01137nam--2200373---450-9900004174602033160-387-98315-50041746USA010041746(ALEPH)000041746USA01004174620010426d1988----km-y0itay0103----baengUS||||||||001yyDiffusion and elliptic operatorsRichard F. BassNew YorkSpringerc1988XIII, 232 p.24 cmProbability and its applications2001Probability and its applicationsEquazioni differenziali alle derivate parziali stocasticheSoluzioni numericheOperatori ellittici519.2BASS,Richard F.535159ITsalbcISBD990000417460203316519.2 BAS10540 ING519.2 BASBKTECPATTY9020010426USA01132420020403USA011650PATRY9020040406USA011629Diffusion and elliptic operators873448UNISA04413nam 2200625 450 991048438440332120211008201152.03-540-85093-710.1007/978-3-540-85093-9(CKB)1000000000490686(SSID)ssj0000715696(PQKBManifestationID)11426947(PQKBTitleCode)TC0000715696(PQKBWorkID)10705484(PQKB)11704133(DE-He213)978-3-540-85093-9(MiAaPQ)EBC3063118(MiAaPQ)EBC6511689(Au-PeEL)EBL6511689(OCoLC)288472112(PPN)128125861(EXLCZ)99100000000049068620211008d2008 uy 0engurnn|008mamaatxtccrInformation theoretic security third international conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. proceedings /Editor, Reihaneh Safavi-Naini1st ed. 2008.Berlin, Germany ;New York, New York :Springer,[2008]©20081 online resource (XI, 249 p.) Security and Cryptology ;5155Includes index.3-540-85092-9 Includes bibliographical references and index.Secure and Reliable Communication I -- Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited Talk) -- Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption -- Quantum Information and Communication -- Interactive Hashing: An Information Theoretic Tool (Invited Talk) -- Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network -- Networks and Devices -- Strong Secrecy for Wireless Channels (Invited Talk) -- Efficient Key Predistribution for Grid-Based Wireless Sensor Networks -- Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk) -- Mulitparty Computation -- A Single Initialization Server for Multi-party Cryptography -- Statistical Security Conditions for Two-Party Secure Function Evaluation -- Information Hiding and Tracing -- Upper Bounds for Set Systems with the Identifiable Parent Property -- Coding Theory and Security -- Oblivious Transfer Based on the McEliece Assumptions -- List Error-Correction with Optimal Information Rate (Invited Talk) -- Quantum Computation -- Theory of Quantum Key Distribution: The Road Ahead (Invited Talk) -- Susceptible Two-Party Quantum Computations -- Secure and Reliable Communication II -- Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary -- Key Refreshing in Wireless Sensor Networks -- Efficient Traitor Tracing from Collusion Secure Codes -- Foundation -- Revisiting the Karnin, Greene and Hellman Bounds -- Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification -- The Complexity of Distinguishing Distributions (Invited Talk) -- Encryption -- Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk) -- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations.This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008. The 14 papers presented in this volume were carefully reviewed and selected from 43 submissions. There were nine invited speeches to the conference. The topics covered are secure and reliable communication; quantum information and communication; networks and devices; multiparty computation; information hiding and tracing; coding theory and security; quantum computation; foundation; and encryption.Security and Cryptology ;5155Data encryption (Computer science)CongressesCryptographyCongressesComputer securityCongressesData encryption (Computer science)CryptographyComputer security004Safavi-Naini ReihanahMiAaPQMiAaPQMiAaPQBOOK9910484384403321Information Theoretic Security773803UNINA02380nam 2200577 450 991047684610332120230120053205.00-262-32869-0(CKB)3710000000380024(EBL)3339964(SSID)ssj0001461934(PQKBManifestationID)12552563(PQKBTitleCode)TC0001461934(PQKBWorkID)11479379(PQKB)10559809(MiAaPQ)EBC3339964(MiAaPQ)EBC5892392(EXLCZ)99371000000038002420150917h20152015 uy 0engur|n|---|||||txtccrDocumenting and assessing learning in informal and media-rich environments /Jay Lemke [and three others]Cambridge, Massachusetts ;London, England :The MIT Press,2015.©20151 online resource (168 p.)John D. and Catherine T. MacArthur Foundation Reports on Digital Media and LearningDescription based upon print version of record.0-262-52774-X Includes bibliographical references.""Contents""; ""Series Foreword""; ""Introduction""; ""Review of the Literature""; ""Highlights of the Expert Meetings""; ""Conclusions and Recommendations""; ""Appendix A: Expert Meeting Participants""; ""Appendix B: Bibliography""; ""Appendix C: Online Resources: Assessment, Funding, and Research""; ""Notes""; ""References""John D. and Catherine T. MacArthur Foundation reports on digital media and learning.Non-formal educationUnited StatesEvaluationNon-formal educationTechnological innovationsUnited StatesEducational innovationsUnited StatesEvaluationEducational evaluationUnited StatesNon-formal educationEvaluation.Non-formal educationTechnological innovationsEducational innovationsEvaluation.Educational evaluation371.26Lemke JayMiAaPQMiAaPQMiAaPQBOOK9910476846103321Documenting and assessing learning in informal and media-rich environments2279631UNINA