| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996466365603316 |
|
|
Titolo |
Cryptology and Network Security [[electronic resource] ] : 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings / / edited by Juan A. Garay, Akira Otsuka |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2009.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIV, 538 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 5888 |
|
|
|
|
|
|
Classificazione |
|
DAT 461f |
DAT 465f |
SS 4800 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Computer communication systems |
Number theory |
Coding theory |
Information theory |
Mathematical logic |
Computer science—Mathematics |
Cryptology |
Computer Communication Networks |
Number Theory |
Coding and Information Theory |
Mathematical Logic and Formal Languages |
Mathematics of Computing |
Kanazawa (2009) |
Kongress. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di contenuto |
|
Cryptographic Protocol and Schemes I -- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima -- Multi Party Distributed Private Matching, Set Disjointness and |
|
|
|
|
|
|
|
|
|
|
|
Cardinality of Set Intersection with Information Theoretic Security -- On Cryptographic Schemes Based on Discrete Logarithms and Factoring -- Invited Talk 1 -- Asymptotically Optimal and Private Statistical Estimation -- Cryptanalysis I -- Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT -- Saturation Attack on the Block Cipher HIGHT -- Extensions of the Cube Attack Based on Low Degree Annihilators -- An Analysis of the Compact XSL Attack on BES and Embedded SMS4 -- Wireless and Sensor Network Security I -- RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks -- Anonymizer-Enabled Security and Privacy for RFID -- Blink ’Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes -- Network Security -- DepenDNS: Dependable Mechanism against DNS Cache Poisoning -- Privacy and Anonymity -- Privacy-Preserving Relationship Path Discovery in Social Networks -- Verifying Anonymous Credential Systems in Applied Pi Calculus -- Transferable Constant-Size Fair E-Cash -- Functional and Searchable Encryption -- A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle -- Private-Key Hidden Vector Encryption with Key Confidentiality -- Invited Talk 2 -- Building Secure Networked Systems with Code Attestation -- Authentication -- HPAKE : Password Authentication Secure against Cross-Site User Impersonation -- An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards -- Ensuring Authentication of Digital Information Using Cryptographic Accumulators -- Block Cipher Design -- MIBS: A New Lightweight Block Cipher -- Cryptanalysis II -- Distinguishing and Second-Preimage Attacks on CBC-Like MACs -- Improving the Rainbow Attack by Reusing Colours -- Side Channel Cube Attack on PRESENT -- Algebraic Attack on the MQQ Public Key Cryptosystem -- Algebraic and Number-Theoretic Schemes -- Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity -- Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves -- On the Complexity of Computing Discrete Logarithms over Algebraic Tori -- Wireless and Sensor Network Security II -- On the Usability of Secure Association of Wireless Devices Based on Distance Bounding -- Short Hash-Based Signatures for Wireless Sensor Networks -- Invited Talk 3 -- Computing on Encrypted Data -- Cryptographic Protocol and Schemes II -- Fully Robust Tree-Diffie-Hellman Group Key Exchange -- Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model -- Relinkable Ring Signature. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009. The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on cryptographic protocols and schemes; cryptanalysis; wireless and sensor security; network security; privacy and anonymity; functional and searchable encryption; authentication; block cipher design; and algebraic and number-theoretic schemes. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910705123703321 |
|
|
Autore |
Maurer David C. |
|
|
Titolo |
Department of Homeland Security : DHS's efforts to improve employee morale and fill senior leadership vacancies : testimony before the Committee on Homeland Security, House of Representatives / / statement of David C. Maurer |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
[Washington, D.C.] : , : United States Government Accountability Office, , 2013 |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (17 pages) : color illustrations |
|
|
|
|
|
|
Collana |
|
Testimony ; ; GAO-14-228T |
|
|
|
|
|
|
Soggetti |
|
Employee morale - United States |
Government executives - Selection and appointment |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from title screen (viewed Feb. 5, 2014). |
"For release ... December 12, 2013." |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910797774803321 |
|
|
Titolo |
Holistic engagement : transformative education for social workers in the 21st century / / edited by Loretta Pyles, Gwendolyn J. Adam |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, New York : , : Oxford University Press, , 2016 |
|
©2016 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[First edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (313 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Social work education |
Holistic education |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
|
|
|
|
|
|
|
4. |
Record Nr. |
UNINA9910484925303321 |
|
|
Titolo |
Machine Learning in Medical Imaging : 7th International Workshop, MLMI 2016, Held in Conjunction with MICCAI 2016, Athens, Greece, October 17, 2016, Proceedings / / edited by Li Wang, Ehsan Adeli, Qian Wang, Yinghuan Shi, Heung-Il Suk |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2016.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIV, 324 p. 127 illus.) |
|
|
|
|
|
|
Collana |
|
Image Processing, Computer Vision, Pattern Recognition, and Graphics, , 3004-9954 ; ; 10019 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer vision |
Pattern recognition systems |
Medical informatics |
Data mining |
Artificial intelligence |
Computer Vision |
Automated Pattern Recognition |
Health Informatics |
Data Mining and Knowledge Discovery |
Artificial Intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 7th International Workshop on Machine Learning in Medical Imaging, MLMI 2016, held in conjunction with MICCAI 2016, in Athens, Greece, in October 2016. The 38 full papers presented in this volume were carefully reviewed and selected from 60 submissions. The main aim of this workshop is to help advance scientific research within the broad field of machine learning in medical imaging. The workshop focuses on major trends and challenges in this area, and presents works aimed to identify new |
|
|
|
|
|
|
|
|
|
|
cutting-edge techniques and their use in medical imaging. |
|
|
|
|
|
| |