LEADER 01449nam 2200445 450 001 9910795482803321 005 20191228205202.0 010 $a1-63157-949-5 035 $a(CKB)4340000000238511 035 $a(Au-PeEL)EBL4935576 035 $a(CaPaEBR)ebr11420760 035 $a(OCoLC)1000453788 035 $a(CaSebORM)9781631579493 035 $a(MiAaPQ)EBC4935576 035 $a(EXLCZ)994340000000238511 100 $a20191228d2017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTips & tricks for Excel-based financial modeling$hVolume II $ea must for engineers & financial analysts /$fM. A. Mian 205 $aFirst edition. 210 1$aNew York, NY :$cBusiness Expert Press,$d2017. 215 $a1 online resource (1 volume) $cillustrations 225 1 $aFinance and Financial Management Collection 300 $aIncludes index. 311 $a1-63157-948-7 410 0$aFinance and financial management collection. 606 $aBusiness enterprises$xFinance$xData processing 615 0$aBusiness enterprises$xFinance$xData processing. 676 $a005.369 700 $aMian$b M. A.$01542186 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910795482803321 996 $aTips & tricks for Excel-based financial modeling$93794693 997 $aUNINA LEADER 05795nam 22009015 450 001 9910483047003321 005 20251226203942.0 010 $a1-280-94923-6 010 $a9786610949236 010 $a3-540-72738-8 024 7 $a10.1007/978-3-540-72738-5 035 $a(CKB)1000000000490320 035 $a(EBL)3061560 035 $a(SSID)ssj0000288988 035 $a(PQKBManifestationID)11222855 035 $a(PQKBTitleCode)TC0000288988 035 $a(PQKBWorkID)10401186 035 $a(PQKB)10922024 035 $a(DE-He213)978-3-540-72738-5 035 $a(MiAaPQ)EBC3061560 035 $a(MiAaPQ)EBC6386330 035 $a(PPN)123162645 035 $a(BIP)46094487 035 $a(BIP)14225129 035 $a(EXLCZ)991000000000490320 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aApplied Cryptography and Network Security $e5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings /$fedited by Jonathan Katz, Moti Yung 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (508 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4521 300 $aDescription based upon print version of record. 311 08$a3-540-72737-X 320 $aIncludes bibliographical references and index. 327 $aSignature Schemes I -- Generic Transformation to Strongly Unforgeable Signatures -- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure -- Merkle Signatures with Virtually Unlimited Signature Capacity -- Computer and Network Security -- Midpoints Versus Endpoints: From Protocols to Firewalls -- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme -- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus -- Cryptanalysis -- Cryptanalysis of the TRMC-4 Public Key Cryptosystem -- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack -- A Timing Attack on Blakley?s Modular Multiplication Algorithm, and Applications to DSA -- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis -- Group-Oriented Security -- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity -- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme -- Bayesian Methods for Practical Traitor Tracing -- Cryptographic Protocols -- A New Protocol for Conditional Disclosure of Secrets and Its Applications -- An Unconditionally Secure Protocol for Multi-Party Set Intersection -- Privacy-Preserving Set Union -- Anonymous Authentication -- Universal Accumulators with Efficient Nonmembership Proofs -- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes -- Identity-Based Cryptography -- Identity-Based Proxy Re-encryption -- A More Natural Way to Construct Identity-Based Identification Schemes -- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions -- Certified E-Mail Protocol in the ID-Based Setting -- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks -- Efficient Content Authentication in Peer-to-Peer Networks -- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks -- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains -- BAP: Broadcast Authentication Using Cryptographic Puzzles -- Efficient Implementation -- Compressed XTR -- Sliding Window Method for NTRU -- Signature Schemes II -- Efficient Certificateless Signature Schemes -- Security Mediated Certificateless Signatures -- Gradually Convertible Undeniable Signatures. 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, in June 2007. The 31 revised full papers presented were carefully reviewed and selected from around 260 submissions. The papers are organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented security, cryptographic protocols, anonymous authentication, identity-based cryptography, security in wireless, ad-hoc, and peer-to-peer networks, as well as efficient implementation. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4521 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aApplication software 606 $aComputers and civilization 606 $aElectronic data processing$xManagement 606 $aComputer Communication Networks 606 $aCryptology 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aComputers and Society 606 $aIT Operations 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aApplication software. 615 0$aComputers and civilization. 615 0$aElectronic data processing$xManagement. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aComputers and Society. 615 24$aIT Operations. 676 $a005.8 702 $aYung$b Moti 702 $aKatz$b Jonathan$f1974- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483047003321 996 $aApplied Cryptography and Network Security$9771881 997 $aUNINA