top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cryptology and Network Security [[electronic resource] ] : 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings / / edited by Yi Mu, Robert H. Deng, Xinyi Huang
Cryptology and Network Security [[electronic resource] ] : 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings / / edited by Yi Mu, Robert H. Deng, Xinyi Huang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 540 p. 388 illus., 61 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Artificial intelligence
Data mining
Special purpose computers
Computer communication systems
Cryptology
Software Engineering/Programming and Operating Systems
Artificial Intelligence
Data Mining and Knowledge Discovery
Special Purpose and Application-Based Systems
Computer Communication Networks
ISBN 3-030-31578-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Homomorphic Encryption -- SIKE and Hash -- Lattice and Post-quantum Cryptography -- Searchable Encryption -- Blockchains, Cloud Security -- Secret Sharing and Interval Test -- LWE -- Encryption, Data Aggregation, and Revocation -- Signature, ML, Payment, and Factorization.
Record Nr. UNINA-9910349274903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptology and Network Security [[electronic resource] ] : 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings / / edited by Yi Mu, Robert H. Deng, Xinyi Huang
Cryptology and Network Security [[electronic resource] ] : 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings / / edited by Yi Mu, Robert H. Deng, Xinyi Huang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 540 p. 388 illus., 61 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Artificial intelligence
Data mining
Special purpose computers
Computer communication systems
Cryptology
Software Engineering/Programming and Operating Systems
Artificial Intelligence
Data Mining and Knowledge Discovery
Special Purpose and Application-Based Systems
Computer Communication Networks
ISBN 3-030-31578-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Homomorphic Encryption -- SIKE and Hash -- Lattice and Post-quantum Cryptography -- Searchable Encryption -- Blockchains, Cloud Security -- Secret Sharing and Interval Test -- LWE -- Encryption, Data Aggregation, and Revocation -- Signature, ML, Payment, and Factorization.
Record Nr. UNISA-996466447603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Green, Pervasive, and Cloud Computing [[electronic resource] ] : 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings / / edited by Xinyi Huang, Yang Xiang, Kuan-Ching Li
Green, Pervasive, and Cloud Computing [[electronic resource] ] : 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings / / edited by Xinyi Huang, Yang Xiang, Kuan-Ching Li
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 317 p. 134 illus.)
Disciplina 004
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Application software
Software engineering
Information storage and retrieval systems
Algorithms
Computer Communication Networks
Computer and Information Systems Applications
Software Engineering
Information Storage and Retrieval
ISBN 3-319-39077-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Green Computing -- Cloud Computing -- Virtualisation -- Network Security.
Record Nr. UNISA-996465679203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Green, Pervasive, and Cloud Computing [[electronic resource] ] : 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings / / edited by Xinyi Huang, Yang Xiang, Kuan-Ching Li
Green, Pervasive, and Cloud Computing [[electronic resource] ] : 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings / / edited by Xinyi Huang, Yang Xiang, Kuan-Ching Li
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 317 p. 134 illus.)
Disciplina 004
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Application software
Software engineering
Information storage and retrieval systems
Algorithms
Computer Communication Networks
Computer and Information Systems Applications
Software Engineering
Information Storage and Retrieval
ISBN 3-319-39077-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Green Computing -- Cloud Computing -- Virtualisation -- Network Security.
Record Nr. UNINA-9910483343403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Cryptology [[electronic resource] ] : 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers / / edited by Fuchun Guo, Xinyi Huang, Moti Yung
Information Security and Cryptology [[electronic resource] ] : 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers / / edited by Fuchun Guo, Xinyi Huang, Moti Yung
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIV, 674 p. 337 illus., 78 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Cryptology
Coding and Information Theory
Computers and Society
Legal Aspects of Computing
ISBN 3-030-14234-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain and crypto currency -- Lattice-based Cryptology -- Symmetric cryptology -- Applied cryptography -- Information security -- Assymetric encryption -- Foundations.
Record Nr. UNINA-9910337579903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Cryptology [[electronic resource] ] : 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers / / edited by Fuchun Guo, Xinyi Huang, Moti Yung
Information Security and Cryptology [[electronic resource] ] : 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers / / edited by Fuchun Guo, Xinyi Huang, Moti Yung
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIV, 674 p. 337 illus., 78 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Cryptology
Coding and Information Theory
Computers and Society
Legal Aspects of Computing
ISBN 3-030-14234-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain and crypto currency -- Lattice-based Cryptology -- Symmetric cryptology -- Applied cryptography -- Information security -- Assymetric encryption -- Foundations.
