Construction and Analysis of Safe, Secure, and Interoperable Smart Devices [[electronic resource] ] : International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers / / edited by Gilles Barthe, Lilian Burdy, Marieke Huisman, Jean-Louis Lanet, Traian Muntean
| Construction and Analysis of Safe, Secure, and Interoperable Smart Devices [[electronic resource] ] : International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers / / edited by Gilles Barthe, Lilian Burdy, Marieke Huisman, Jean-Louis Lanet, Traian Muntean |
| Edizione | [1st ed. 2005.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
| Descrizione fisica | 1 online resource (IX, 258 p.) |
| Disciplina | 332.1/78 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Software engineering Special purpose computers Computer programming Programming languages (Electronic computers) Operating systems (Computers) Cryptology Software Engineering Special Purpose and Application-Based Systems Programming Techniques Programming Languages, Compilers, Interpreters Operating Systems |
| ISBN | 3-540-30569-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Mobile Resource Guarantees for Smart Devices -- History-Based Access Control and Secure Information Flow -- The Spec# Programming System: An Overview -- Mastering Test Generation from Smart Card Software Formal Models -- A Mechanism for Secure, Fine-Grained Dynamic Provisioning of Applications on Small Devices -- ESC/Java2: Uniting ESC/Java and JML -- A Type System for Checking Applet Isolation in Java Card -- Verification of Safety Properties in the Presence of Transactions -- Modelling Mobility Aspects of Security Policies -- Smart Devices for Next Generation Mobile Services -- A Flexible Framework for the Estimation of Coverage Metrics in Explicit State Software Model Checking -- Combining Several Paradigms for Circuit Validation and Verification -- Smart Card Research Perspectives. |
| Record Nr. | UNISA-996466053503316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Innovative Security Solutions for Information Technology and Communications [[electronic resource] ] : 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers / / edited by Jean-Louis Lanet, Cristian Toma
| Innovative Security Solutions for Information Technology and Communications [[electronic resource] ] : 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers / / edited by Jean-Louis Lanet, Cristian Toma |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XIII, 530 p. 248 illus., 91 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Computer communication systems Computers Law and legislation Software engineering Application software Artificial intelligence Systems and Data Security Computer Communication Networks Legal Aspects of Computing Software Engineering Information Systems Applications (incl. Internet) Artificial Intelligence |
| ISBN | 3-030-12942-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Ultralightweight Cryptography - Some thoughts on ten years of efforts -- Android Malware Analysis: from technical difficulties to scientific challenges -- Post-Quantum Cryptography and a (Qu)Bit More -- Normalization of Java source codes -- HiddenApp - Securing Linux applications using ARM TrustZone -- Security Knowledge Management in Open Source Software Communities -- Formal Security Analysis of Cloud-connected Industrial Control Systems -- A Hybrid Searchable Encryption Scheme for Cloud Computing -- Securing Cloud Storage by Transparent Biometric Cryptography -- Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks -- An Evaluation of OCR Systems against Adversarial Machine Learning -- Intrusion detection and classification with autoencoded deep neural network -- Detecting Malicious Windows Commands Using Natural Language Processing Techniques -- Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks -- Assuring Privacy in Surfing the Internet -- Roaming Interface Signaling Security for LTE Networks -- Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile -- Anomaly-based Network Intrusion Detection using Wavelets and Adversarial Autoencoders -- Analysis and Evaluation of Dynamic Feature-based Malware Detection Methods -- Trends in design of ransomware viruses -- Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers -- Secure IoT Supply Chain Management Solution using Blockchain and Smart Contracts Technology -- ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT using Blockchain Technology -- Development of the unified security requirements of PUFs during the standardization process -- A PUF-based Destructive-private Mutual Authentication RFID Protocol -- Weakened Random Oracle Models with Target Prefix -- An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields -- On the security of Jhanwar-Barua Identity-Based Encryption Scheme -- Vulnerabilities of the McEliece variants based on Polar codes -- Binary Data Analysis for Source Code Leakage Assessment -- Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks -- A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib -- A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption -- Implementing Searchable Encryption schemes over Multilinear Maps -- A Unified Security Perspective on Legally Fair Contract Signing Protocols -- Relating different Polynomial-LWE problems -- Monoidal encryption over (F2, ·) -- Geometric pairwise key-sharing scheme. |
| Record Nr. | UNISA-996466342903316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Innovative Security Solutions for Information Technology and Communications : 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers / / edited by Jean-Louis Lanet, Cristian Toma
| Innovative Security Solutions for Information Technology and Communications : 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers / / edited by Jean-Louis Lanet, Cristian Toma |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XIII, 530 p. 248 illus., 91 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Computer networks Computers Law and legislation Software engineering Application software Artificial intelligence Systems and Data Security Computer Communication Networks Legal Aspects of Computing Software Engineering Information Systems Applications (incl. Internet) Artificial Intelligence |
