LEADER 00855nam0-22002891i-450- 001 990006258470403321 005 19980601 035 $a000625847 035 $aFED01000625847 035 $a(Aleph)000625847FED01 035 $a000625847 100 $a19980601d1963----km-y0itay50------ba 105 $a--------00-yy 200 1 $a<>intepretazione de contratti collettivi$fAldo Cessari. 210 $aMilano$cGiuffre'$d1963 215 $a248 p.$d24 cm 225 1 $a"Universita' di Milano. Facolta' di giurisprudenza. Studi di diritto privato$v16 676 $a344.01891 700 1$aCessari,$bAldo$0229846 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006258470403321 952 $aUNIV. 71 (16)$b71229$fFGBC 959 $aFGBC 996 $aIntepretazione de contratti collettivi$9638177 997 $aUNINA DB $aGIU01 LEADER 03592nam 22006255 450 001 996466324103316 005 20200701214321.0 010 $a3-030-03329-5 024 7 $a10.1007/978-3-030-03329-3 035 $a(CKB)4100000007158796 035 $a(DE-He213)978-3-030-03329-3 035 $a(MiAaPQ)EBC6298838 035 $a(PPN)232470715 035 $a(EXLCZ)994100000007158796 100 $a20181026d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2018$b[electronic resource] $e24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2?6, 2018, Proceedings, Part II /$fedited by Thomas Peyrin, Steven Galbraith 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XVII, 767 p. 182 illus., 50 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11273 311 $a3-030-03328-7 327 $aSymmetric-Key Cryptanalysis -- Public Key and Identity-Based Encryption -- Side-Channels -- Signatures -- Leakage-Resilient Cryptography -- Functional/Inner Product/Predicate Encrpytion. 330 $aThe three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations. 410 0$aSecurity and Cryptology ;$v11273 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aComputer communication systems 606 $aArtificial intelligence 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aComputer communication systems. 615 0$aArtificial intelligence. 615 14$aCryptology. 615 24$aSoftware Engineering/Programming and Operating Systems. 615 24$aComputer Communication Networks. 615 24$aArtificial Intelligence. 676 $a005.82 702 $aPeyrin$b Thomas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGalbraith$b Steven$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466324103316 996 $aAdvances in Cryptology ? ASIACRYPT 2018$91934717 997 $aUNISA