LEADER 05157nam 22007095 450 001 996466151003316 005 20200629175104.0 010 $a3-540-49784-6 024 7 $a10.1007/BFb0055851 035 $a(CKB)1000000000210985 035 $a(SSID)ssj0000322140 035 $a(PQKBManifestationID)11247761 035 $a(PQKBTitleCode)TC0000322140 035 $a(PQKBWorkID)10282306 035 $a(PQKB)11691436 035 $a(DE-He213)978-3-540-49784-4 035 $a(PPN)155200720 035 $a(EXLCZ)991000000000210985 100 $a20121227d1998 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Security - ESORICS 98$b[electronic resource] $e5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings /$fedited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann 205 $a1st ed. 1998. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d1998. 215 $a1 online resource (X, 382 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1485 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-65004-0 327 $aFixed vs. variable-length patterns for detecting suspicious process behavior -- A tool for pro-active defense against the buffer overrun attack -- A kernelized architecture for multilevel secure application policies -- Dealing with multi-policy security in large open distributed systems -- A flexible method for information system security policy specification -- On the security of some variants of the RSA signature scheme -- Side channel cryptanalysis of product ciphers -- On the security of digital tachographs -- An authorization model and its formal semantics -- Authorization in CORBA security -- Rules for designing multilevel Object-Oriented Databases -- Byte code verification for Java smart cards based on model checking -- Towards formalizing the Java security architecture of JDK 1.2 -- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets -- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video -- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system -- The ?ticket? concept for copy control based on embedded signalling -- Panel session: Watermarking -- Authentication and payment in future mobile systems -- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks -- A mix-mediated anonymity service and its payment -- A subjective metric of authentication -- A sound logic for analysing electronic commerce protocols -- Kerberos Version IV: Inductive analysis of the secrecy goals. 330 $aThis book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998. The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1485 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aData encryption (Computer science). 615 0$aOperating systems (Computers). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 14$aCryptology. 615 24$aOperating Systems. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aQuisquater$b Jean-Jacques$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeswarte$b Yves$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMeadows$b Catherine$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGollmann$b Dieter$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aEuropean Symposium on Research in Computer Security 906 $aBOOK 912 $a996466151003316 996 $aComputer Security - ESORICS 98$92004615 997 $aUNISA LEADER 02184oam 2200481 450 001 996465448803316 005 20210414164543.0 010 $a3-030-58167-5 024 7 $a10.1007/978-3-030-58167-1 035 $a(CKB)4100000011508873 035 $a(DE-He213)978-3-030-58167-1 035 $a(MiAaPQ)EBC6381021 035 $a(PPN)258060425 035 $a(EXLCZ)994100000011508873 100 $a20210414d2020 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aSystems modelling and management $efirst international conference, ICSMM 2020, Bergen, Norway, June 25-26, 2020, proceedings /$fOnder Babur, Joachim Denil, Birgit Vogel-Heuser (editors) 205 $a1st ed. 2020. 210 1$aCham, Switzerland :$cSpringer,$d[2020] 210 4$d©2020 215 $a1 online resource (XII, 197 p. 28 illus., 1 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0929 ;$v1262 311 $a3-030-58166-7 327 $aVerification and Validation -- Applications -- Methods, Techniques and Tools. 330 $aThis book constitutes the refereed proceedings of the First International Conference on Systems Modelling and Management, ICSMM 2020, planned to be held in Bergen, Norway, in June 2020. Due to the COVID-19 pandemic the conference did not take place physically or virtually. The 10 full papers and 3 short papers were thoroughly reviewed and selected from 19 qualified submissions. The papers are organized according to the following topical sections: verification and validation; applications; methods, techniques and tools. 410 0$aCommunications in Computer and Information Science,$x1865-0929 ;$v1262 606 $aSoftware engineering$vCongresses 615 0$aSoftware engineering 676 $a005.1 702 $aBabur$b Önder 702 $aDenil$b Joachim 702 $aVogel-Heuser$b Birgit 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a996465448803316 996 $aSystems modelling and management$92139672 997 $aUNISA LEADER 01189nam a2200313 i 4500 001 991000055109707536 005 20020503113310.0 008 980320s1989 uk ||| | eng 020 $a0415032903 035 $ab10020573-39ule_inst 035 $aocm00009594$9ExL 040 $aDip.to Beni Culturali$bita 082 0 $a938.9 100 1 $aCartledge, Paul$0176602 245 10$aHellenistic and Roman Sparta, a tale of two cities /$cPaul Cartledge and Antony Spawforth 260 $aLondon ; New York :$bRoutledge,$c1989 300 $axiii, 304 p. :$bill. ;$c24 cm. 490 0 $aStates and cities of ancient Greece 500 $aIncludes index. 500 $aBibliography: p. 268-289. 650 4$aSparta - Civilization 650 4$aSparta (Extinct city) - History 700 1 $aSpawforth, Antony$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0253464 907 $a.b10020573$b17-02-17$c31-05-02 912 $a991000055109707536 945 $aLE001 SG VII 35$g1$i2001000188949$lle001$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10023525$z31-05-02 996 $aHellenistic and roman Sparta$9775659 997 $aUNISALENTO 998 $ale001$b01-01-98$cm$da $e-$feng$guk $h0$i1