LEADER 01354nam a2200421 i 4500 001 991000976089707536 005 20020507180928.0 008 931201s1983 de ||| | eng 020 $a3540122990 035 $ab10783702-39ule_inst 035 $aLE01305148$9ExL 040 $aDip.to Matematica$beng 082 0 $a515.785 084 $aAMS 42A20 084 $aAMS 42A45 084 $aAMS 42A50 084 $aAMS 42B20 084 $aAMS 42B25 084 $aAMS 42B30 084 $aAMS 43-06 084 $aAMS 43-XX 084 $aAMS 43A80 084 $aAMS 43A85 084 $aAMS 43A90 100 1 $aMauceri, Giancarlo$058721 245 10$aHarmonic analysis :$bproc. of a conf. held in Cortona, Italy, July 1-9, 1982 /$ced. by Giancarlo Mauceri, Fulvio Ricci, Guido Weiss 260 $aBerlin-Heidelberg :$bSpringer-Verlag,$c1983 300 $ax, 449 p. ;$c24 cm. 650 4$aAbstract harmonic analysis 650 4$aFourier analysis$xCongresses 700 1 $aRicci, Fulvio 700 1 $aWeiss, Guido L. 907 $a.b10783702$b21-09-06$c28-06-02 912 $a991000976089707536 945 $aLE013 43-XX MAU11 (1983)$g1$i2013000004372$lle013$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10883605$z28-06-02 996 $aHARMONIC analysis$9384723 997 $aUNISALENTO 998 $ale013$b01-01-93$cm$da $e-$feng$gde $h0$i1 LEADER 04234nam 22008535 450 001 9910349423703321 005 20251225202054.0 010 $a9783319895000 010 $a3319895001 024 7 $a10.1007/978-3-319-89500-0 035 $a(CKB)4100000003359639 035 $a(DE-He213)978-3-319-89500-0 035 $a(MiAaPQ)EBC6284135 035 $a(MiAaPQ)EBC5579259 035 $a(Au-PeEL)EBL5579259 035 $a(OCoLC)1034545385 035 $a(PPN)226696553 035 $a(EXLCZ)994100000003359639 100 $a20180409d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation and Communications Security $e19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings /$fedited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XVI, 689 p. 168 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10631 311 08$a9783319894997 311 08$a3319894994 327 $aFormal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security. 330 $aThis book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. . 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10631 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer networks 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aComputers and civilization 606 $aData protection 606 $aSoftware engineering 606 $aData Structures and Information Theory 606 $aComputer Communication Networks 606 $aLegal Aspects of Computing 606 $aComputers and Society 606 $aData and Information Security 606 $aSoftware Engineering 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aComputer networks. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aComputers and civilization. 615 0$aData protection. 615 0$aSoftware engineering. 615 14$aData Structures and Information Theory. 615 24$aComputer Communication Networks. 615 24$aLegal Aspects of Computing. 615 24$aComputers and Society. 615 24$aData and Information Security. 615 24$aSoftware Engineering. 676 $a343.0999 702 $aQing$b Sihan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMitchell$b Chris$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChen$b Liqun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLiu$b Dongmei$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349423703321 996 $aInformation and Communications Security$9771899 997 $aUNINA