 101 0 $aeng 135 $aurmn|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPersonal information$b[electronic resource] $ekey federal privacy laws do not require information resellers to safeguard all sensitive data : report to the Committee on Banking, Housing and Urban Affairs, U.S. Senate 210 1$a[Washington, D.C.] :$cU.S. Government Accountability Office,$d[2006] 215 $aii, 70 pages $cdigital, PDF file 300 $aTitle from title screen (viewed on Oct. 11, 2006). 300 $a"June 2006." 300 $aPaper version available from: U.S. Government Accountability Office, 441 G St., NW, Rm. LM, Washington, D.C. 20548. 300 $a"GAO-06-674." 320 $aIncludes bibliographical references. 517 $aPersonal information 606 $aFinancial institutions$xLaw and legislation$zUnited States 606 $aData protection$xLaw and legislation$zUnited States 606 $aInformation services$zUnited States$xManagement 615 0$aFinancial institutions$xLaw and legislation 615 0$aData protection$xLaw and legislation 615 0$aInformation services$xManagement. 712 02$aUnited States.$bCongress.$bSenate.$bCommittee on Banking, Housing, and Urban Affairs. 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910695341603321 996 $aPersonal information$93422555 997 $aUNINA LEADER 02906oam 2200601I 450 001 9910788154203321 005 20231012141126.0 010 $a0-262-32885-2 010 $a0-262-32884-4 035 $a(CKB)2670000000602605 035 $a(SSID)ssj0001483423 035 $a(PQKBManifestationID)11892469 035 $a(PQKBTitleCode)TC0001483423 035 $a(PQKBWorkID)11429239 035 $a(PQKB)10584978 035 $a(MiAaPQ)EBC3339962 035 $a(OCoLC)905544147$z(OCoLC)905690182$z(OCoLC)908041036$z(OCoLC)912231397$z(OCoLC)983985378$z(OCoLC)984248054$z(OCoLC)993689308$z(OCoLC)994395351$z(OCoLC)1010998500$z(OCoLC)1055368436$z(OCoLC)1066587641$z(OCoLC)1081237765 035 $a(OCoLC-P)905544147 035 $a(MaCbMITP)10096 035 $a(Au-PeEL)EBL3339962 035 $a(CaPaEBR)ebr11035900 035 $a(CaONFJC)MIL752808 035 $a(OCoLC)905544147 035 $a(EXLCZ)992670000000602605 100 $a20150324d2015 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aFrame innovation $ecreate new thinking by design /$fKees Dorst 210 1$aCambridge, Massachusetts ;$aLondon, England :$cThe MIT Press,$d[2015] 210 4$dİ2015 215 $a1 online resource (221 pages) $cillustrations 225 1 $aDesign thinking, design theory 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a1-336-21522-4 311 $a0-262-32431-8 320 $aIncludes bibliographical references and index. 330 $aDorst describes a new, innovation-centered approach to problem-solving in organizations: frame creation. It applies "design thinking," but it goes beyond the borrowed tricks and techniques that usually characterize that term. The strategies presented are drawn from the unique, sophisticated, multilayered practices of top designers, and from insights that have emerged from fifty years of design research. He describes the nine steps of the frame creation process and illustrates their application to real-world problems with a series of varied case studies. He maps innovative solutions that include rethinking a store layout so retail spaces encourage purchasing rather than stealing, applying the frame of a music festival to understand late-night problems of crime and congestion in a club district, and creative ways to attract young employees to a temporary staffing agency. --$cEdited summary from book. 410 0$aDesign thinking, design theory. 606 $aIndustrial design$xMethodology 610 $aDESIGN/Design Theory 610 $aDESIGN/General 615 0$aIndustrial design$xMethodology. 676 $a745.2 700 $aDorst$b Kees$01489077 801 0$bOCoLC-P 801 1$bOCoLC-P 906 $aBOOK 912 $a9910788154203321 996 $aFrame innovation$93709589 997 $aUNINA LEADER 05403nam 22009015 450 001 9910484591603321 005 20251226202747.0 010 $a3-642-02384-3 024 7 $a10.1007/978-3-642-02384-2 035 $a(CKB)1000000000753987 035 $a(SSID)ssj0000319620 035 $a(PQKBManifestationID)11242945 035 $a(PQKBTitleCode)TC0000319620 035 $a(PQKBWorkID)10338723 035 $a(PQKB)10219975 035 $a(DE-He213)978-3-642-02384-2 035 $a(MiAaPQ)EBC3064322 035 $a(PPN)136306772 035 $a(EXLCZ)991000000000753987 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProgress in Cryptology -- AFRICACRYPT 2009 $eSecond International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009, Proceedings /$fedited by Bart Preneel 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XI, 435 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5580 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-02383-5 320 $aIncludes bibliographical references and author index. 327 $aHash Functions -- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL -- Cryptanalysis of Vortex -- Two Passes of Tiger Are Not One-Way -- Block Ciphers -- Generic Attacks on Feistel Networks with Internal Permutations -- Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks -- Asymmetric Encryption -- Reducing Key Length of the McEliece Cryptosystem -- Cryptanalysis of RSA Using the Ratio of the Primes -- Digital Signatures -- New RSA-Based (Selectively) Convertible Undeniable Signature Schemes -- A Schnorr-Like Lightweight Identity-Based Signature Scheme -- On the Theoretical Gap between Group Signatures with and without Unlinkability -- Practical Threshold Signatures with Linear Secret Sharing Schemes -- Asymmetric Encryption and Anonymity -- Certified Encryption Revisited -- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems -- Anonymity from Public Key Encryption to Undeniable Signatures -- Key Agreement Protocols -- Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps -- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness -- Cryptographic Protocols -- Unifying Zero-Knowledge Proofs of Knowledge -- Co-sound Zero-Knowledge with Public Keys -- Another Look at Extended Private Information Retrieval Protocols -- Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions -- Efficient Implementations -- Exponent Recoding and Regular Exponentiation Algorithms -- Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware -- Fast Elliptic-Curve Cryptography on the Cell Broadband Engine -- On Modular Decomposition of Integers -- Implementation Attacks -- Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed -- An Improved Fault Based Attack of the Advanced Encryption Standard. 330 $aThis book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009. The 25 papers presented together with one invited talk were carefully reviewed and selected from 70 submissions. The topics covered are hash functions, block ciphers, asymmetric encryption, digital signatures, asymmetric encryption and anonymity, key agreement protocols, cryptographic protocols, efficient implementations, and implementation attacks. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5580 606 $aCryptography 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aComputer networks 606 $aData protection 606 $aAlgorithms 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCryptology 606 $aCoding and Information Theory 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aAlgorithms 606 $aDiscrete Mathematics in Computer Science 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer networks. 615 0$aData protection. 615 0$aAlgorithms. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCryptology. 615 24$aCoding and Information Theory. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 701 $aVaudenay$b Serge$01752349 712 12$aInternational Conference on Cryptology in Africa. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484591603321 996 $aProgress in Cryptology -- AFRICACRYPT 2009$94521223 997 $aUNINA