| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910691247703321 |
|
|
Autore |
Li Allen |
|
|
Titolo |
Defense acquisitions [[electronic resource] ] : observations on the procurement of the Navy/Marine Corps intranet : statement for the record / / by Allen Li, associate director, Defense Acquisitions Issues, National Security and International Affairs Division, and Jack L. Brock, Jr., director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Subcommittees on Military Readiness and Military Research and Development, Committee on Armed Services, House of Representatives |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
[Washington, D.C.] : , : U.S. General Accounting Office, , [2000] |
|
|
|
|
|
|
|
Collana |
|
Testimony ; ; GAO/T-NSIAD/AIMD-00-116 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Soggetti |
|
Intranets (Computer networks) - Purchasing - United States |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"For release ... March 8, 2000." |
Paper version available from the General Accounting Office. |
Title from title screen. |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910695570703321 |
|
|
Titolo |
Active at any size |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
[Bethesda, MD] : , : [National Institute of Diabetes and Digestive and Kidney Diseases, Weight-control Information Network], , [2004] |
|
|
|
|
|
|
|
|
|
Edizione |
[Rev. Oct. 2006.] |
|
|
|
|
|
Descrizione fisica |
|
20 pages, 1 unnumbered page : digital, PDF file |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Soggetti |
|
Overweight persons - Health and hygiene |
Physical fitness |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from title screen (viewed Jan. 30, 2007). |
|
|
|
|
|
|
3. |
Record Nr. |
UNISA996465777603316 |
|
|
Titolo |
Advances in web-age information management : second international conference, waim 2001, xi'an, china, july 9-11, 2001 : proceedings / / edited by X. Sean Wang, Ge Yu, Hongjun Lu |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Germany ; ; New York, United States : , : Springer, , [2001] |
|
©2001 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2001.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XV, 418 p.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 0302-9743 ; ; 2118 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Web databases |
Database management |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Multimedia Databases & High Dimensional Indexing (Session 1A) -- Spatial-Match Iconic Image Retrieval with Ranking in Multimedia Databases -- Similarity-Based Operators in Image Database Systems -- An Efficient High-Dimensional Index Structure Using Cell Signatures for Similarity Search -- Using Object-Relational Database Systems and XML in the Context of an Wireless-Oriented Multimedia Information System -- Information Retrieval & Text Indexing (Session 1B) -- Utilizing the Correlation between Query Keywords for Information Retrieval -- Adjacency Matrix Based Full-Text Indexing Models -- Goal-Oriented Information Retrieval Using Feedback from Users -- Classify Web Document by Key Phrase Understanding -- Data Mining (Session 2A) -- Deriving High Confidence Rules from Spatial Data Using Peano Count Trees -- A Distributed Hierarchical Clustering System for Web Mining -- ARMiner: A Data Mining Tool Based on Association Rules -- An Integrated Classification Rule Management System for Data Mining -- Semistructured Data Management (Session 2B) -- Characterizing Web Document Change -- Identification of Syntactically Similar DTD Elements for Schema Matching -- An XML Based Electronic Medical Record Integration System -- Enhancing XML Data Processing in Relational System with Indices -- Data Warehousing & Federated Databases (Session 3A) -- A Multidimensional Data Model Supporting Complicated Aggregations -- Comparing String Similarity Measures for Reducing Inconsistency in Integrating Data from Different Sources -- Revisit on View Maintenance in Data Warehouses -- Experiences with a Hybrid Implementation of a Globally Distributed Federated Database System -- Web Information Management & E-commerce (Session 3B) -- Link Based Clustering of Web Search Results -- Three-Tier Clustering: An Online Citation Clustering System -- Introducing Navigation Graphs as a Technique for Improving WWW User Browsing -- The Evolution of the Contract Net Protocol -- Temporal, Spatial & High Dimensional Information Management (Session 4A) -- Semantic Compression of Temporal Data -- Efficiently Computing Weighted Proximity Relationships in Spatial Databases -- Compressing the Index - A Simple and yet Efficient Approximation Approach to High-Dimensional Indexing -- Data Mining & Constraint Management (Session 4B) -- Finding Dense Clusters in Hyperspace: An Approach Based on Row Shuffling -- Modelling Classification Performance for Large Data Sets -- Mapping Referential Integrity Constraints from Relational Databases to XML -- Data Integration & Filtering (Session 5A) -- Attribute Value Extraction and Standardization in Data Integration -- Indexing Attributes and Reordering Profiles for XML Document Filtering and Information Delivery -- An Approach for Data Filtering Based on Rough Set Theory -- Workflow & Adaptive Systems (Session 5B) -- Web-Based Workflow Evolution in ADOME-WFMS -- Meta-data Objects as the Basis for System Evolution -- Adaptive Web Meta-search Enhanced by Constraint-Based Query Constructing and Mapping -- A Mixed Data Dissemination Strategy for Mobile Computing Systems. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the Second International Conference on Web-Age Information Management, WAIM 2001, held in Xi'an, China, in July 2001. The 21 revised full papers and 12 short papers presented together with 4 research experience papers were carefully reviewed and selected for inclusion in the proceedings. The papers are organized in topical sections on multimedia databases and high-dimensional indexing, information retrieval and text indexing, data mining, semistructured data management, data warehousing and federated databases, Web information management and e-commerce, spatio-temporal and high-dimensional information management, data mining and constraint management, data |
|
|
|
|
|
|
|
|
|
|
|
|
|
integration and filtering, and workflow and adaptive systems. |
|
|
|
|
|
|
4. |
Record Nr. |
UNINA9910574075903321 |
|
|
Titolo |
Advances in Cryptology – EUROCRYPT 2022 : 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 – June 3, 2022, Proceedings, Part II / / edited by Orr Dunkelman, Stefan Dziembowski |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2022.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (920 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 13276 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Application software |
Computer networks |
Coding theory |
Information theory |
Cryptology |
Computer and Information Systems Applications |
Computer Communication Networks |
Coding and Information Theory |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- Preface -- Organization -- Contents - Part II -- Cryptographic Protocols -- Single-Server Private Information Retrieval with Sublinear Amortized Time -- 1 Introduction -- 1.1 Our Results -- 1.2 Overview of Techniques -- 1.3 Related Work -- 2 Background -- 2.1 Standard Definitions -- 2.2 Definition of Offline/Online PIR -- 3 Two-Server PIR with a Single-Server Online Phase and Sublinear Amortized Time -- |
|
|
|
|
|
|
|
|
|
Construction 3 -- 4 Single-Server PIR with Sublinear Amortized Time from DCR, QR, DDH, or LWE -- 5 Single-Server PIR with Optimal Amortized Time and Storage from Fully Homomorphic Encryption -- 6 Lower Bounds -- 6.1 Lower Bound for Adaptive Schemes -- 6.2 Lower Bound for Batch PIR with Advice -- 7 Conclusion -- References -- Anamorphic Encryption: Private Communication Against a Dictator -- 1 Introduction -- 2 Related Works -- 3 Our Approach -- 4 Receiver-Anamorphic Encryption -- 4.1 Syntax -- 4.2 Modes of Operation -- 4.3 Security Notion -- 4.4 Properties of the Anamorphic Mode with Normal Encryption -- 4.5 Security of the Fully Anamorphic Mode -- 5 Constructions -- 5.1 Rejection