LEADER 08212nam 22008055 450 001 996466121003316 005 20200630030258.0 010 $a3-540-49497-9 024 7 $a10.1007/11935308 035 $a(CKB)1000000000283880 035 $a(SSID)ssj0000318245 035 $a(PQKBManifestationID)11283548 035 $a(PQKBTitleCode)TC0000318245 035 $a(PQKBWorkID)10310092 035 $a(PQKB)10401544 035 $a(DE-He213)978-3-540-49497-3 035 $a(MiAaPQ)EBC3068489 035 $a(PPN)123139775 035 $a(EXLCZ)991000000000283880 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation and Communications Security$b[electronic resource] $e8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings /$fedited by Peng Ning, Ninghui Li 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XIV, 562 p.) 225 1 $aSecurity and Cryptology ;$v4307 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-49496-0 320 $aIncludes bibliographical references and index. 327 $aSecurity Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving Fair Exchange in Byzantine Environments -- A Security Analysis of the Precise Time Protocol (Short Paper) -- Applied Crytography -- An Identity-Based Proxy Signature Scheme from Pairings -- Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper) -- Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper) -- Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size -- Trace-Driven Cache Attacks on AES (Short Paper) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols -- Defining and Measuring Policy Coverage in Testing Access Control Policies -- Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper) -- An Operating System Design for the Security Architecture for Microprocessors -- Privacy and Malicious Code -- Point-Based Trust: Define How Much Privacy Is Worth -- Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets -- Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper) -- An Anonymous Authentication Scheme for Identification Card -- A Wireless Covert Channel on Smart Cards (Short Paper) -- Network Security -- From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution -- Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper) -- Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario -- An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper) -- Systems Security -- Provably Correct Runtime Enforcement of Non-interference Properties -- An Attack on SMC-Based Software Protection -- Modular Behavior Profiles in Systems with Shared Libraries (Short Paper) -- Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic -- Cryptanalysis -- Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards -- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper) -- Seifert?s RSA Fault Attack: Simplified Analysis and Generalizations -- The Fairness of Perfect Concurrent Signatures -- Applied Cryptography and Network Security -- Secure Set Membership Using 3Sat -- Left-to-Right Signed-Bit ?-Adic Representations of n Integers (Short Paper) -- Universal Designated Verifier Signature Without Delegatability -- Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper) -- Security Implementations -- A Fast RSA Implementation on Itanium 2 Processor -- Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) -- Threshold Implementations Against Side-Channel Attacks and Glitches -- Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper). 330 $aIt is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4?7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved in m- tiple disciplines of Information and Communications Security in order to foster exchangeof ideas. The past sevenICICS conferences wereheld in Beijing, China (ICICS 1997); Sydney, Australia (ICICS 1999); Xi?an China (ICICS 2001); S- gapore (ICICS 2002); Hohhot City, China (ICICS 2003); Malaga, Spain (ICICS 2004); and Beijing, China (ICICS 2005). The conference proceedings of the past seven events have been published by Springer in the Lecture Notes in Computer Science series, in LNCS1334,LNCS1726,LNCS2229,LNCS 2513,LNCS 2836, LNCS 3269, and LNCS 3783, respectively. This year we received a total of 119 submissions on various aspects of - hoc and sensor network security. The Program Committee selected 22 regular papers and 17 short papers that cover a variety of topics, including security protocols, applied cryptography and cryptanalysis, access control in distributed systems, privacy, malicious code, network and systems security, and security implementations. Putting together ICICS 2006 was a team e?ort. First of all, we would like to thank the authors of every paper, whether accepted or not, for submitting their papers to ICICS 2006. We would like to express our gratitude to the Program Committee members and the external reviewers, who worked very hard in - viewing the papers and providing suggestions for their improvements. 