LEADER 01177nam0 22002533i 450 001 SUN0090110 005 20120628011717.470 100 $a20120619d1996 |0itac50 ba 101 $aita$aITA 102 $aIT 105 $a|||| ||||| 200 1 $aMussolini e la Repubblica di Weimar$ele relazioni diplomatiche tra Italia e Germania dal 1927 al 1933$fFederico Scarano 210 $aNapoli$cGiannini$d1996 215 $a591 p.$d21 cm. 410 1$1001SUN0051791$12001 $a*Quaderni della Facoltą di scienze politiche$fUniversitą di Napoli$v42$1210 $aNapoli$cEdizione scientifiche italiane$c[poi] Giannini. 620 $dNapoli$3SUNL000005 700 1$aScarano$b, Federico$3SUNV073282$0250444 712 $aGiannini$3SUNV000096$4650 801 $aIT$bSOL$c20181109$gRICA 912 $aSUN0090110 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI LETTERE E BENI CULTURALI$d07 CONS Fa 1992 $e07 20233 995 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI LETTERE E BENI CULTURALI$bIT-CE0103$h20233$kCONS Fa 1992$oc$qa 996 $aMussolini e la Repubblica di Weimar$9633913 997 $aUNICAMPANIA LEADER 02883nam 2200541 450 001 996465452603316 005 20221219230115.0 010 $a981-334-706-6 024 7 $a10.1007/978-981-33-4706-9 035 $a(OCoLC)1238200339 035 $a(CKB)5280000000246084 035 $a(MiAaPQ)EBC6417072 035 $a(DE-He213)978-981-33-4706-9 035 $a(PPN)252504240 035 $a(EXLCZ)995280000000246084 100 $a20210320d2020 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aApplications and techniques in information security $e11th international conference, atis 2020, brisbane, qld, australia, november 12-13, 2020, proceedings /$fedited by Lejla Batina, Gang Li 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer,$d[2020] 210 4$d©2020 215 $a1 online resource (IX, 123 p. 33 illus., 21 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0929 ;$v1338 300 $aIncludes index. 311 $a981-334-705-8 327 $aA Framework for Evaluation of Software Obfuscation Tools for Embedded Devices -- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme -- Digital Forensics for Drones: A Study of Tools and Techniques -- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output -- A New Rabin-type Cryptosystem with Modulus P^2q -- Malware Analysis Method Based Random Access Memory in Android -- Vulnerability Database as a Service for IoT -- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher. . 330 $aThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research. . 410 0$aCommunications in Computer and Information Science,$x1865-0929 ;$v1338 606 $aComputer networks$xSecurity measures$vCongresses 606 $aComputer networks$xSecurity measures 606 $aComputer security$vCongresses 615 0$aComputer networks$xSecurity measures 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security 676 $a929.605 702 $aLi$b Gang 702 $aBatina$b Lejla 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465452603316 996 $aApplications and Techniques in Information Security$92028776 997 $aUNISA