LEADER 01733nam1 22003733i 450 001 BVEE075877 005 20170908093234.0 100 $a20170214d1679 ||||0itac50 ba 101 | $aita 102 $afr 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $aDelle memorie recondite di Vittorio Siri. Volume quinto[-ottavo] 210 $aIn Lione$cappresso Anisson, e Posuel$d1679 215 $a4 v.$d4° 300 $aCfr.: Michel & Michel, vol.7, p. 132 300 $aI voll. 1 e 2 pubblicati a Ronco da Bartolomeo Cotta nel 1676 con il tit. "Memorie recondite dall'anno 1601. fino al 1640. di Vittorio Siri"; i voll. 3 e 4 pubblicati a Parigi da Sebastien Mabre-Cramoisy nel 1677 con il tit.: "Memorie recondite di Vittorio Siri" 300 $aMarca (giglio fiorentino in cornice figurata) sui front. 463 1$1001BVEE075878$12000 $a5$v1 620 $dLione$3RLZL001494 700 1$aSiri$b, Vittorio$f <1608-1685>$3TO0V254616$4070$0744200 712 02$aAnisson, Jean & Posuel, Jean$3MILV186066$4650 790 1$aSyrus$b, Victorinus$3PUVV367936$zSiri, Vittorio <1608-1685> 790 0$aCollenuccio Nicocleonte$3TO0V326335$zSiri, Vittorio <1608-1685> 790 0$aLatino Verità$3TO0V326336$zSiri, Vittorio <1608-1685> 791 02$aPosuel, Jean & Anisson, Jean$3MILV186072$zAnisson, Jean & Posuel, Jean 801 3$aIT$bIT-NA0079$c20170214 850 $aIT-CE0009 912 $aBVEE075877 921 $aSBNM000000$bMarca non censita$cS1$dSui front. 950 1$aBiblioteca Arcivescovile Cardinale Francesco Serra di Cassano$c1 volume$d CMSALA A A.31 2.7 977 $a CM 996 $aDelle memorie recondite di Vittorio Siri. Volume quinto$91482701 997 $aUNISANNIO LEADER 00772nam0-22002771i-450- 001 990001620130403321 005 20160628123842.0 035 $a000162013 035 $aFED01000162013 035 $a(Aleph)000162013FED01 035 $a000162013 100 $a20030910d1900----km-y0itay50------ba 101 0 $aeng 200 1 $aPractical organic chemistry for advanced students$fJulius Cohen 210 $aLondon$cMacMillan$d1900. 215 $a284 p.$d18 cm 610 0 $aChimica organica 676 $a547 700 1$aCohen ,$bJulius B. 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990001620130403321 952 $a60 547 C 8$b2957$fFAGBC 959 $aFAGBC 996 $aPractical organic chemistry for advanced students$9369840 997 $aUNINA LEADER 05099nam 22009735 450 001 996464447403316 005 20230125212555.0 010 $a3-030-10591-1 024 7 $a10.1007/978-3-030-10591-4 035 $a(CKB)4100000011716979 035 $a(DE-He213)978-3-030-10591-4 035 $a(MiAaPQ)EBC6455781 035 $a(Au-PeEL)EBL6455781 035 $a(OCoLC)1232280332 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/63653 035 $a(PPN)253255147 035 $a(EXLCZ)994100000011716979 100 $a20210114d2021 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity of Ubiquitous Computing Systems$b[electronic resource] $eSelected Topics /$fedited by Gildas Avoine, Julio Hernandez-Castro 205 $a1st ed. 2021. 210 $cSpringer Nature$d2021 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (XVIII, 265 p. 25 illus., 8 illus. in color.) 311 $a3-030-10590-3 327 $aPart I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics. 330 $aThe chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license. 606 $aComputer security 606 $aComputer engineering 606 $aInternet of things 606 $aEmbedded computer systems 606 $aComputer software 606 $aSystem safety 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCyber-physical systems, IoT$3https://scigraph.springernature.com/ontologies/product-market-codes/T24080 606 $aProfessional Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I29000 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 610 $aSystems and Data Security 610 $aCyber-physical systems, IoT 610 $aProfessional Computing 610 $aSecurity Science and Technology 610 $aData and Information Security 610 $aInternet of Things 610 $aCryptology 610 $aCryptacus 610 $aSecurity 610 $aUbiquitous Devices 610 $aLightweight Cryptography 610 $aSymmetric Cryptography 610 $aSide-Channel Analysis 610 $aIoT Security 610 $aUbiquitous Computing Systems 610 $aOpen Access 610 $aComputer security 610 $aNetwork security 610 $aElectrical engineering 610 $aCybernetics & systems theory 610 $aApplied computing 610 $aSecurity & fire alarm systems 615 0$aComputer security. 615 0$aComputer engineering. 615 0$aInternet of things. 615 0$aEmbedded computer systems. 615 0$aComputer software. 615 0$aSystem safety. 615 14$aSystems and Data Security. 615 24$aCyber-physical systems, IoT. 615 24$aProfessional Computing. 615 24$aSecurity Science and Technology. 676 $a005.8 700 $aAvoine$b Gildas$4edt$01354923 702 $aAvoine$b Gildas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHernandez-Castro$b Julio$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996464447403316 996 $aSecurity of Ubiquitous Computing Systems$93358695 997 $aUNISA