LEADER 00948nam 2200313 450 001 9910890294703321 005 20250710091740.0 010 $a9788874669677 100 $a20241016d2024----km y0itay50 ba 101 0 $aita 102 $aIT 105 $ay 001yy 200 1 $a<>organizzazione dei servizi socioassistenziali$eistituzioni, professionisti e assetti di regolazione$fPaolo Rossi 205 $aN. ed. 210 $aRoma$cCarocci$d2024 215 $a282 p.$d24 cm 225 1 $aServizio sociale$v168 610 0 $aServizi sociali$aOrganizzazione$aItalia 676 $a361.61$v23$zita 700 1$aRossi,$bPaolo$0307321 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910890294703321 952 $a361.61 ROS 2$b12223$fbs 952 $aCOLLEZ. 1409 (168)$b1265/2025$fFSPBC 959 $aBFS 959 $aFSPBC 996 $aOrganizzazione dei servizi socioassistenziali$91566853 997 $aUNINA LEADER 03054nam 22007095 450 001 9910983074503321 005 20251225183600.0 010 $a981-9780-13-6 024 7 $a10.1007/978-981-97-8013-6 035 $a(MiAaPQ)EBC31702412 035 $a(Au-PeEL)EBL31702412 035 $a(CKB)36271347500041 035 $a(DE-He213)978-981-97-8013-6 035 $a(EXLCZ)9936271347500041 100 $a20241002d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptology and Network Security $e23rd International Conference, CANS 2024, Cambridge, UK, September 24?27, 2024, Proceedings, Part I /$fedited by Markulf Kohlweiss, Roberto Di Pietro, Alastair Beresford 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (327 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14905 311 08$a981-9780-12-8 320 $aIncludes bibliographical references and index. 330 $aThis two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024. The 25 papers included in these volumes were carefully reviewed and selected from 76 submissions. The papers presented in these two volumes are organized in the following topical sections:- Part I: Multi-party Computation; Post-quantum Security; Anonymity and Privacy; Blockchain Technology. Part II: Cyber Security and Leakage; Machine Learning and Security; Provable Security; Cryptanalysis. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14905 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aComputer networks$xSecurity measures 606 $aData protection 606 $aApplication software 606 $aCryptology 606 $aComputer Communication Networks 606 $aMobile and Network Security 606 $aData and Information Security 606 $aComputer and Information Systems Applications 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aComputer networks$xSecurity measures. 615 0$aData protection. 615 0$aApplication software. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 615 24$aData and Information Security. 615 24$aComputer and Information Systems Applications. 676 $a005.8 702 $aKohlweiss$b Markulf 702 $aDi Pietro$b Roberto 702 $aBeresford$b Alastair 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983074503321 996 $aCryptology and Network Security$92968064 997 $aUNINA