LEADER 03162nam0 2200481 i 450 001 BVEE013074 005 20170908093158.0 012 $aegi& heso lasi nopo (3) 1561 (R)$2fei 100 $a20080402d1561 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $a˜La œHistoria vniuersale de suoi tempi di m. Lionardo Aretino. Nella qual si contengono tutte le guerre fatte tra principi in Italia, & spetialmente da Fiorentini in diuersi tempi fino al 1404. Con la giunta delle cose fatte da quel tempo fino all'anno 1560. Et con l'annotationi poste in margine a suoi luoghi. Riueduta, ampliata & corretta per Francesco Sansouino 210 $aIn Venetia$c[Francesco Sansovino]$eIn Venetia$gappresso Fran. Sansouino$h1561 215 $a[6], 236, [8] c.$d4° 300 $aTrad. di Donato Acciaioli, il cui nome appare nell'intitolazione 300 $aMarca (V453) sul front 300 $aCors. ; rom 300 $aSegn.: *⁶ A⁴ B-2H⁸ 300 $aIniziali e fregi xil. 316 $a1 v. - Timbro della Real biblioteca di Napoli sul front.$5IT-NA0079, SALA FARN.46. C 2 316 $a1 esemplare, legato con Historia antica di Malespini, R.$5IT-NA0070, Z.B. 0183 02 500 10$aHistoria Florentini populi$3BVEE013076$9BVEV018004$91479489 700 1$aBruni$b, Leonardo$f <1370-1444>$3BVEV018004$4070$0291162 702 1$aSansovino$b, Francesco$f <1521-1583>$3RAVV029326 702 1$aAcciaiuoli$b, Donato$f <1428?-1478>$3SBLV157380 712 02$aSansovino, Francesco$3BVEV020530$4650 790 0$aLeonardo : Aretino$3BVEV031508$zBruni, Leonardo <1370-1444> 790 1$aTatti$b, Giovanni$3BVEV025981$zSansovino, Francesco <1521-1583> 790 1$aAcciaioli$b, Donato$3CFIV172572$zAcciaiuoli, Donato <1428?-1478> 790 1$aAcciajuoli$b, Donato$3MILV136387$zAcciaiuoli, Donato <1428?-1478> 801 3$aIT$bIT-NA0079$c20080402 850 $aIT-NA0079$aIT-NA0070 899 1$aBiblioteca Nazionale Vittorio Emanuele III$bNA0079$41 esemplare$eS$uhttp://books.google.com/books?vid=IBNN:BNA01001468849 912 $aBVEE013074 921 $aBVEM000197$bIn cornice: un uomo sdraiato in terra sotto la luna.$cV453$dSul front. 950 0$aBiblioteca Nazionale Vittorio Emanuele III$c1 v.$d BNSALA FARN.46. C 2$e BNA010014688495G B 1 v. - Timbro della Real biblioteca di Napoli sul front.$fC $h20130207$i20130207$lTimbro della Real biblioteca di Napoli sul front.$mTimbri storici della biblioteca proprietaria 950 0$aBiblioteca Universitaria$c1 esemplare$d BUZ.B. 0183 02$e BUSI 0000174955 B 1 esemplare, legato con Historia antica di Malespini, R.$fZ $h20080402$i20080402 956 $aBiblioteca Nazionale Vittorio Emanuele III$b1$c $d $eBNA01001468849$uhttp://books.google.com/books?vid=IBNN:BNA01001468849$z BNSALA FARN.46. C 2 977 $a BN$a BU 996 $aHistoria Florentini populi$91479489 997 $aUNISANNIO LEADER 03164nam 22007095 450 001 9910416079803321 005 20251107152125.0 010 $a3-030-57878-X 024 7 $a10.1007/978-3-030-57878-7 035 $a(CKB)4100000011401118 035 $a(MiAaPQ)EBC6321265 035 $a(DE-He213)978-3-030-57878-7 035 $a(PPN)256146292 035 $a(MiAaPQ)EBC6321221 035 $a(EXLCZ)994100000011401118 100 $a20200828d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security $e18th International Conference, ACNS 2020, Rome, Italy, October 19?22, 2020, Proceedings, Part II /$fedited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (489 pages) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12147 311 08$a3-030-57877-1 330 $aThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12147 606 $aData protection 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer engineering 606 $aComputer networks 606 $aComputers 606 $aData and Information Security 606 $aData Structures and Information Theory 606 $aComputer Engineering and Networks 606 $aComputing Milieux 615 0$aData protection. 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aComputers. 615 14$aData and Information Security. 615 24$aData Structures and Information Theory. 615 24$aComputer Engineering and Networks. 615 24$aComputing Milieux. 676 $a005.82 676 $a005.824 702 $aConti$b Mauro$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhou$b Jianying$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCasalicchio$b Emiliano$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSpognardi$b Angelo$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910416079803321 996 $aApplied Cryptography and Network Security$9771881 997 $aUNINA