1.

Record Nr.

UNISA996465828003316

Titolo

Cryptology and network security : 6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedings / / Feng Bao [and three others] (editors)

Pubbl/distr/stampa

Berlin, Germany ; ; New York, New York : , : Springer, , [2007]

©2007

ISBN

3-540-76969-2

Edizione

[1st ed. 2007.]

Descrizione fisica

1 online resource (XII, 286 p.)

Collana

Security and Cryptology ; ; 4856

Classificazione

DAT 461f

Disciplina

005.8

Soggetti

Computer networks - Security measures

Cryptography

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Signatures -- Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles -- A Generic Construction for Universally-Convertible Undeniable Signatures -- Fast Digital Signature Algorithm Based on Subgraph Isomorphism -- Efficient ID-Based Digital Signatures with Message Recovery -- Network Security -- Achieving Mobility and Anonymity in IP-Based Networks -- Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary -- Forward-Secure Key Evolution in Wireless Sensor Networks -- A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations -- An Intelligent Network-Warning Model with Strong Survivability -- Running on Karma – P2P Reputation and Currency Systems -- Secure Keyword Search and Private Information Retrieval -- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption -- Extended Private Information Retrieval and Its Application in Biometrics Authentications -- Public Key Encryption -- Strongly Secure Certificateless Public Key Encryption Without Pairing -- Intrusion Detection -- Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems -- Email Security -- How to Secure Your Email Address Book and Beyond -- Denial of Service Attacks -- Toward Non-parallelizable Client Puzzles --



Authentication -- Anonymity 2.0 – X.509 Extensions Supporting Privacy-Friendly Authentication.

Sommario/riassunto

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. The 17 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.

2.

Record Nr.

UNISA996466028303316

Titolo

Implementation and Application of Automata [[electronic resource] ] : 9th International Conference, CIAA 2004, Kingston, Canada, July 22-24, 2004, Revised Selected Papers / / edited by Michael Domaratzki, Alexander Okhotin, Kai Salomaa, Sheng Yu

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005

ISBN

3-540-30500-9

Edizione

[1st ed. 2005.]

Descrizione fisica

1 online resource (XII, 336 p.)

Collana

Theoretical Computer Science and General Issues, , 2512-2029 ; ; 3317

Disciplina

511.3/5

Soggetti

Artificial intelligence

Computer science

Machine theory

Algorithms

Artificial Intelligence

Theory of Computation

Formal Languages and Automata Theory

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Invited Papers -- Automata-Theoretic Techniques for Analyzing Infinite-State Systems -- Enumerating Regular Expressions and Their



Languages -- Contributed Papers -- A General Weighted Grammar Library -- On the Complexity of Hopcroft’s State Minimization Algorithm -- Implementation of Catalytic P Systems -- Code Selection by Tree Series Transducers -- Some Non-semi-decidability Problems for Linear and Deterministic Context-Free Languages -- Brute Force Determinization of NFAs by Means of State Covers -- Computing the Follow Automaton of an Expression -- Viral Gene Compression: Complexity and Verification -- Concatenation State Machines and Simple Functions -- FIRE Station: An Environment for Manipulating Finite Automata and Regular Expression Views -- Finding Finite Automata That Certify Termination of String Rewriting -- Linear Encoding Scheme for Weighted Finite Automata -- The Generalization of Generalized Automata: Expression Automata -- An Automata Approach to Match Gapped Sequence Tags Against Protein Database -- State Complexity of Concatenation and Complementation of Regular Languages -- Minimal Unambiguous ?NFA -- Substitutions, Trajectories and Noisy Channels -- State Complexity and the Monoid of Transformations of a Finite Set -- An Application of Quantum Finite Automata to Interactive Proof Systems (Extended Abstract) -- Time and Space Efficient Algorithms for Constrained Sequence Alignment -- Stochastic Context-Free Graph Grammars for Glycoprotein Modelling -- Parametric Weighted Finite Automata for Figure Drawing -- Regional Finite-State Error Repair -- Approximating Dependency Grammars Through Intersection of Regular Languages -- On the Equivalence-Checking Problem for a Model of Programs Related With Multi-tape Automata -- Poster Papers -- Tight Bounds for NFA to DFCA Transformations for Binary Alphabets -- Simulating the Process of Gene Assembly in Ciliates -- A BDD-Like Implementation of an Automata Package -- Approximation to the Smallest Regular Expression for a Given Regular Language -- Algebraic Hierarchical Decomposition of Finite State Automata: Comparison of Implementations for Krohn-Rhodes Theory -- Does Hausdorff Dimension Measure Texture Complexity? -- Combining Regular Expressions with (Near-)Optimal Brzozowski Automata -- From Automata to Semilinear Sets: A Logical Solution for Sets ( , ) -- Myhill-Nerode Theorem for Sequential Transducers over Unique GCD-Monoids -- Minimalizations of NFA Using the Universal Automaton -- Two-Dimensional Pattern Matching by Two-Dimensional Online Tessellation Automata -- Size Reduction of Multitape Automata -- Testability of Oracle Automata -- Magic Numbers for Symmetric Difference NFAs.

Sommario/riassunto

This volume of Lecture Notes in Computer Science contains the revised versions of the papers presented at the 9th International Conference on Implemen- tion and Application of Automata, CIAA 2004. Also included are the extended abstracts of the posters accepted to the conference. The conference was held at Queen’s University in Kingston, Ontario, Canada on July 22–24, 2004. As for its predecessors, the theme of CIAA 2004 was the implementation of automata and grammars of all types and their application in other ?elds. The topics of the papers presented at the conference range from applications of automata in natural language and speech processing to protein sequencingandgenecompression,andfromstatecomplexityandnewalgorithms for automata operations to applications of quantum ?nite automata. The25regularpapersand14posterpaperswereselectedfrom62submissions totheconference.EachsubmittedpaperwasevaluatedbyatleastthreeProgram Committee members, with the help of external referees. Based on the referee reports, the paper “Substitutions, Trajectories and Noisy Channels” by



L. Kari, S. Konstantinidis and P. Sos´ ?k was chosen as the winner of the CIAA 2004 Best Paper Award. The award is sponsored by the University of California at Santa Barbara. The authors of the papers presented here come from the following countries and regions: Austria, Canada, Czech Republic, Finland, France, Germany, Hong Kong, Netherlands, Portugal, Russia, Slovakia, South Africa, Spain, UK, and USA.