LEADER 01050nam1 2200373 450 001 990000766990203316 005 1993072907411598 010 $dL. 28000 020 $aIT$b92-3887 035 $a0076699 035 $aUSA010076699 035 $a(ALEPH)000076699USA01 035 $a0076699 100 $a19950210d1992 |||y0itay01 ba 101 $aita 102 $aIT 105 $a00||| 200 1 $aNobili Sicilia$esecoli 16.-17.$v2$fDomenico Ligresti 210 $aCatania$cC.U.E.C.M.$d[1992] 215 $a253 p.$d21 cm 461 $10010076670$12001$aFeudatari e patrizi nella Sicilia moderna 676 $a945.8 700 1$aLIGRESTI,$bDomenico$0157839 801 0$aIT$bBNI$c19950210$gRICA 912 $a990000766990203316 951 $aIII A 35 2$b133879 LM$cIII A 959 $aBK 969 $aUMA 979 $aPATTY$b90$c20011123$lUSA01$h1157 979 $aPATTY$b90$c20011123$lUSA01$h1202 979 $c20020403$lUSA01$h1724 979 $aPATRY$b90$c20040406$lUSA01$h1653 996 $aNobili Sicilia$9964517 997 $aUNISA LEADER 00802nam0-2200289---450- 001 990008294480403321 005 20110413103458.0 035 $a000829448 035 $aFED01000829448 035 $a(Aleph)000829448FED01 035 $a000829448 100 $a20060314d2004----km-y0itay50------ba 101 0 $ager 102 $aDE 105 $aa---y---001yb 200 1 $aGutenberg und seine Wirkung$fStephan Füssel 205 $a2. 210 $aFrankfurt am Main$cWissenschafliche Buchgesellschaft$d2004 215 $a140 p.$cill.$d25 cm 700 1$aFüssel,$bStephan$0387319 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990008294480403321 952 $aSDI KD 845$b8761 ddr$fSDI$m21-9763 959 $aSDI 996 $aGutenberg und seine Wirkung$9745927 997 $aUNINA LEADER 00964nam0-22002891i-450- 001 990001655340403321 005 20050429112425.0 035 $a000165534 035 $aFED01000165534 035 $a(Aleph)000165534FED01 035 $a000165534 100 $a20030910d1858----km-y0itay50------ba 101 0 $afre 200 1 $aArchitecture rurale, theorique et pratique a l'usage des proprietaires et des ouvriers de la campagne$fA.J. de Saint Felix 205 $a3e ed. 210 $aToulouse$cJ. Matthieu Douladoure$d1858 215 $aXXII, 358 p.$d31 cm 610 0 $aArchitettura rurale 676 $a728.67 700 1$aSaint Félix,$bArmand-Joseph-Marie : de$0353865 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990001655340403321 952 $a60 631.2 A 1$b14107$fFAGBC 959 $aFAGBC 996 $aArchitecture rurale, theorique et pratique a l'usage des proprietaires et des ouvriers de la campagne$9373046 997 $aUNINA LEADER 03734nam 22004815 450 001 9910874664303321 005 20240909112021.0 010 $a9789819750283 024 7 $a10.1007/978-981-97-5028-3 035 $a(CKB)32970857100041 035 $a(MiAaPQ)EBC31529350 035 $a(Au-PeEL)EBL31529350 035 $a(DE-He213)978-981-97-5028-3 035 $a(OCoLC)1453721957 035 $a(EXLCZ)9932970857100041 100 $a20240716d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and Privacy $e29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15?17, 2024, Proceedings, Part II /$fedited by Tianqing Zhu, Yannan Li 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (464 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14896 311 08$a9789819750276 327 $aPost Quantum Cryptography -- Improved Multimodal Private Signatures from Lattices -- Automatic Quantum Multi collision Distinguishers and Rebound Attacks with Triangulation Algorithm -- Lattice based more general anti leakage model and its application in decentralization -- An Efficient Hardware Implementation of Crystal Dilithium on FPGA -- Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime -- Jumping for Berstein Yang Inversion -- DualRing PRF Post Quantum Linkable Ring Signatures from Legendre and Power Residue PRFs -- Faster verifications and smaller signatures Trade offs for Alteq using rejections -- Revisiting the Security of Fiat Shamir Signature Schemes under Superposition Attacks -- Improved Lattice Based Attack on Mersenne Low Hamming Ratio Search Problem -- Cryptanalysis -- New Strategy for Evaluating Differential Clustering Effect of uBlock -- Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2 -- Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack -- Secure Protocols -- A Fault Tolerant Content Moderation Mechanism for Secure Messaging System -- Formal Verification of Challenge Flow in EMV 3D Secure -- Size Hiding Computation in the Honest But Curious Model -- Hidden Delta fairness A Novel Notion for Fair Secure Two Party Computation -- ProfistMAC A Protocol Finite State Machine Classifier via Graph Representation -- Subverting Cryptographic Protocols from A Fine Grained Perspective A Case Study on 2 Party ECDSA -- Application Security -- Deep Dive on Relationship between Personality and Password Creation -- Unveiling the Unseen Video Recognition Attacks on Social Software -- An Account Matching Method Based on Hyper Graph. 330 $aThis volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15?17, 2024. The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14896 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 700 $aZhu$b Tianqing$01059731 701 $aLi$b Yannan$01749214 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910874664303321 996 $aInformation Security and Privacy$94183249 997 $aUNINA