Advances in Cryptology - CRYPTO '88 : Proceedings |
Autore | Goldwasser Shafi |
Pubbl/distr/stampa | New York, NY : , : Springer, , 2008 |
Descrizione fisica | 1 online resource (588 pages) |
Altri autori (Persone) | GoldwasserShafi |
Collana | Lecture Notes in Computer Science |
Soggetto non controllato |
Computers
Cryptography Language Arts & Disciplines |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Lecture Notes in Computer Science -- Foreword -- CRYPT0 '88 -- Table of Contents -- Weakening Security Assumptions and Oblivious Transfer -- Introduction -- Definitions -- Standard forms of oblivious transfer -- Nonstandard transfer mechanism -- Making honest reductions more robust -- The general scenario -- The power of noise -- A philosophical remark -- An outline of our reduction -- Acknowledgments -- Refernces -- Limits on the Provable Consequences of One-way Permutations -- Introduction -- Notation and deflnitions -- Uniform Generation -- Polynomial-time relations -- What is uniform generation? -- P = NP and uniform generation -- An application to cryptography -- Random Oracles -- Random function oracles -- Random oracles and uniform generation -- Random Permutation Oracles -- Cryptographic Lower Bounds -- Introduction -- A normal form for secret-key agreement -- Notation and definitions -- Eve's sample space -- Eve's algorithm -- Intersection queries and the secret -- The efficacy of Eve's algorithm -- Related Work and Open Problems -- Acknowledgements -- References -- Generalized Secret Sharing and Monotone Functions -- Introduction -- Preliminaries -- Generalized Secret Sharing -- Generalized Secret Sharing Homomorphisms -- Conclusions -- Acknowledgements -- References -- Everything Provable is Provable in Zero-Knowledge -- Abstract -- Introduction -- Overview of the construction -- Preliminaxies -- Interactive proof systems -- Arthur-Merlin protocols -- Zero-knowledge -- Preliminary results -- Zero-knowledge proofs for all of NP -- Proof of the main theorem -- Notarized Envelopes: Description and Implement ation -- Introduction to notarized envelopes- -- An implementation of notarized envelopes -- IP in perfect zero-knowledge with envelopes -- References.
A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm -- ABSTRACT -- INTRODUCTION -- Known Results -- Our Results -- PRELIMINARIES -- Promise Problems and Interactive Proofs -- Perfect Zero-Knowledge Proofs for Promise Problems -- The Discrete Logarithm Problem and a Related Promise Problem -- Notations -- THE PROTOCOL FOR DLPl IN Zp' -- Protocol 1 - Perfect Zero Knowledge Proof with respect to the Honest Verifier -- Protocol 2 - Perfect Zero Knowledge Proof with respect to Any Verifier -- EXTENSIONS -- Generalization of the Protocol to other Cyclic Groups -- Generalization of the Results to Acyclic Groups -- REFERENCES -- Zero-Knowledge With Finite State Verifiers -- Abstract. -- Introduction -- Definitions -- An Example -- Zero Knowledge Interactive Proof Systems -- Old and New Definitions -- Languages Having No Zero Knowledge IPS -- A Language With a Recognition Zero Knowledge IPS -- Related Work -- References -- Intractable Problems in Number Theory -- Abstract. -- Introduction -- Problems related to factoring -- Problems related to discrete logarithms -- Algorithms -- Practical considerations -- Acknowledgements -- References -- A Family of Jacobians Suitable for Discrete Log Cryptosystems -- Abstract. -- Theorem. -- Remarks. -- References -- Computation of Approximate L-th Roots Modulo n and Application to Cryptography -- ABSTRACT -- THE PROBLEMS -- HOW PROBLEMS AROSE -- Problem (1) and its variants -- Problems (2a) and (2b) -- THE ALGORITHMS -- Finding roots with small residual -- Without conditions for x -- With conditions for x -- A Euclidean digression -- Come back to our problems -- 2. Finding something about exact mots -- Inferring some partial information about location of % -- Finding x,, with some help -- CONCLUSION -- ACKNOWLEDGEAMENTS -- REFERENCES -- On the McEliece Public-Key Cryptosystem -- Abstract. Introduction -- McEliece's Cryptosystem -- Cryptanalysis of the McEliece Cryptosystem -- Factoring the encryption matix -- Recover message from cryptogram and encryption ma- trix -- Main Idea -- One Bit Swapping Attack -- Number of Swaps -- Work factor -- F'urther Improvements -- Search for one correctable error -- Partial search for two correctable errors -- General Attack -- Reduced Public-Key -- Acknowledgement -- References -- A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers -- Abstract -- Introduction -- The Database -- The Search Technique -- Interactive Mode -- Extensions -- Performance -- Acknowledgement -- References -- On the Existence of Pseudorandom Generators -- INTRODUCTION -- Previous Results -- Our Results -- Subsequent Results -- MAINRESULT -- Preliminaries -- Levin's Criterion: A Modified Version -- Main Ideas -- The Construction of f' -- The game -- Proof of Theorem 2 -- Extensions -- Further Remarks: -- APPLICATIONS : Pseudorandom Generators Based on Particular Intractabil- ity Assumptions -- PRG Based on the Intractability of the General Factoring Problem -- PRG Based on the Intractability of Decoding Random Linear Codes -- PRG Based on the Average Difficulty of Cornbinatorial Problems -- ACKNOWLEDGEMENTS -- REFERENCES -- ON THE RANDOMNESS OF LEGENDRE AND JACOBI SEQUENCES -- Introduction -- Notation -- Known Results On the Distribution of Squares Jlodulo a Prime -- Jacobi Sequences are Harder to Predict than Legendre Sequences -- Emphirical Tests -- Practical Implementation -- Generalizations -- The Linear Congruence hlethod -- Using Other Character Values -- Conclusion and Open Problems -- References -- EFFICIENT, PERFECT RANDOM NUMBER GENERATORS -- Abstract -- The Complexity Assumption for the Polynomial Random Generator -- Hypothesis 2.1 -- Fact 2.2 -- Theorem 2.3 -- Corollary 2.4. Corollary 2.5 -- Theorem 2.6 -- Thearem 2.7 -- 3. The Sequential and the Parallel Polynomial Generator -- Theorem 3.1 -- Theorem 3.2 -- Corollary 3.3 -- Theorem 3.4 -- Theorem 3.5 -- 4. Open Problems: Random Number Generators Based on 1 Prime Modulus -- Problem 4.1. -- Problem 4.2. -- Corollary 4.3 -- How To Sign Given Any Trapdoor Function -- Abstract -- INTRODUCTION -- SIGNATURE SCHEMES AND THEIR SECU- RITY -- Components of a Signature Scheme -- Security against Adaptive Chosen Message Attacks -- TRAPDOOR PERMUTATIONS -- AN OVERVIEW OF THE SCHEME -- Background -- Untitled -- The Signature Scheme -- Why is this Secure? -- THE SCHEME AND PROOF OF SECURITY -- Preliminary Notation and Definitions -- Building Blocks for Signing -- Generating Keys -- What is a Signature? -- The Signing Algorithm and Signature Corpus -- The Verification Algorithm -- Extracting Information From a Forgery -- Proof of Security -- VARIATIONS AND IMPROVEMENTS -- References -- A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge -- ABSTRACT -- Introduction -- The GQ authentication scheme -- Security of the GQ scheme -- Protocols of cooperation between entities -- Entities with same exponent and different identities -- Two entities with the same identity and different expo- nents -- Interactively authenticating both cards and -- Swapping to signatures by removing interactiv- ity -- The identity-based signature scheme -- Exchange authentication: a priori versus a pos- teriori? -- References -- A Modification of the Fiat-Shamir Scheme -- Abstract -- Introduction -- Some Number-Theoretic Results -- Sequential Version -- Parallel Version -- Applications -- Efficiency -- Conclusion -- Acknowledgements -- References -- An Improvement of the Fiat-Shamir Identification and Signature Scheme -- Abstract -- Introduction. -- The original Fiat-Shamir Scheme. The New Improvement -- Remark -- A Basic Theory of Public and Private Cryptosystems -- References -- Proving Security Against Chosen Ciphertext Attacks -- Abstract -- Introduction -- Our Model Versus the Old One -- The Robustness of Our Result -- Applications of our Result -- What's Coming -- Preliminaries -- Notations and Conventions -- Number Theory -- A Complexity Assumption -- Single-Theorem Non-Interactive Zero-Knowledge Proofs -- The Proof System (P,V) -- A Rough Idea of why (P,V) is a Single-Theorem Non- -- Security Against Chosen Ciphertext Attack -- References -- Non-Interactive Zero-Knowledge with Preprocessing -- Abstract -- A quick and dirty exposition of our results -- Introduction -- Preliminaries -- Non-Interactive Zero-Knowledge Proof-Systems -- The model -- Our protocol -- The language V -- The implementation -- Open Problems -- References -- The Noisy Oracle Problem -- Abstract -- Introduction -- TheModel -- Polynomial Time Verifiers -- Knowledge complexity -- Further Research -- References -- On Generating Solved Instances of Computational Problems -- Introduction -- Terminology, Notation, and Conventions -- Invulnerable Generators -- Discussion, Related Work, and Open Problems -- Acknowledgements -- References -- Bounds and Constructions for Authentication - Secrecy Codes with - Splitting -- Secrecy -- Bounds on Pdi and b -- Constructions for authentication codes "with arbi- trary source distribution -- Authentication codes derived from partial geometries -- Authentication codes derived from designs -- References -- Untraceable Electronic Cash t -- Introduction -- Untraceable Coins -- Proving Multiple Spending -- Untraceable Checks -- Blacklisting Withdrawals -- Further Work -- Acknowledgements -- References -- PAYMENT SYSTEMS AND CREDENTIAL MECHANISMS WITH PROVABLE SECURITY AGAINST ABUSE BY INDIVIDUALS -- Summary -- Related Work. Basic Results. |