Record Nr. UNISA-996466076703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings / / edited by Xinyi Huang, Jianying Zhou
Information Security Practice and Experience [[electronic resource] ] : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings / / edited by Xinyi Huang, Jianying Zhou
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XIV, 578 p. 131 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-319-06320-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control in and Around the Browser -- Improving Thomlinson-Walker’s Software Patching Scheme Using Standard Cryptographic and Statistical Tools -- Preserving Receiver-Location Privacy in Wireless Sensor Networks -- Data Security and Privacy in the Cloud -- Forbidden City Model – Towards a Practice Relevant Framework for Designing Cryptographic Protocols -- A CAPTCHA Scheme Based on the Identification of Character Locations -- A Multi process Mechanism of Evading Behavior-Based Bot Detection Approaches -- Obfuscating Encrypted Web Traffic with Combined Objects -- A Website Credibility Assessment Scheme Based on Page Association -- A Methodology for Hook-Based Kernel Level Rootkits -- Precise Instruction-Level Side Channel Profiling of Embedded Processors -- Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model -- SBE – A Precise Shell code Detection Engine Based on Emulation and Support Vector Machine -- HDROP: Detecting ROP Attacks Using Performance Monitoring Counters -- Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs -- High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit -- A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm -- Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis -- Implementing a Covert Timing Channel Based on Mimic Function -- Detecting Frame Deletion in H.264 Video -- Efficient Adaptive Oblivious Transfer in UC Framework -- Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes -- Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing -- Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups -- Proofs of Retrievability Based on MRD Codes -- TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing -- Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures -- Distributed Pseudo-Random Number Generation and Its Application to Cloud Database -- A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience -- Two-Party (Blind) Ring Signatures and Their Applications -- Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model -- Attribute-Based Signature with Message Recovery -- Encryption and Key Agreement An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing -- Multi-recipient Encryption in Heterogeneous Setting -- ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage -- Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement -- New Variants of Lattice Problems and Their NP-Hardness -- Improved Preimage Attacks against Reduced HAS-160 -- Modular Inversion Hidden Number Problem Revisited -- On the Recursive Construction of MDS Matrices for Lightweight Cryptography -- On Constructions of Circulant MDS Matrices for Lightweight Cryptography.
Record Nr. UNISA-996203621303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings / / edited by Xinyi Huang, Jianying Zhou
Information Security Practice and Experience [[electronic resource] ] : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings / / edited by Xinyi Huang, Jianying Zhou
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XIV, 578 p. 131 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-319-06320-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control in and Around the Browser -- Improving Thomlinson-Walker’s Software Patching Scheme Using Standard Cryptographic and Statistical Tools -- Preserving Receiver-Location Privacy in Wireless Sensor Networks -- Data Security and Privacy in the Cloud -- Forbidden City Model – Towards a Practice Relevant Framework for Designing Cryptographic Protocols -- A CAPTCHA Scheme Based on the Identification of Character Locations -- A Multi process Mechanism of Evading Behavior-Based Bot Detection Approaches -- Obfuscating Encrypted Web Traffic with Combined Objects -- A Website Credibility Assessment Scheme Based on Page Association -- A Methodology for Hook-Based Kernel Level Rootkits -- Precise Instruction-Level Side Channel Profiling of Embedded Processors -- Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model -- SBE – A Precise Shell code Detection Engine Based on Emulation and Support Vector Machine -- HDROP: Detecting ROP Attacks Using Performance Monitoring Counters -- Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs -- High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit -- A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm -- Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis -- Implementing a Covert Timing Channel Based on Mimic Function -- Detecting Frame Deletion in H.264 Video -- Efficient Adaptive Oblivious Transfer in UC Framework -- Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes -- Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing -- Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups -- Proofs of Retrievability Based on MRD Codes -- TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing -- Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures -- Distributed Pseudo-Random Number Generation and Its Application to Cloud Database -- A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience -- Two-Party (Blind) Ring Signatures and Their Applications -- Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model -- Attribute-Based Signature with Message Recovery -- Encryption and Key Agreement An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing -- Multi-recipient Encryption in Heterogeneous Setting -- ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage -- Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement -- New Variants of Lattice Problems and Their NP-Hardness -- Improved Preimage Attacks against Reduced HAS-160 -- Modular Inversion Hidden Number Problem Revisited -- On the Recursive Construction of MDS Matrices for Lightweight Cryptography -- On Constructions of Circulant MDS Matrices for Lightweight Cryptography.
