LEADER 01942nam 2200385 n 450 001 996394951003316 005 20200824121622.0 035 $a(CKB)3810000000018606 035 $a(EEBO)2240911402 035 $a(UnM)99831234e 035 $a(UnM)99831234 035 $a(EXLCZ)993810000000018606 100 $a19951002d1694 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 10$aEngland's merry jester: or, Court, city and country jests$b[electronic resource] $enew, and suitable to the humours of the times; witty and familiar, for the encrease of merriment, and improvement of friendly conversation, as they are used among the wits of the age. To which are added, as a second part, Bulls, banters, quibbles, repartees, pleasant stories, and poems: the qualifications of an expert town-wheedle; with the art and mystery of wheedling. All profitable, pleasant, and delightful. The like never before published. Done by a lover of merriment 205 $aThe second edition. 210 $aLondon $cprinted by J. Wilde, for N. Boddington, at the Golden Ball, in Duck-Lane$d1694 215 $a[12], 180 p., [1] leaf of plates $cill 300 $aEngraved frontispiece. 300 $aThe preface is signed: J. S. 300 $a"The second part: containing bulls, blunders, banters, quibbles, repartees, wheedles, and pleasant stories .." has caption title on p. 145; "The new art of wheedling" has caption title on p. 174; register and pagination are continuous. 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 606 $aEnglish wit and humor$vEarly works to 1800 615 0$aEnglish wit and humor 700 $aJ. S$01000985 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996394951003316 996 $aEngland's merry jester: or, Court, city and country jests$92345702 997 $aUNISA LEADER 07279nam 22008775 450 001 9910485027903321 005 20251226195711.0 010 $a1-280-38869-2 010 $a9786613566614 010 $a3-642-15497-2 024 7 $a10.1007/978-3-642-15497-3 035 $a(CKB)2670000000045065 035 $a(SSID)ssj0000446372 035 $a(PQKBManifestationID)11282010 035 $a(PQKBTitleCode)TC0000446372 035 $a(PQKBWorkID)10491050 035 $a(PQKB)11173743 035 $a(DE-He213)978-3-642-15497-3 035 $a(MiAaPQ)EBC3065721 035 $a(PPN)149024541 035 $a(EXLCZ)992670000000045065 100 $a20100901d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Security - ESORICS 2010 $e15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings /$fedited by Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIV, 718 p. 163 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v6345 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-15496-4 320 $aIncludes bibliographical references and index. 327 $aRFID and Privacy -- A New Framework for RFID Privacy -- Readers Behaving Badly -- Privacy-Preserving, Taxable Bank Accounts -- Formal Analysis of Privacy for Vehicular Mix-Zones -- Software Security -- IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time -- A Theory of Runtime Enforcement, with Results -- Enforcing Secure Object Initialization in Java -- Flexible Scheduler-Independent Security -- Cryptographic Protocols -- Secure Multiparty Linear Programming Using Fixed-Point Arithmetic -- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on ?-Protocols -- Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model -- DR@FT: Efficient Remote Attestation Framework for Dynamic Systems -- Traffic Analysis -- Website Fingerprinting and Identification Using Ordered Feature Sequences -- Web Browser History Detection as a Real-World Privacy Threat -- On the Secrecy of Spread-Spectrum Flow Watermarks -- Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation -- End-User Security -- A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection -- Kamouflage: Loss-Resistant Password Management -- Formal Analysis -- Sequential Protocol Composition in Maude-NPA -- Verifying Security Property of Peer-to-Peer Systems Using CSP -- Modeling and Analyzing Security in the Presence of Compromising Adversaries -- On Bounding Problems of Quantitative Information Flow -- E-voting and Broadcast -- On E-Vote Integrity in the Case of Malicious Voter Computers -- Election Verifiability in Electronic Voting Protocols -- Pretty Good Democracy for More Expressive Voting Schemes -- Efficient Multi-dimensional Key Management in Broadcast Services -- Authentication, Access Control, Authorization and Attestation -- Caught in the Maze of Security Standards -- User-Role Reachability Analysis of Evolving Administrative Role Based Access Control -- An Authorization Framework Resilient to Policy Evaluation Failures -- Optimistic Fair Exchange with Multiple Arbiters -- Anonymity and Unlinkability -- Speaker Recognition in Encrypted Voice Streams -- Evaluating Adversarial Partitions -- Providing Mobile Users? Anonymity in Hybrid Networks -- Complexity of Anonymity for Security Protocols -- Network Security and Economics -- k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks -- Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information -- RatFish: A File Sharing Protocol Provably Secure against Rational Users -- A Service Dependency Model for Cost-Sensitive Intrusion Response -- Secure Update, DOS and Intrustion Detection -- Secure Code Update for Embedded Devices via Proofs of Secure Erasure -- D(e/i)aling with VoIP: Robust Prevention of DIAL Attacks -- Low-Cost Client Puzzles Based on Modular Exponentiation -- Expressive, Efficient and Obfuscation Resilient Behavior Based IDS. 330 $aThe EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the 15th edition of the event. It was held in Athens, Greece, September 20-22, 2010. The conference received 201 submissions. The papers went through a careful review process. In a ?rst round, each paper - ceived three independent reviews. For the majority of the papers an electronic discussion was also organized to arrive at the ?nal decision. As a result of the review process, 42 papers were selected for the ?nal program, resulting in an - ceptance rate of as low as 21%. The authors of accepted papers were requested to revise their papers, based on the comments received. The program was c- pleted with an invited talk by Udo Helmbrecht, Executive Director of ENISA (European Network and Information Security Agency). ESORICS 2010 was organized under the aegisof three Ministries of the G- ernment of Greece, namely: (a) the Ministry of Infrastructure, Transport, and Networks, (b) the General Secretariat for Information Systems of the Ministry of Economy and Finance, and (c) the General Secretariat for e-Governance of the Ministry of Interior, Decentralization, and e-Government. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v6345 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer programming 606 $aElectronic data processing$xManagement 606 $aAlgorithms 606 $aComputers and civilization 606 $aComputer Communication Networks 606 $aCryptology 606 $aProgramming Techniques 606 $aIT Operations 606 $aAlgorithms 606 $aComputers and Society 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer programming. 615 0$aElectronic data processing$xManagement. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aProgramming Techniques. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aComputers and Society. 676 $a005.8 701 $aGritzalis$b Dimitris$01757860 701 $aPreneel$b Bart$028507 701 $aTheoharidou$b Marianthi$01757861 712 12$aEuropean Symposium on Research in Computer Security. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910485027903321 996 $aComputer security ESORICS 2010$94195853 997 $aUNINA