Sampling -- 5.2 The Naor-Yung Transform -- 5.3 The NY Transform Gives Receive-AM Encryption -- 6 Sender-Anamorphic Encryption -- 6.1 Sufficient Conditions for Sender-AM with No Shared Key -- 6.2 Constructions Based on LWE Encryption Schemes -- 7 Conclusion -- References -- A PCP Theorem for Interactive Proofs and Applications -- 1 Introduction -- 1.1 Main Results -- 1.2 A Cryptographic Application to SNARKs -- 2 Techniques -- 2.1 Towards Transforming IPs to IOPs -- 2.2 Local Access to Randomness -- 2.3 Index-Decodable PCPs -- 2.4 Local Access to Prover Messages -- 2.5 Constructing Index-Decodable PCPs -- 2.6 Commit-and Prove SNARKs from Index-Decodable PCPs -- 2.7 Hardness of Approximation -- References. |
Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Technical Overview -- 2 Preliminaries -- 2.1 Non-interactive Zero-Knowledge Proofs of Knowledge in the ROM -- 2.2 Accountable Ring Signatures -- 3 Generic Construction of Accountable Ring Signature and Dynamic Group Signature -- 3.1 Generic Construction of Accountable Ring Signature -- 3.2 Accountable Ring Signature to Dynamic Group Signature -- 3.3 Tightly Secure Variant -- 4 Group-Action-Based Hard Instance Generators and PKEs -- 4.1 Group-Action-Based Hard Instance Generator -- 4.2 Group-Action-Based PKE -- 5 Sigma Protocol for a ``Traceable'' OR Relation -- 5.1 From a Group-Action-Based HIG and PKE to Base Traceable or Sigma Protocol -- 5.2 From Base to Main Traceable or Sigma Protocol -- 5.3 Base Sigma Protocol for the ``Tight'' Relation R-tight -- 6 Multi-proof Online Extractable NIZK from Sigma Protocol main traceable OR sigma protocol -- 7 Instantiations -- References -- Asymmetric PAKE with Low Computation and communication -- 1 Introduction -- 2 Key-Hiding One-Time-Key AKE -- 2.1 2DH as Key-Hiding One-Time-Key AKE -- 2.2 One-Pass HMQV as Key-Hiding One-Time-Key AKE -- 3 Protocol OKAPE: Asymmetric PAKE Construction #1 -- 4 Protocol aEKE: Asymmetric PAKE Construction #2 -- 5 Concrete aPAKE Protocol Instantiations -- 6 Curve Encodings and Ideal Cipher -- A Universally Composable Asymmetric PAKE Model -- B Simulator for Proof of Theorem 3 -- References -- Batch-OT with Optimal Rate -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Technical Overview -- 2.1 Oblivious Transfer from Homomorphic Encryption -- 2.2 Download-Rate Optimal String OT -- 2.3 Our Approach: Recrypting the Receiver's Message -- 2.4 Dealing with LPN Errors -- 2.5 Emulating Small Subgroups -- 3 Preliminaries. |
3.1 Lattices and Gaussians -- 3.2 Distributed GGM-PPRF Correlation -- 4 Compression-Friendly Subgroup Emulation via Gaussian Rounding -- 5 Rate-1 Circuit-Private Linearly Homomorphic Encryption -- 5.1 Construction from DDH -- 6 Co-private Information Retrieval -- 6.1 Definition -- 7 Oblivious Transfer with Overall Rate 1 -- 7.1 The Protocol -- 7.2 Security -- 8 Oblivious Matrix-Vector Product and Oblivious Linear Evaluation with Overall Rate 1 -- 8.1 OLE Protocol -- A |
|
|
|
|
|
|
|
Additional Preliminaries -- A.1 UC Security -- A.2 Learning Parity with Noise -- References -- Adaptively Secure Computation for RAM Programs -- 1 Introduction -- 1.1 Our Results -- 1.2 Our Techniques -- 2 Equivocal ORAM -- 3 RAM-Efficient Equivocal Encryption -- 3.1 Our Construction -- 4 Equivocal Garbled RAM -- 4.1 Our Construction -- 4.2 Putting It Together -- 5 Adaptive Zero-Knowledge for RAM -- 5.1 Splitable Garbling -- 5.2 Our Adaptive UC ZK Protocol -- References -- Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions -- 1 Introduction -- 2 Technical Overview -- 2.1 Our CP-ABE Schemes -- 2.2 On Evasive Lattice Assumptions -- 2.3 Additional Related Work -- 3 Preliminaries -- 3.1 Lattices Background -- 3.2 Attribute-Based Encryption -- 4 Evasive LWE -- 5 Main Constructions -- 5.1 Homomorphic Computation on Matrices -- 5.2 CP-ABE for NC1 Circuits -- 5.3 Optimal Broadcast Encryption -- 5.4 CP-ABE for Polynomial-Depth Circuits -- 6 Discussion on Evasive LWE -- References -- Embedding the UC Model into the IITM Model -- 1 Introduction -- 2 A Brief Overview of the UC and IITM Models -- 2.1 The UC Model -- 2.2 The IITM Model -- 3 Embedding the UC Model in the IITM Model -- 3.1 Main Conceptual Differences -- 3.2 Mapping Protocols -- 3.3 UC Security Implies IITM Security -- 3.4 UC Composition Implies IITM Composition. |
