LEADER 01306nam2 2200313 i 450 001 SUN0005002 005 20140702124832.366 010 $a88-14-05084-8 100 $a20020806d1995 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aAffitto di fondi rustici$eaffitto a coltivatore diretto$fGiuseppe Bivona 205 $aMilano : Giuffrè$b1995 210 $aXIV$d453 p. ; 25 cm 215 $aVolume presente anche nel fondo Tribunale. 410 1$1001SUN0061348$12001 $aˆIl ‰codice civile. Commentario$1210 $aMilano$cGiuffrè. 517 1$3SUN0077525$aArtt. 1628-1654. 606 $aAffitto rustico$xCodice civile$2FI$3SUNC003076 620 $dMilano$3SUNL000284 676 $a346.4504348$v21 700 1$aBivona$b, Giuseppe$3SUNV004498$0233999 712 $aGiuffrè$3SUNV001757$4650 801 $aIT$bSOL$c20181231$gRICA 912 $aSUN0005002 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA$d00CONS XV.D.12 1628-1654 $e00 8326 20020806 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA$d00CONS XV.D.12 1628-1654BIS$e00FT 2 20091012 996 $aAffitto di fondi rustici$9667484 997 $aUNICAMPANIA LEADER 05185nam 22007455 450 001 996205173203316 005 20200630212806.0 010 $a3-642-54242-5 024 7 $a10.1007/978-3-642-54242-8 035 $a(CKB)3710000000089214 035 $a(DE-He213)978-3-642-54242-8 035 $a(SSID)ssj0001187570 035 $a(PQKBManifestationID)11754727 035 $a(PQKBTitleCode)TC0001187570 035 $a(PQKBWorkID)11270990 035 $a(PQKB)11014682 035 $a(MiAaPQ)EBC3093096 035 $a(PPN)176751645 035 $a(EXLCZ)993710000000089214 100 $a20140203d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTheory of Cryptography$b[electronic resource] $e11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings /$fedited by Yehuda Lindell 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XVI, 739 p. 59 illus.) 225 1 $aSecurity and Cryptology ;$v8349 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-54241-7 327 $aVirtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding -- Obfuscation for Evasive Functions -- On Extractability Obfuscation -- Two-Round Secure MPC from Indistinguishability Obfuscation -- Chosen Ciphertext Security via Point Obfuscation -- Probabilistically Checkable Proofs of Proximity with Zero-Knowledge -- Achieving Constant Round Leakage-Resilient Zero-Knowledge -- Statistical Concurrent Non-malleable Zero Knowledge -- 4-Round Resettably-Sound Zero Knowledge -- Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? -- On the Power of Public-Key Encryption in Secure Computation -- On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations -- Towards Characterizing Complete Fairness in Secure Two-Party Computation -- On the Cryptographic Complexity of the Worst Functions -- Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol -- One-Sided Adaptively Secure Two-Party Computation -- Multi-linear Secret-Sharing -- Broadcast Amplification -- Non-malleable Coding against Bit-Wise and Split-State Tampering -- Continuous Non-malleable Codes -- Locally Updatable and Locally Decodable Codes -- Leakage Resilient Fully Homomorphic Encryption -- Securing Circuits and Protocols against 1/ poly(k) Tampering Rate -- How to Fake Auxiliary Input -- Standard versus Selective Opening Security: Separation and Equivalence Results -- Dual System Encryption via Predicate Encodings -- (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens -- Lower Bounds in the Hardware Token Model -- Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures -- On the Impossibility of Structure-Preserving Deterministic Primitives. 330 $aThis book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures. 410 0$aSecurity and Cryptology ;$v8349 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputers 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputation by Abstract Devices$3https://scigraph.springernature.com/ontologies/product-market-codes/I16013 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputers. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputation by Abstract Devices. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8 702 $aLindell$b Yehuda$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aTheory of Cryptography Conference 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996205173203316 996 $aTheory of Cryptography$9772206 997 $aUNISA