Record Nr. | UNISA-996465824603316 |
Goldwasser Shafi
![]() |
||
New York, NY : , : Springer, , 2008 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Cryptology - EUROCRYPT '85 : Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques. Linz, Austria, April 9-11 1985 |
Autore | Pichler Franz |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1986 |
Descrizione fisica | 1 online resource (280 pages) |
Collana | Lecture Notes in Computer Science |
Soggetto non controllato |
Computer Security
Cryptography Computers Language Arts & Disciplines |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465821503316 |
Pichler Franz
![]() |
||
Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1986 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Cryptology - EUROCRYPT '87 : Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, the Netherlands, April 13-15, 1987 Proceedings |
Autore | Chaum David |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1988 |
Descrizione fisica | 1 online resource (290 pages) |
Altri autori (Persone) | PriceWyn L |
Collana | Lecture Notes in Computer Science |
Soggetto non controllato |
Computer Security
Cryptography Computers Language Arts & Disciplines |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465823903316 |
Chaum David
![]() |
||
Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1988 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Cryptology - EUROCRYPT '89 : Workshop on the Theory and Application of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989. Proceedings |
Autore | Quisquater Jean-Jacques |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1990 |
Descrizione fisica | 1 online resource (710 pages) |
Altri autori (Persone) | VandewalleJoos |
Collana | Lecture Notes in Computer Science |
Soggetto non controllato |
Cryptography
Computers Language Arts & Disciplines |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465824803316 |
Quisquater Jean-Jacques
![]() |
||
Berlin, Heidelberg : , : Springer Berlin / Heidelberg, , 1990 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in formal Slavic linguistics 2017 / Franc Marušič, Rok Žaucer, Petra Mišmaš |
Autore | Marušič Franc |
Pubbl/distr/stampa | Language Science Press, 2020 |
Descrizione fisica | 1 online resource (1 p.) |
Collana | Open Slavic Linguistics |
Soggetto topico |
Language Arts & Disciplines / Linguistics
Language arts |
Soggetto non controllato |
Language Arts & Disciplines
Linguistics General |
ISBN | 3-96110-253-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910433237203321 |
Marušič Franc | ||
Language Science Press, 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in interpreting research [[electronic resource] ] : inquiry in action / / edited by Brenda Nicodemus, Laurie A. Swabey |
Pubbl/distr/stampa | Amsterdam ; ; Philadelphia, : J. Benjamins, 2011 |
Descrizione fisica | x, 264 p |
Disciplina | 418/.02072 |
Collana | Benjamins translation library |
Soggetto topico |
Translating and interpreting - Research - Methodology
Linguistic models |
Soggetto non controllato |
Translating And Interpreting
Language Arts & Disciplines |
ISBN |
90-272-8302-8
1-283-32901-8 9786613329011 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910781577403321 |
Amsterdam ; ; Philadelphia, : J. Benjamins, 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in interpreting research : inquiry in action / / edited by Brenda Nicodemus, Laurie A. Swabey |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Amsterdam ; ; Philadelphia, : J. Benjamins, 2011 |
Descrizione fisica | x, 264 p |
Disciplina | 418/.02072 |
Collana | Benjamins translation library |
Soggetto topico |
Translating and interpreting - Research - Methodology
Linguistic models |
Soggetto non controllato |
Translating And Interpreting
Language Arts & Disciplines |
ISBN |
90-272-8302-8
