LEADER 01390nam a2200265 4500 001 991002987669707536 005 20250430125932.0 008 941125s1773 fr b 000 0 fre 035 $ab1426495x-39ule_inst 035 $aCICOGNARA-0623$9ExL 040 $aBibl. Interfacoltà T. Pellegrino$bita 041 0 $afre 100 1 $aBasan, Pierre François$d<1723-1797.>$0716518 245 10$aCatalogue d'une très-belle collection de tableaux de différens grands maîtres des trois écoles :$brassemblés par un artiste: dont la vente se fera le lundi 11 janvier 1773 ...$cPar Fr. Basan. 260 $aParis,$bchez Basan,$c1773. 300 $a30 p.; $c18 cm. 500 $aRiproduzione in microfiche dell'originale conservato presso la Biblioteca Apostolica Vaticana 787 18$iLeopoldo Cicognara Program :$tBiblioteca Cicognara$h[microform] : literary sources in the history of art and kindred subjects 787 18$tCatalogo ragionato dei libri d'arte e d'antichità / Leopoldo Cicognara 907 $a.b1426495x$b01-04-22$c28-07-16 912 $a991002987669707536 945 $aLE002 SB Raccolta Cicognara, mcrf 4455(1)$g0$lle002$pE0.00$rn$so $t11$u0$v0$w0$x0$y.i15735795$z28-07-16 996 $aCatalogue d'une très-belle collection de tableaux de différens grands maîtres des trois écoles$91388579 997 $aUNISALENTO 998 $ale002$b28-07-16$cm$dg $e-$ffre$gfr $h0$i1 LEADER 05515nam 22007455 450 001 9910634047803321 005 20250610153902.0 010 $a9783031223907 010 $a303122390X 024 7 $a10.1007/978-3-031-22390-7 035 $a(MiAaPQ)EBC7153778 035 $a(Au-PeEL)EBL7153778 035 $a(CKB)25616799400041 035 $a(DE-He213)978-3-031-22390-7 035 $a(PPN)268535329 035 $a(EXLCZ)9925616799400041 100 $a20221130d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security $e25th International Conference, ISC 2022, Bali, Indonesia, December 18?22, 2022, Proceedings /$fedited by Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (522 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13640 311 08$aPrint version: Susilo, Willy Information Security Cham : Springer International Publishing AG,c2022 9783031223891 327 $aCryptography -- Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs -- Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting -- Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files -- Witness Encryption from Smooth Projective Hashing System -- Post-Quantum Cryptography -- More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model -- QUIC Protocol with Post-Quantum Authentication -- Batched Fully Homomorphic Encryption from TFHE -- Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization -- Cryptanalysis -- Further Cryptanalysis of a Type of RSA Variants -- The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64 -- Efficient Scalar Multiplication on Koblitz Curves with Pre-computation -- Blockchain -- Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps -- Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization -- GRUZ : Practical Resource Fair Exchange without Blockchain -- Daric: A Storage Efficient Payment Channel With Punishment Mechanism -- A Blockchain-based Mutual Authentication Protocol for Smart Home -- Email and Web Security -- OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control -- EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries -- Malware -- ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence -- Dissecting Applications Uninstallers & Removers: Are they effective? -- Representing LLVM-IR in a Code Property Graph -- Why we need a theory of maliciousness: Hardware Performance Counters in security -- Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination With Whole-system Replay -- AI Security -- AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition -- HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud -- Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64 -- CFL: Cluster Federated Learning in Large-scale Peer-to-Peer Networks -- Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing -- Communication-Efficient and Secure Federated Learning Based on Adaptive One-bit Compressed Sensing. 330 $aThis book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022. The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13640 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aCryptology 606 $aMobile and Network Security 606 $aSeguretat de les xarxes d'ordinadors$2thub 608 $aCongressos$2thub 608 $aLlibres electrònics$2thub 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures. 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aCryptology. 615 24$aMobile and Network Security. 615 7$aSeguretat de les xarxes d'ordinadors 676 $a005.8 676 $a005.8 702 $aSusilo$b Willy 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910634047803321 996 $aInformation Security$9771885 997 $aUNINA