410 0$aSecurity and Cryptology ;$v4307 606 $aData encryption (Computer science) 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aComputer communication systems 606 $aAlgorithms 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.8 702 $aNing$b Peng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Ninghui$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference on Information and Communications Security 906 $aBOOK 912 $a996466121003316 996 $aInformation and Communications Security$9771899 997 $aUNISA LEADER 00962nam a2200265 i 4500 001 991000248969707536 005 20020527111041.0 008 010810s1967 it ||| | ita 035 $ab10051211-39ule_inst 035 $aPARLA218190$9ExL 040 $aDip.to Filosofia$bita 082 0 $a801.9 100 1 $aSchlegel, Friedrich$0444001 245 10$aFrammenti critici e scritti di estetica /$cFriedrich Schlegel ; introduzione e traduzione di Vittorio Santoli 260 $aFirenze :$bSansoni,$c1967 300 $aLXVII, 299 p. ;$c20 cm. 490 0 $aBiblioteca Sansoni 650 4$aEstetica 700 1 $aSantoli, Vittorio 907 $a.b10051211$b17-02-17$c27-06-02 912 $a991000248969707536 945 $aLE005 MF 17 E 11$g1$i2005000256400$lle005$o-$pE0.00$q-$rl$s- $t0$u2$v0$w2$x0$y.i10059350$z27-06-02 996 $aFrammenti critici e scritti di estetica$987229 997 $aUNISALENTO 998 $ale005$b01-01-01$cm$da $e-$fita$git $h0$i1 LEADER 01007nam0 22002651i 450 001 UON00213392 005 20231205103343.958 010 $a88-15-06578-4 100 $a20030730d1998 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aSociologia economica$eStato, mercato e società nel capitalismo moderno$fCarlo Trigilia 210 $aBologna$cIl Mulino$d1998. VII$d488 p. ; 25 cm. 410 1$1001UON00171538$12001 $aStrumenti. Sociologia 606 $aSociologia economica$3UONC038796$2FI 620 $aIT$dBologna$3UONL000085 700 1$aTrigilia$bCarlo$3UONV108106$089268 712 $aIl Mulino$3UONV245824$4650 801 $aIT$bSOL$c20250613$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00213392 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI A B 0378 $eSI SC 33625 5 0378 996 $aSociologia economica$916018 997 $aUNIOR LEADER 04030oam 2200625I 450 001 9910974918103321 005 20251116205520.0 010 $a1-315-79398-9 010 $a1-317-74315-6 024 7 $a10.4324/9781315793986 035 $a(CKB)2550000001345744 035 $a(OCoLC)891383387 035 $a(MiAaPQ)EBC1770560 035 $a(OCoLC)897457650 035 $a(EXLCZ)992550000001345744 100 $a20180706d2015 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aMasculinity in contemporary New York fiction /$fPeter Ferry 205 $a1st ed. 210 1$aNew York :$cRoutledge,$d2015. 215 $a1 online resource (183 pages) 225 1 $aRoutledge Transnational Perspectives on American Literature ;$v25 311 08$a1-138-01604-7 311 08$a1-322-07368-6 320 $aIncludes bibliographical references and index. 327 $a1. Introduction : finding yourself in New York -- 2. Walking Manhattan, writing masculinity : (re-)introducing the New York flaneur with E.B. White's Here is New York and Joshua Ferris' The unnamed -- 3. "The son saves the father" : counter-hegemonic father figures in Paul Auster's fiction -- 4. "Because I want to fit in" : the influence of the male peer group in Bret Easton Ellis' American psycho -- 5. "A world citizen with a New York pair of balls" : the global hegemonic male in Don DeLillo's Cosmopolis. 330 $a"Masculinity in Contemporary New York Fiction is an interdisciplinary study that presents masculinity as a key thematic concern in contemporary New York fiction. This study argues that New York authors do not simply depict masculinity as a social and historical construction but seek to challenge the archetypal ideals of masculinity by writing counter-hegemonic narratives. Gendering canonical New York writers, namely Paul Auster, Bret Easton Ellis, and Don DeLillo, illustrates how explorations of masculinity are tied into the principal themes that have defined the American novel from its very beginning. The themes that feature in this study include the role of the novel in American society; the individual and (urban) society; the journey from innocence to awareness (of masculinity); the archetypal image of the absent and/or patriarchal father; the impact of homosocial relations on the everyday performance of masculinity; male sexuality; and the male individual and globalization. What connects these contemporary New York writers is their employment of the one of the great figures in the history of literature: the flaneur. These authors take the flaneur from the shadows of the Manhattan streets and elevate this figure to the role of self-reflexive agent of male subjectivity through which they write counter-hegemonic narratives of masculinity. This book is an essential reference for those with an interest in gender studies and contemporary American fiction"--$cProvided by publisher. 410 0$aRoutledge transnational perspectives on American literature ;$v25. 606 $aAmerican fiction$y20th century$xHistory and criticism 606 $aAmerican fiction$y21st century$xHistory and criticism 606 $aMasculinity in literature 606 $aSex role in literature 606 $aMen in literature 606 $aFlaneurs in literature 607 $aNew York (N.Y.)$xIn literature 615 0$aAmerican fiction$xHistory and criticism. 615 0$aAmerican fiction$xHistory and criticism. 615 0$aMasculinity in literature. 615 0$aSex role in literature. 615 0$aMen in literature. 615 0$aFlaneurs in literature. 676 $a813/.609353 686 $aLIT004020$aLIT000000$aSOC032000$2bisacsh 700 $aFerry$b Peter$f1982-$01864076 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910974918103321 996 $aMasculinity in contemporary New York fiction$94470792 997 $aUNINA