1-283-32901-8 9786613329011 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Advances in Interpreting Research -- Editorial page -- Title page -- LCC data -- Table of contents -- Preface -- Introduction -- Genesis of the volume -- Content of the volume -- In closing -- References -- Researching interpreting: Approaches to inquiry -- Introduction -- Diversity -- Epistemology -- Identity -- Methodology -- Conclusion -- References -- Designing a research project: Beginning with the end in mind -- Introduction -- Getting started -- Seeking inspiration -- Refining focus: From topics of interest to researchable questions -- But wait, don't I need a hypothesis? -- Evaluating your questions -- Defining terms and assumptions -- Inventory time -- Now what? The art of being flexible -- Building your research agenda -- Summary and conclusions -- References -- Identifying and interpreting scientific phenomena: Simultaneous challenges to interpreting research -- Introduction -- Adopting a framework for analysis -- Identifying and interpreting scientific phenomena - Developing disciplinary boundaries -- Simultaneous challenges -- Defining the scope of inquiry -- Laying the ground work - Science education -- Moving on to the next stage -- References -- The first three years of a three-year grant: When a research plan doesn't go as planned -- Project description -- Data collection: IRB consent, participants, and filming -- Institutional review board (IRB) informed consent -- Participants -- Actual filming and camera angles -- Transcription -- Coding -- Analysis -- Are you human? -- Interpret or answer? -- Conclusion -- References -- Appendix A -- Appendix B -- Methodology in interpreting studies: A methodological review of evidence-based research -- Introduction -- Research methodologies -- Authorship -- Discussion and conclusion -- References -- Appendix.
If a tree falls in a forest and no one is there to hear it, does it make a noise? The merits of publishing interpreting research -- Publishing: Setting the scene -- The merits of conducting interpreting research -- The merits of publishing interpreting research -- Who can publish interpreting research? -- What should we publish? -- Why should we publish? -- When should we publish? -- Where should we publish? -- How should we publish? -- Interpreter fieldwork research -- Conclusion -- References -- Appendix A -- Appendix B -- "Mark my words": The linguistic, social, and political significance of the assessment -- Introduction -- Test type: Achievement vs. proficiency -- The testing cycle -- The Bologna Process -- Student self-assessment -- Looking forward: Toward better ways of testing SLIs? -- Conclusion -- Acknowledgements -- References -- Developing and transmitting a shared interpreting research ethos: EUMASLI - A case study -- Introduction -- Developing a shared pedagogic approach to research -- Operationalising a research ethos: Five key issues -- Taking stock: So far, so fascinating -- References -- Profession in pentimento: A narrative inquiry into interpreting in video settings -- Prologue -- Disclaimer -- Once upon a time -- The problem -- What is known about video interpreting? -- Past as prologue -- A tale of two settings -- Is this interpreting? -- A modest proposal -- Customer satisfaction -- Profession in pentimento -- Last call -- References -- Through a historical lens: Contextualizing interpreting research -- Introduction -- A little "invisible" driver of history -- A community without linguistic barriers? -- An early family-based solution -- Sign language interpreters and deaf interpreters -- Interpreting "interpreters" throughout history -- Ethnography and history -- Deaf interpreters (ghostwriters?) -- Terminology -- Conclusion. References -- Bimodal bilingual interpreting in the U.S. healthcare system: A critical linguistic activity in need of investigation -- Introduction -- Healthcare access through unimodal and bimodal interpretation -- Research on healthcare interpreting -- The deaf population in the United States -- Legislative mandates affecting language access for U.S. deaf citizens -- Bimodal interpreting as a "culture of practice" -- Specialization as a path to research -- A call to action: Research questions -- Conclusion -- References -- Index. |
Record Nr. | UNINA-9910827454603321 |
Amsterdam ; ; Philadelphia, : J. Benjamins, 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Agency construction and navigation in English learning stories / / Qiuming Lin |
Autore | Lin Qiuming |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore Pte Ltd., , [2023] |
Descrizione fisica | 1 online resource (168 pages) |
Disciplina | 418 |
Soggetto topico |
Applied linguistics