| ISBN | 3-030-12942-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Ultralightweight Cryptography - Some thoughts on ten years of efforts -- Android Malware Analysis: from technical difficulties to scientific challenges -- Post-Quantum Cryptography and a (Qu)Bit More -- Normalization of Java source codes -- HiddenApp - Securing Linux applications using ARM TrustZone -- Security Knowledge Management in Open Source Software Communities -- Formal Security Analysis of Cloud-connected Industrial Control Systems -- A Hybrid Searchable Encryption Scheme for Cloud Computing -- Securing Cloud Storage by Transparent Biometric Cryptography -- Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks -- An Evaluation of OCR Systems against Adversarial Machine Learning -- Intrusion detection and classification with autoencoded deep neural network -- Detecting Malicious Windows Commands Using Natural Language Processing Techniques -- Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks -- Assuring Privacy in Surfing the Internet -- Roaming Interface Signaling Security for LTE Networks -- Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile -- Anomaly-based Network Intrusion Detection using Wavelets and Adversarial Autoencoders -- Analysis and Evaluation of Dynamic Feature-based Malware Detection Methods -- Trends in design of ransomware viruses -- Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers -- Secure IoT Supply Chain Management Solution using Blockchain and Smart Contracts Technology -- ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT using Blockchain Technology -- Development of the unified security requirements of PUFs during the standardization process -- A PUF-based Destructive-private Mutual Authentication RFID Protocol -- Weakened Random Oracle Models with Target Prefix -- An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields -- On the security of Jhanwar-Barua Identity-Based Encryption Scheme -- Vulnerabilities of the McEliece variants based on Polar codes -- Binary Data Analysis for Source Code Leakage Assessment -- Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks -- A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib -- A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption -- Implementing Searchable Encryption schemes over Multilinear Maps -- A Unified Security Perspective on Legally Fair Contract Signing Protocols -- Relating different Polynomial-LWE problems -- Monoidal encryption over (F2, ·) -- Geometric pairwise key-sharing scheme. |
| Record Nr. | UNINA-9910337565503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Risks and Security of Internet and Systems [[electronic resource] ] : 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers / / edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro
| Risks and Security of Internet and Systems [[electronic resource] ] : 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers / / edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (X, 269 p. 72 illus.) |
| Disciplina | 004.67 |
| Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
| Soggetto topico |
Software engineering
Data encryption (Computer science) Application software Computers Artificial intelligence Special purpose computers Software Engineering/Programming and Operating Systems Cryptology Information Systems Applications (incl. Internet) Computing Milieux Artificial Intelligence Special Purpose and Application-Based Systems |
| ISBN | 3-319-76687-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Vulnerability analysis and classification -- Apps security -- Access control and filtering -- Cloud security -- Cyber-insurance and cyber threat intelligence -- Human-centric security and trust -- Risk analysis. |
| Record Nr. | UNISA-996465510203316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Risks and Security of Internet and Systems : 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers / / edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro
| Risks and Security of Internet and Systems : 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers / / edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (X, 269 p. 72 illus.) |
| Disciplina | 004.67 |
| Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
| Soggetto topico |
Software engineering
Data encryption (Computer science) Application software Computers Artificial intelligence Computers, Special purpose Software Engineering/Programming and Operating Systems Cryptology Information Systems Applications (incl. Internet) Computing Milieux Artificial Intelligence Special Purpose and Application-Based Systems |
| ISBN |
9783319766874
3319766872 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Vulnerability analysis and classification -- Apps security -- Access control and filtering -- Cloud security -- Cyber-insurance and cyber threat intelligence -- Human-centric security and trust -- Risk analysis. |
| Record Nr. | UNINA-9910349426103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Risks and Security of Internet and Systems [[electronic resource] ] : 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay
| Risks and Security of Internet and Systems [[electronic resource] ] : 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (VIII, 239 p. 67 illus.) |
| Disciplina | 004.67 |
| Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
| Soggetto topico |
Data protection
Software engineering Data encryption (Computer science) Computer organization Computers Application software Security Software Engineering/Programming and Operating Systems Cryptology Computer Systems Organization and Communication Networks Theory of Computation Information Systems Applications (incl. Internet) |
| ISBN | 3-319-54876-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Protection of Personal Data -- CLiKC: A privacy-mindful approach when sharing data -- Ransomware and the Legacy Crypto API -- Risk and Security Analysis Methodology -- A Formal Verification of Safe Update Point Detection in Dynamic Software Updating -- Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams -- Towards the weaving of the characteristics of good security requirements -- Methodology for Security -- Towards Empirical Evaluation of Automated Risk Assessment Methods -- An n-sided polygonal model to calculate the impact of cyber security events -- Security and Formal Methods -- SPTool – equivalence checker for SAND attack trees -- Formal Verification of a Memory Allocation Module of Contiki with Frama-C: a Case Study -- Network Security -- A Proactive Stateful Firewall for Software Defined Networking -- Protocol Reverse Engineering: Challenges and Obfuscation -- Detection and Monitoring -- Detecting anomalous behavior in DBMS logs -- Online link disclosure strategies for social networks -- A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory -- Cryptography -- High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication -- Improving Side-Channel Attacks against Pairing-Based Cryptography -- A First DFA on PRIDE: from Theory to Practice. |