Record Nr. UNINA-9910483041703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine Learning for Cyber Security [[electronic resource] ] : Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings / / edited by Xiaofeng Chen, Xinyi Huang, Jun Zhang
Machine Learning for Cyber Security [[electronic resource] ] : Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings / / edited by Xiaofeng Chen, Xinyi Huang, Jun Zhang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 398 p. 201 illus., 90 illus. in color.)
Disciplina 006.31
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Artificial intelligence
Computers
Systems and Data Security
Computer Systems Organization and Communication Networks
Artificial Intelligence
Computing Milieux
ISBN 3-030-30619-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Data Collection, Fusion, Mining and Analytics for Cyber Security -- Malicious Web Request Detection Using Character-level CNN -- A LBP Texture Analysis Based Liveness Detection for Face Authentication -- A Survey on Deep Learning Techniques for Privacy-Preserving -- Quantifiable Network Security Measurement: A Study Based on an Index System -- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications -- Password Guessing via Neural Language Modeling -- A Cooperative Placement Method for Machine Learning Workows and Meteorological Big Data Security Protection in Cloud Computing -- A Lightweight Certicateless User Authentication Scheme for the Mobile Environment -- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System -- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones -- An Enumeration-like Vector Sampling Method for Solving Approximate SVP -- Secure Multiparty Learning from Aggregation of Locally Trained Models -- Data-Driven Android Malware Intelligence: A Survey -- Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing -- Content Recognition of Network Traffic Using Wavelet Transform and CNN -- Compositional Information Flow Verification for Inter Application Communications in Android System -- Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System -- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms -- Interpretable Encrypted Searchable Neural Networks -- Game Theory Based Dynamic Defense Mechanism for SDN -- A Visualization-based Analysis on Classifying Android Malware -- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes -- Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming -- A fair and efficient secret sharing scheme based on cloud assisting -- Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data -- Who Activated My Voice Assistant? A Stealthy Attack on Android phones without Users' Awareness.
Record Nr. UNINA-9910349281503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine Learning for Cyber Security [[electronic resource] ] : Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings / / edited by Xiaofeng Chen, Xinyi Huang, Jun Zhang
Machine Learning for Cyber Security [[electronic resource] ] : Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings / / edited by Xiaofeng Chen, Xinyi Huang, Jun Zhang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 398 p. 201 illus., 90 illus. in color.)
Disciplina 006.31
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Artificial intelligence
Computers
Systems and Data Security
Computer Systems Organization and Communication Networks
Artificial Intelligence
Computing Milieux
ISBN 3-030-30619-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Data Collection, Fusion, Mining and Analytics for Cyber Security -- Malicious Web Request Detection Using Character-level CNN -- A LBP Texture Analysis Based Liveness Detection for Face Authentication -- A Survey on Deep Learning Techniques for Privacy-Preserving -- Quantifiable Network Security Measurement: A Study Based on an Index System -- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications -- Password Guessing via Neural Language Modeling -- A Cooperative Placement Method for Machine Learning Workows and Meteorological Big Data Security Protection in Cloud Computing -- A Lightweight Certicateless User Authentication Scheme for the Mobile Environment -- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System -- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones -- An Enumeration-like Vector Sampling Method for Solving Approximate SVP -- Secure Multiparty Learning from Aggregation of Locally Trained Models -- Data-Driven Android Malware Intelligence: A Survey -- Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing -- Content Recognition of Network Traffic Using Wavelet Transform and CNN -- Compositional Information Flow Verification for Inter Application Communications in Android System -- Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System -- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms -- Interpretable Encrypted Searchable Neural Networks -- Game Theory Based Dynamic Defense Mechanism for SDN -- A Visualization-based Analysis on Classifying Android Malware -- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes -- Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming -- A fair and efficient secret sharing scheme based on cloud assisting -- Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data -- Who Activated My Voice Assistant? A Stealthy Attack on Android phones without Users' Awareness.
Record Nr. UNISA-996466291303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui