LEADER 01289nam0-2200385---450- 001 990000830490203316 005 20100820135532.0 010 $a88-14-06067-3 035 $a0083049 035 $aUSA010083049 035 $a(ALEPH)000083049USA01 035 $a0083049 100 $a20020102d1997----y0itay0103 ba 101 $aita 102 $aIT 105 $a00||| 200 1 $a<> paternità delle scritture$esottoscrizione e forme equivalenti$fMauro Orlandi 210 $aMilano$cA. Giuffrè$d1997 215 $aVIII, 505 p.$d24 cm 225 2 $aStudi di diritto civile$fUniversità di Roma, Facoltà di giurisprudenza$v43. 410 0$12001$aStudi di diritto civile$fUniversità di Roma, Facoltà di giurisprudenza$v43 606 $aScritture private$xSottoscrizione 676 $a346.4502 700 1$aORLANDI,$bMauro$0233372 801 0$aIT$bsalbc$gISBD 912 $a990000830490203316 951 $aXXV.1. Coll. 44/ 34 (X 20 XIII 43)$b14265 G$cXXV.1. Coll. 44/ 34 (X 20)$d00287311 959 $aBK 969 $aGIU 979 $aPATTY$b90$c20020102$lUSA01$h1448 979 $c20020403$lUSA01$h1729 979 $aPATRY$b90$c20040406$lUSA01$h1657 979 $aRSIAV4$b90$c20100820$lUSA01$h1355 996 $aPaternita' delle scritture$9666419 997 $aUNISA LEADER 05417nam 22008055 450 001 996466239003316 005 20220929212731.0 010 $a3-540-49463-4 024 7 $a10.1007/11935070 035 $a(CKB)1000000000283794 035 $a(SSID)ssj0000317078 035 $a(PQKBManifestationID)11247710 035 $a(PQKBTitleCode)TC0000317078 035 $a(PQKBWorkID)10287015 035 $a(PQKB)11424913 035 $a(DE-He213)978-3-540-49463-8 035 $a(MiAaPQ)EBC3068476 035 $a(PPN)123139740 035 $a(EXLCZ)991000000000283794 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptology and Network Security$b[electronic resource] $e5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings /$fedited by David Pointcheval, Yi Mu, Kefei Chen 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XIII, 384 p.) 225 1 $aSecurity and Cryptology ;$v4301 300 $aInternational conference proceedings. 311 $a3-540-49462-6 320 $aIncludes bibliographical references and index. 327 $aEncryption -- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems -- Efficient Identity-Based Encryption with Tight Security Reduction -- Key Exchange -- A Diffie-Hellman Key Exchange Protocol Without Random Oracles -- Authenticated Group Key Agreement for Multicast -- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks -- Authentication and Signatures -- Efficient Mutual Data Authentication Using Manually Authenticated Strings -- Achieving Multicast Stream Authentication Using MDS Codes -- Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps -- Proxy Signatures -- Security Model of Proxy-Multi Signature Schemes -- Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque -- Cryptanalysis -- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields -- Improved Collision Attack on Reduced Round Camellia -- Stealing Secrets with SSL/TLS and SSH ? Kleptographic Attacks -- Implementation -- Bitslice Implementation of AES -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3) -- Steganalysis and Watermarking -- Steganalysis Based on Differential Statistics -- Watermarking Essential Data Structures for Copyright Protection -- Boolean Functions and Stream Ciphers -- A Note of Perfect Nonlinear Functions -- Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing -- Intrusion Detection -- Cooperative Intrusion Detection for Web Applications -- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis -- Smart Architecture for High-Speed Intrusion Detection and Prevention Systems -- A Multi-agent Cooperative Model and System for Integrated Security Monitoring -- Disponibility and Reliability -- Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network -- An Immune-Based Model for Service Survivability -- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. 410 0$aSecurity and Cryptology ;$v4301 606 $aData encryption (Computer science) 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aComputer communication systems 606 $aAlgorithms 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.8 702 $aPointcheval$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMu$b Yi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChen$b Kefei$f1959-$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference on Cryptology and Network Security 906 $aBOOK 912 $a996466239003316 996 $aCryptology and Network Security$9772198 997 $aUNISA LEADER 03184nam 2200493 450 001 9910823446603321 005 20230810001327.0 024 7 $a10.1163/9789004331563 035 $a(CKB)3710000000951469 035 $a(MiAaPQ)EBC4750774 035 $a(OCoLC)965788881 035 $a(nllekb)BRILL9789004331563 035 $a(EXLCZ)993710000000951469 100 $a20161209h20172017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aSmall countries in a big power world $ethe Belgian-Dutch conflict at Versailles, 1919 /$fby Hubert P. van Tuyll van Serooskerken 210 1$aLeiden, The Netherlands ;$aBoston, [Massachusetts] :$cBrill,$d2017. 210 4$d©2017 215 $a1 online resource (268 pages) $cillustrations (some color), maps, tables 225 1 $aHistory of Warfare,$x1385-7827 ;$vVolume 113 311 $a90-04-31469-5 311 $a90-04-33156-5 320 $aIncludes bibliographical references and index. 327 $tPreliminary Material /$rHubert P. van Tuyll van Serooskerken -- $t1 Far Away Neighbors /$rHubert P. van Tuyll van Serooskerken -- $t2 A Nation and an Idea /$rHubert P. van Tuyll van Serooskerken -- $t3 The Low Countries and the Great War to 1916 /$rHubert P. van Tuyll van Serooskerken -- $t4 The Low Countries and the Great War, 1916?1918 /$rHubert P. van Tuyll van Serooskerken -- $t5 Crisis and Opportunity, 1918?1919 /$rHubert P. van Tuyll van Serooskerken -- $t6 Versailles: The Offensive Begins /$rHubert P. van Tuyll van Serooskerken -- $t7 Versailles: The Counteroffensive /$rHubert P. van Tuyll van Serooskerken -- $t8 Victory and Defeat /$rHubert P. van Tuyll van Serooskerken -- $t9 Postscript /$rHubert P. van Tuyll van Serooskerken -- $t10 Meanings /$rHubert P. van Tuyll van Serooskerken -- $tBibliography /$rHubert P. van Tuyll van Serooskerken -- $tIndex /$rHubert P. van Tuyll van Serooskerken. 330 $aWhen a devastated Belgium emerged from World War I, some of its leaders had high hopes that the upcoming negotiations would enable achievement of a long-cherished goal; annexing parts of the Netherlands lost in the final 1839 settlement which had established the country. Belgium?s strong historical and military arguments were bolstered by its courageous Great War image. Yet the Dutch proved ready and able to launch an energetic counterattack which ultimately stymied the Belgian campaign. This book explains why and how this happened, and demonstrates that small states are active participants in their own destinies, not just spectators or victims. 410 0$aHistory of warfare ;$vVolume 113. 606 $aWorld War, 1914-1918$xPeace 606 $aReconstruction (1914-1939) 607 $aBelgium$xHistory$y1914- 615 0$aWorld War, 1914-1918$xPeace. 615 0$aReconstruction (1914-1939) 676 $a940.312 700 $aTuyll van Serooskerken$b Hubert P. van$0483740 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910823446603321 996 $aSmall countries in a big power world$94064123 997 $aUNINA