| Record Nr. | UNISA-996466334003316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Risks and Security of Internet and Systems : 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay
| Risks and Security of Internet and Systems : 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (VIII, 239 p. 67 illus.) |
| Disciplina | 004.67 |
| Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
| Soggetto topico |
Data protection
Software engineering Data encryption (Computer science) Computer organization Computers Application software Security Software Engineering/Programming and Operating Systems Cryptology Computer Systems Organization and Communication Networks Theory of Computation Information Systems Applications (incl. Internet) |
| ISBN | 3-319-54876-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Protection of Personal Data -- CLiKC: A privacy-mindful approach when sharing data -- Ransomware and the Legacy Crypto API -- Risk and Security Analysis Methodology -- A Formal Verification of Safe Update Point Detection in Dynamic Software Updating -- Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams -- Towards the weaving of the characteristics of good security requirements -- Methodology for Security -- Towards Empirical Evaluation of Automated Risk Assessment Methods -- An n-sided polygonal model to calculate the impact of cyber security events -- Security and Formal Methods -- SPTool – equivalence checker for SAND attack trees -- Formal Verification of a Memory Allocation Module of Contiki with Frama-C: a Case Study -- Network Security -- A Proactive Stateful Firewall for Software Defined Networking -- Protocol Reverse Engineering: Challenges and Obfuscation -- Detection and Monitoring -- Detecting anomalous behavior in DBMS logs -- Online link disclosure strategies for social networks -- A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory -- Cryptography -- High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication -- Improving Side-Channel Attacks against Pairing-Based Cryptography -- A First DFA on PRIDE: from Theory to Practice. |
| Record Nr. | UNINA-9910484507603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Smart card research and advanced application : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proeedings / / [edited by] Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny
| Smart card research and advanced application : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proeedings / / [edited by] Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | New York, : Springer, 2010 |
| Descrizione fisica | 1 online resource (X, 239 p. 78 illus.) |
| Disciplina | 004.6 |
| Altri autori (Persone) |
GollmannDieter
LanetJean-Louis Iguchi-CartignyJulien |
| Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
| Soggetto topico | Smart cards |
| ISBN |
1-280-38627-4
9786613564191 3-642-12510-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Mathematical Algorithms -- The Polynomial Composition Problem in (?/n?)[X] -- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension -- Secure Delegation of Elliptic-Curve Pairing -- Side Channel Analysis -- Side-Channel Leakage across Borders -- Designing a Side Channel Resistant Random Number Generator -- Simple Power Analysis on Exponentiation Revisited -- Atomicity Improvement for Elliptic Curve Scalar Multiplication -- Systems -- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale -- Firewall Mechanism in a User Centric Smart Card Ownership Model -- Logical Attacks -- Combined Attacks and Countermeasures -- Attacks on Java Card 3.0 Combining Fault and Logical Attacks -- Fault Analysis -- Improved Fault Analysis of Signature Schemes -- When Clocks Fail: On Critical Paths and Clock Faults -- Privacy -- Modeling Privacy for Off-Line RFID Systems -- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings -- On the Design and Implementation of an Efficient DAA Scheme. |
| Record Nr. | UNINA-9910483369703321 |
| New York, : Springer, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Smart Card Research and Advanced Applications [[electronic resource] ] : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings / / edited by Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny
| Smart Card Research and Advanced Applications [[electronic resource] ] : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings / / edited by Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny |
| Edizione | [1st ed. 2010.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
| Descrizione fisica | 1 online resource (X, 239 p. 78 illus.) |
| Disciplina | 004.6 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer communication systems
User interfaces (Computer systems) Computers and civilization Data encryption (Computer science) Management information systems Computer science Algorithms Computer Communication Networks User Interfaces and Human Computer Interaction Computers and Society Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity |
| ISBN |
1-280-38627-4
9786613564191 3-642-12510-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Mathematical Algorithms -- The Polynomial Composition Problem in (?/n?)[X] -- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension -- Secure Delegation of Elliptic-Curve Pairing -- Side Channel Analysis -- Side-Channel Leakage across Borders -- Designing a Side Channel Resistant Random Number Generator -- Simple Power Analysis on Exponentiation Revisited -- Atomicity Improvement for Elliptic Curve Scalar Multiplication -- Systems -- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale -- Firewall Mechanism in a User Centric Smart Card Ownership Model -- Logical Attacks -- Combined Attacks and Countermeasures -- Attacks on Java Card 3.0 Combining Fault and Logical Attacks -- Fault Analysis -- Improved Fault Analysis of Signature Schemes -- When Clocks Fail: On Critical Paths and Clock Faults -- Privacy -- Modeling Privacy for Off-Line RFID Systems -- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings -- On the Design and Implementation of an Efficient DAA Scheme. |
| Record Nr. | UNISA-996465620503316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||