1.

Record Nr.

UNISA996465770203316

Titolo

Information Security [[electronic resource] ] : 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings / / edited by Dieter Gollmann, Felix C. Freiling

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012

ISBN

3-642-33383-4

Edizione

[1st ed. 2012.]

Descrizione fisica

1 online resource (XIV, 402 p. 87 illus.)

Collana

Security and Cryptology ; ; 7483

Disciplina

005.8

Soggetti

Seguridad informática

Data encryption (Computer science)

Algorithms

Computer science—Mathematics

Special purpose computers

Computers and civilization

Systems and Data Security

Cryptology

Algorithm Analysis and Problem Complexity

Math Applications in Computer Science

Special Purpose and Application-Based Systems

Computers and Society

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

International conference proceedings.

Nota di bibliografia

Includes bibliographical references and author index.

Nota di contenuto

Privacy-Preserving Speaker Authentication.- Differential Attacks on Reduced RIPEMD-160.- Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.- On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree.- Strong Authentication with Mobile Phone.- Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road.- Domain-Specific Pseudonymous Signatures for the German Identity Card.- Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms.- 100% Connectivity for Location Aware Code



Based KPD in Clustered WSN: Merging Blocks -- Learning Fine-Grained Structured Input for Memory Corruption Detection.- Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.- An Empirical Study of Dangerous Behaviors in Firefox Extensions.- Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems.- Selective Document Retrieval from Encrypted Database.- Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.- Secure Hierarchical Identity-Based Identification without Random Oracles.- Efficient Two-Move Blind Signatures in the Common Reference String Model.- Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.- A Quantitative Approach for Inexact Enforcement of Security Policies.- OSDM: An Organizational Supervised Delegation Model for RBAC.- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library.- A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching.- Intended Actions: Risk Is Conflicting Incentives.- On the Self-similarity Nature of the Revocation Data.  Differential Attacks on Reduced RIPEMD-160.- Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.- On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree.- Strong Authentication with Mobile Phone.- Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road.- Domain-Specific Pseudonymous Signatures for the German Identity Card.- Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms.- 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks -- Learning Fine-Grained Structured Input for Memory Corruption Detection.- Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.- An Empirical Study of Dangerous Behaviors in Firefox Extensions.- Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems.- Selective Document Retrieval from Encrypted Database.- Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.- Secure Hierarchical Identity-Based Identification without Random Oracles.- Efficient Two-Move Blind Signatures in the Common Reference String Model.- Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.- A Quantitative Approach for Inexact Enforcement of Security Policies.- OSDM: An Organizational Supervised Delegation Model for RBAC.- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library.- A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching.- Intended Actions: Risk Is Conflicting Incentives.- On the Self-similarity Nature of the Revocation Data. .

Sommario/riassunto

This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.



2.

Record Nr.

UNISA996465761303316

Titolo

Inductive Logic Programming [[electronic resource] ] : 21st International Conference, ILP 2011, Windsor Great Park, UK, July 31 -- August 3, 2011, Revised Selected Papers / / edited by Stephen Muggleton, Alireza Tamaddoni-Nezhad, Francesca A. Lisi

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012

ISBN

3-642-31951-3

Edizione

[1st ed. 2012.]

Descrizione fisica

1 online resource (XI, 406 p. 130 illus.)

Collana

Lecture Notes in Artificial Intelligence ; ; 7207

Disciplina

005.1/15

Soggetti

Artificial intelligence

Mathematical logic

Computer programming

Computer logic

Computers

Artificial Intelligence

Mathematical Logic and Formal Languages

Programming Techniques

Logics and Meanings of Programs

Computation by Abstract Devices

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Inference and Learning -- Beyond Reward: The Problem of Knowledge and Data -- Exploiting Constraints -- Online Bayesian Inference for the Parameters of PRISM Programs -- Learning Compact Markov Logic Networks with Decision Trees -- Relational Networks of Conditional Preferences -- k-Optimal: A Novel Approximate Inference Algorithm for ProbLog -- Learning Directed Relational Models with Recursive Dependencies -- Integrating Model Checking and Inductive Logic Programming -- Inductive Logic Programming in Answer Set Programming -- Graph-Based Relational Learning with a Polynomial Time Projection Algorithm -- Interleaved Inductive-Abductive Reasoning for Learning Complex Event Models -- Conceptual



Clustering of Multi-Relational Data -- Expressive Power of Safe First-Order Logical Decision Trees -- Relational Learning for Spatial Relation Extraction from Natural.

Sommario/riassunto

This book constitutes the thoroughly refereed post-proceedings of the 21st International Conference on Inductive Logic Programming, ILP 2011, held in Windsor Great Park, UK, in July/August 2011. The 24 revised full papers were carefully reviewed and selected from 66 submissions. Also included are five extended abstracts and three invited talks. The papers represent the diversity and vitality in present ILP research including ILP theory, implementations, probabilistic ILP, biological applications, sub-group discovery, grammatical inference, relational kernels, learning of Petri nets, spatial learning, graph-based learning, and learning of action models.