English language - Study and teaching - Chinese speakers Anglès Ensenyament de llengües estrangeres Lingüística aplicada |
Soggetto genere / forma | Llibres electrònics |
Soggetto non controllato |
Linguistics
Language Experience Approach In Education Language Arts & Disciplines Education |
ISBN |
9789819914067
9789819914050 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Acknowledgments -- About This Book -- Contents -- Abbreviations -- List of Figures -- List of Tables -- 1 Introduction -- 1.1 Research Background -- 1.2 Significance of the Study -- 1.3 Organization of the Book -- References -- 2 Human Agency and Its Linguistic Representations -- 2.1 Conceptualizing Agency -- 2.1.1 Agency in Philosophy -- 2.1.2 Agency in Sociology -- 2.1.3 Agency in Applied Linguistics -- 2.2 Investigating Agency of Chinese English-Majors -- 2.2.1 Agency of Second Language Learners -- 2.2.2 Agency of Chinese Learners of English -- 2.2.3 Agency of Chinese English-Majors -- 2.3 Investigating Agency in Oral Autobiographic Narratives -- 2.3.1 Agency in Discourse -- 2.3.2 Agency in Oral Discourse -- 2.3.3 Agency in Oral Autobiographic Narratives -- 2.4 Summary -- References -- 3 Understanding Agency: A Theoretical Framing -- 3.1 Theoretical Foundation -- 3.1.1 Agency as an Identity Dilemma -- 3.1.2 Identity, Investment, Imagined Community -- 3.1.3 Linguistic Realization of Agency -- 3.1.4 Common Grounds -- 3.2 Theoretical Framework -- 3.3 Re-Conceptualizing Agency -- 3.4 Summary -- References -- 4 Observing Agency: An Analytical Framing -- 4.1 Research Questions -- 4.2 Analytical Framework -- 4.3 Participants -- 4.4 Procedure and Methods -- 4.4.1 Data Collection -- 4.4.2 Data Selection -- 4.4.3 Data Analyses -- 4.4.4 Data Interpretation -- 4.4.5 Data Organization -- 4.5 Summary -- References -- 5 Agency Construction -- 5.1 Constructing a High Level of Agency -- 5.1.1 Hunter's Delight -- 5.1.2 Proactive Voices -- 5.1.3 Transitivity Constructions of High Agency -- 5.2 Constructing a Low Level of Agency -- 5.2.1 Erica's Bewilderment -- 5.2.2 Inactive Voices -- 5.2.3 Transitivity Constructions of Low Agency -- 5.3 Blending High and Low Levels of Agency -- 5.4 Discussion: Identity Making and Agency Construction -- 5.5 Summary.
6 Agency Navigation -- 6.1 Intra-discoursal Navigation -- 6.1.1 Vivian's Desire -- 6.1.2 Ambivalent Voices -- 6.1.3 Logico-semantic Navigations of Agency -- 6.2 Cross-Discoursal Navigation -- 6.2.1 Harper's Trajectory -- 6.2.2 A Panorama -- 6.2.3 Online Learning Experience -- 6.3 Discussion: Identity Transformation and Agency Navigation -- 6.4 Summary -- References -- 7 Conclusion -- 7.1 Research Findings -- 7.2 Reflections: Agency, Identity and English Learning -- 7.3 Concluding Remarks -- 7.4 Contributions and Implications -- 7.4.1 Theoretical Contributions -- 7.4.2 Methodological Contributions -- 7.4.3 Pedagogical Implications -- 7.5 Limitations and Suggestions for Further Research -- References -- Appendices -- Appendix A -- Appendix B -- Appendix C -- References. |
Record Nr. | UNINA-9910720090203321 |
Lin Qiuming
![]() |
||
Singapore : , : Springer Nature Singapore Pte Ltd., , [2023] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Agree to Agree : Agreement in the Minimalist Programme / / Katharina Hartmann, Peter W. Smith, Johannes Mursell . Volume 6 |
Autore | Hartmann Katharina |
Pubbl/distr/stampa | Language Science Press, 2020 |
Descrizione fisica | 1 online resource (1 p.) |
Collana | Open Generative Syntax |
Soggetto topico |
Language Arts & Disciplines / Linguistics / Syntax
Language arts |
Soggetto non controllato |
Language Arts & Disciplines
Linguistics Syntax |
ISBN | 3-96110-214-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910433237103321 |
Hartmann Katharina
![]() |
||
Language Science Press, 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The Aladdin Factor : How to Ask for What You Want--And Get It |
Autore | Canfield Jack |
Pubbl/distr/stampa | East Rutherford : , : Penguin Publishing Group, , 1995 |
Descrizione fisica | 1 online resource (253 pages) |
Disciplina | 158.1 |
Altri autori (Persone) | HansenMark Victor |
Soggetto topico |
Self-realization
Interpersonal communication |
Soggetto non controllato |
Interpersonal Communication
Self-Actualization (Psychology) Self-Realization Language Arts & Disciplines Self-Help |
ISBN | 1-101-66635-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910149178103321 |
Canfield Jack
![]() |
||
East Rutherford : , : Penguin Publishing Group, , 1995 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|