3.5 Capturing Dynamically Generated Machine Code -- 3.6 Discussion: Beyond UC Protocols -- 4 Impossibility of Embedding the IITM Model into the UC Model -- References -- Zero-Knowledge Proofs -- Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier -- 1 Introduction -- 1.1 Our Results -- 1.2 Related Work on Probabilistic Proofs -- 1.3 Related Work on Succinct Arguments -- 2 Techniques -- 2.1 Approach Overview -- 2.2 Construction Overview -- 2.3 From Tensor-Queries to Point-Queries in Zero-Knowledge -- 2.4 Tensor IOP for R1CS with Semi-honest Verifier Zero Knowledge -- 2.5 Hiding Properties of Linear Codes -- 2.6 On Bounded-Query Zero Knowledge -- 2.7 Linear-Time Succinct Arguments from Linear-Time IOPs -- References -- Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Technical Details -- 2 Preliminaries -- 2.1 Function Families -- 2.2 Sampling Procedure -- 2.3 Proof Systems -- 3 AC0[2]-Protocol for Linear Languages -- 4 Fine-Grained NIZK for Linear Languages -- 5 Fine-Grained OR-Proof -- 6 Fine-Grained NIZK Proof for Circuit SAT -- 7 Fine-Grained NIZK for AC0CM[2] with Short Proofs -- 7.1 Definition of Fine-Grained sFHE -- 7.2 Construction of Fine-Grained sFHE -- 7.3 Generic Construction of NIZK -- 8 Fine-Grained Non-Interactive Zap -- 8.1 Verifiable Correlated Key Generation -- 8.2 Construction of Fine-Grained Non-Interactive Zap -- 9 Fine-Grained NIZK in the URS Model -- References -- On Succinct Non-interactive Arguments in Relativized Worlds -- 1 Introduction -- 1.1 Our Results -- 1.2 Related Work -- 2 Techniques -- 2.1 Linear Code Random Oracles -- 2.2 Accumulation Scheme for Low-Degree Random Oracles -- 2.3 A Forking Lemma for Linear Code Random Oracles -- 2.4 A Zero-Finding Game for Low-Degree Random Oracles -- 2.5 SNARKs for Oracle Computations. |
3 Preliminaries -- 3.1 Notations -- 3.2 Non-interactive Arguments in Oracle Models -- 3.3 Accumulation Schemes -- 3.4 Commitment Schemes -- 4 Linear Code Random Oracles -- 4.1 Query Transcripts and Partial Oracles -- 4.2 Constraints -- 4.3 Query Complexity -- 4.4 Low-Degree Random Oracles -- 5 A Forking Lemma for Linear Code Random Oracles -- 6 Oracle Zero-Finding Games -- 7 Accumulation Scheme for Low-Degree Random Oracles -- References -- Families of SNARK-Friendly 2-Chains of Elliptic Curves -- 1 Introduction -- 2 Preliminaries -- 2.1 Background on Bilinear Pairings -- 2.2 zk-SNARKs |
|
|
|
|
|
|
|
|
|
-- 2.3 SNARK-Friendly Chains -- 3 Inner Curves: Barreto-Lynn-Scott (BLS) Curves -- 3.1 Parameters with a Polynomial Form -- 3.2 Faster Co-factor Multiplication -- 3.3 Subgroup Membership Testing: GT -- 3.4 Choosing a Curve Coefficient b=1 -- 3.5 SNARK-Friendly Inner BLS Curves -- 4 Outer Curves: Brezing-Weng, Cocks-Pinch -- 4.1 Generic BW6 Curve Parameters -- 4.2 BW6 with BLS-12 -- 4.3 BW6 with BLS-24 -- 4.4 Two-Chains with Inner BLS and Outer Cocks-Pinch -- 4.5 Comparison of BW6, CP8 and CP12 Outer Curve Performances -- 5 Implementation and Benchmarking -- 5.1 SageMath Library: Derive the Curves -- 5.2 Our Short-List of Curves -- 5.3 Estimated Complexity of a DL Computation in GF(qk) -- 5.4 Golang Library: Implement the Short-List Curves -- 5.5 Benchmarking -- 6 Conclusion -- References -- Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model) -- 1 Introduction -- 1.1 Technical Overview -- 1.2 Related Work -- 2 Preliminaries -- 3 Simulation-Extractability from State-Restoration Unique Response -- 3.1 Simulation-Extractability in the AGM -- 3.2 From Weak Unique Response to Simulation-extractability -- 3.3 Generic Result on Simulation-Extractability -- 4 Non-Malleability of Bulletproofs - Arithmetic Circuits -- 4.1 Algebraic Simulation. |
4.2 State-Restoration Unique Responses. |
|
|
|
|
|
|
Sommario/riassunto |
|
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May – 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security. |
|
|
|
|
|
|
|
| |