LEADER 01884nam--2200445---450- 001 990001045280203316 005 20110404125005.0 011 $a0026-976X 035 $a0104528 035 $aUSA010104528 035 $a(ALEPH)000104528USA01 035 $a0104528 100 $a20020319d--------km-y0itay0103----ba 101 $alat 102 $aIT 110 $aaha-------- 200 1 $aMonitor Ecclesiasticus$ecommentarius de iure ecclesiali fundatus a. 1876 ab Em.mo CaCasimiro Génnari puculiari S.Sedis adprobatione continuatur 210 $aRomae 215 $av.$d24 cm 300 $aSospesa con il n.2(2005) 326 $aTrimestrale 606 0 $aDiritto canonico$xPeriodici 676 $a262.9 801 0$aIT$bsalbc$gISBD 912 $a990001045280203316 958 $aECO$bFondo$c91 (1966)-128(2005);$l1980; 1982; 1989; 2004-2005; 959 $aSE 969 $aECO 979 $aPATTY$b90$c20020319$lUSA01$h1741 979 $c20020403$lUSA01$h1744 979 $aPATRY$b90$c20040406$lUSA01$h1712 979 $aPATRY$b90$c20071217$lUSA01$h1717 979 $aPATRY$b90$c20080804$lUSA01$h1306 979 $aVITTORIANA$b90$c20090512$lUSA01$h1410 979 $aVITTORIANA$b90$c20110404$lUSA01$h1250 996 $aMonitor ecclesiasticus$9792047 997 $aUNISA Z30 2$lUSA50$LAdministrative$mISSBD$1GIU$AGIU$3Fondo$629104$5B28715$4'lannata 2001 completa; i n.3-4 non pubblicati$820040209$a2001$b126$c1$f09$FNON Prestabile$hVol. 126, n. 1-2 (2001)$i20010331$j20010430$k20021127 Z30 2$lUSA50$LAdministrative$mISSUE$1GIU$AGIU$3Per VIII 13$5134959-50$820030613$a2002$b127$c2$f09$FNON Prestabile$hVol. 126, n. 2-3 (2002)$i20020630$j20020730$k20030901 Z30 2$lUSA50$LAdministrative$mISSUE$1GIU$AGIU$3Per VIII 13$638671$5134959-40$820030613$a2002$b127$c1$f09$FNON Prestabile$hVol. 126 sic, n. 1 gen-mar (2002)$i20020331$j20020430$k20030613 LEADER 05109nam 22008775 450 001 9910483626203321 005 20251226200537.0 010 $a3-540-79104-3 024 7 $a10.1007/978-3-540-79104-1 035 $a(CKB)1000000000490681 035 $a(SSID)ssj0000318286 035 $a(PQKBManifestationID)11231738 035 $a(PQKBTitleCode)TC0000318286 035 $a(PQKBWorkID)10308728 035 $a(PQKB)10741622 035 $a(DE-He213)978-3-540-79104-1 035 $a(MiAaPQ)EBC3062988 035 $a(MiAaPQ)EBC6426710 035 $a(PPN)123746078 035 $a(Au-PeEL)EBL6426710 035 $a(OCoLC)261324821 035 $a(EXLCZ)991000000000490681 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security Practice and Experience $e4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings /$fedited by Liqun Chen, Yi Mu, Willy Susilo 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XIII, 420 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4991 300 $aIncludes index. 311 08$a3-540-79103-5 320 $aIncludes bibliographical references and index. 327 $aVerification of Integrity and Secrecy Properties of a Biometric Authentication Protocol -- An On-Line Secure E-Passport Protocol -- Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly -- 1-out-of-n Oblivious Signatures -- A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes -- Private Query on Encrypted Data in Multi-user Settings -- Towards Tamper Resistant Code Encryption: Practice and Experience -- A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh?s HIBE Scheme -- RSA Moduli with a Predetermined Portion: Techniques and Applications -- Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs -- Secure Cryptographic Precomputation with Insecure Memory -- Securing Peer-to-Peer Distributions for Mobile Devices -- Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks -- Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers -- PROBE: A Process Behavior-Based Host Intrusion Prevention System -- Towards the World-Wide Quantum Network -- Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software -- Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains -- Privacy of Recent RFID Authentication Protocols -- A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection -- An Efficient Countermeasure against Side Channel Attacks for Pairing Computation -- Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic -- Secure Computation of the Vector Dominance Problem -- Rational Secret Sharing with Repeated Games -- Distributed Private Matching and Set Operations -- Computational Soundness ofNon-Malleable Commitments -- Square Attack on Reduced-Round Zodiac Cipher -- Analysis of Zipper as a Hash Function -- On the Importance of the Key Separation Principle for Different Modes of Operation. 330 $aThis book constitutes the refereed proceedings of the 4th International Information Security Practice and Experience Conference, ISPEC 2008, held in Sydney, Australia, in May 2008. The papers cover a wide range of topics. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4991 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aComputers and civilization 606 $aElectronic data processing$xManagement 606 $aInformation storage and retrieval systems 606 $aData and Information Security 606 $aCryptology 606 $aComputer Communication Networks 606 $aComputers and Society 606 $aIT Operations 606 $aInformation Storage and Retrieval 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aComputers and civilization. 615 0$aElectronic data processing$xManagement. 615 0$aInformation storage and retrieval systems. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aComputers and Society. 615 24$aIT Operations. 615 24$aInformation Storage and Retrieval. 676 $a005.8 702 $aMu$b Yi, 1955- 702 $aSusilo$b Willy 702 $aChen$b Liqun 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483626203321 996 $aInformation Security Practice and Experience$9772300 997 $aUNINA