LEADER 06984nam 22008295 450 001 996465920903316 005 20200701060236.0 024 7 $a10.1007/11542322 035 $a(CKB)1000000000213195 035 $a(SSID)ssj0000319952 035 $a(PQKBManifestationID)11252089 035 $a(PQKBTitleCode)TC0000319952 035 $a(PQKBWorkID)10342355 035 $a(PQKB)11209316 035 $a(DE-He213)978-3-540-31836-1 035 $a(MiAaPQ)EBC3067722 035 $a(PPN)12309688X 035 $a(EXLCZ)991000000000213195 100 $a20100715d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity Protocols$b[electronic resource] $e11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers /$fedited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (X, 354 p.) 225 1 $aSecurity and Cryptology ;$v3364 300 $a"11th in our series of International Workshops on Security Protocols"--Pref. 311 $a3-540-31836-4 311 $a3-540-28389-7 320 $aIncludes bibliographical references and index. 327 $aWhere Have All the Protocols Gone? -- A Protocol?s Life After Attacks... -- A Protocol?s Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols -- Towards a Framework for Autonomic Security Protocols -- Client v. Server Side Protocols, Interfaces and Storage -- Client v. Server Side Protocols, Interfaces and Storage -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Protocol Codesign -- Protocol Codesign -- Enforcing Security Policies for Distributed Objects Applications -- Enforcing Security Policies for Distributed Objects Applications -- Regular SPKI -- Regular SPKI -- Federated Identity-Management Protocols -- Federated Identity-Management Protocols -- Enforcing the Unenforceable -- Is the Verification Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from Weak Secrets -- Panel Session: Is Protocol Modelling Finished? -- WAR: Wireless Anonymous Routing -- WAR: Wireless Anonymous Routing -- Limitations of IPsec Policy Mechanisms -- Limitations of IPsec Policy Mechanisms -- Deniable Authenticated Key Establishment for Internet Protocols -- Deniable Authenticated Key Establishment for Internet Protocols -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- What We Can Learn from API Security -- Addressing New Challenges by Building Security Protocols Around Graphs -- From Security Protocols to Systems Security -- From Security Protocols to Systems Security -- Biometrics to Enhance Smartcard Security -- Biometrics to Enhance Smartcard Security -- Blind Publication: A Copyright Library without Publication or Trust -- Blind Publication: A Copyright Library Without Publication or Trust. 330 $aGreetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was ?Where have all the Protocols gone?? Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion,openupnewlinesofinvestigation,and suggestmoreproblems. The positionpaperspublished herehavebeen revisedby the authors in the light of their participation in the workshop. In addition, we publish edited transcripts of some of the discussions, to give our readers access to some of the roads ahead not (yet) taken. We hope that these revised position papers and edited transcripts will give you at least one interesting idea of your own to explore. Please do write and tell us what it was. Our purpose in publishing these proceedings is to produce a conceptual map which will be of enduring interest, rather than to be merely topical. This is perhaps just as well, given the delay in production. This year we moved to new computer-based recording technology, and of course it failed completely. 410 0$aSecurity and Cryptology ;$v3364 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aOperating systems (Computers) 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aOperating systems (Computers). 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aOperating Systems. 676 $a005.8 702 $aChristianson$b Bruce$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCrispo$b Bruno$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMalcolm$b James A$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRoe$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Workshop on Security Protocols 906 $aBOOK 912 $a996465920903316 996 $aSecurity Protocols$9772025 997 $aUNISA LEADER 05323nam 22007695 450 001 9910686789703321 005 20251225205406.0 010 $a9783031299568$b(electronic bk.) 010 $z9783031299551 024 7 $a10.1007/978-3-031-29956-8 035 $a(MiAaPQ)EBC7233251 035 $a(Au-PeEL)EBL7233251 035 $a(OCoLC)1374876044 035 $a(DE-He213)978-3-031-29956-8 035 $a(PPN)269092900 035 $a(CKB)26383520000041 035 $a(EXLCZ)9926383520000041 100 $a20230331d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aArtificial Intelligence in Music, Sound, Art and Design $e12th International Conference, EvoMUSART 2023, Held as Part of EvoStar 2023, Brno, Czech Republic, April 12?14, 2023, Proceedings /$fedited by Colin Johnson, Nereida Rodríguez-Fernández, Sérgio M. Rebelo 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (438 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13988 311 08$aPrint version: Johnson, Colin Artificial Intelligence in Music, Sound, Art and Design Cham : Springer International Publishing AG,c2023 9783031299551 320 $aIncludes bibliographical references and index. 327 $aLong Talks -- LooperGP: A Loopable Sequence Model for Live Coding Performance using GuitarPro Tablature -- Chordal embeddings based on topology of the tonal space -- Music Generation with Multiple Ant Colonies Interacting on Multilayer Graphs -- Automatically Adding to Artistic Cultures -- Extending Generative Neo-Riemannian Theory for Event-based Soundtrack Production -- Is beauty in the age of the beholder -- Extending the Visual Arts experience: Sonifying Paintings with AI -- Application of Neural Architecture Search to Instrument Recognition in Polyphonic Audio -- AI-rmonies of the Spheres -- SUNMASK: Mask Enhanced Control in Step Unrolled Denoising Autoencoders -- SketchSynth: cross-modal control of sound synthesis -- Towards the Evolution of Prompts with MetaPrompter -- Is Writing Prompts Really Making Art -- Using GPT-3 to achieve semantically relevant data sonificiation for an art installation -- Using Autoencoders to Generate Skeleton-based Typography -- Visual Representationof the Internet Consumption in the European Union -- GTR-CTRL: Instrument and Genre Conditioning for Guitar-Focused Music Generation with Transformers -- Artistic Curve Steganography Carried by Musical Audio -- LyricJam Sonic: A Generative System for Real-Time Composition and Musical Improvisation -- Searching For Human Bias Against AI-Composed Music -- Short Talks -- Fabric Sketch Augmentation & Styling via Deep Learning & Image Synthesis -- Transposition of Simple Waveforms from Raw Audio with Deep Learning -- AI-aided Ceramic Sculptures: Bridging Deep Learning with Materiality -- OSC-Qasm: Interfacing Music Software with Quantum Computing -- EvoDesigner: Aiding the exploration of innovative graphic design solutions -- Improving Automatic Music Genre Classification Systems by Using Descriptive Statistical Features of Audio Signals -- Musical Genre Recognition based on Deep Descriptors of Harmony, Instrumentation, and Segments. . 330 $aThis book constitutes the refereed proceedings of the 12th European Conference on Artificial Intelligence in Music, Sound, Art and Design, EvoMUSART 2023, held as part of Evo* 2023, in April 2023, co-located with the Evo* 2023 events, EvoCOP, EvoApplications, and EuroGP. The 20 full papers and 7 short papers presented in this book were carefully reviewed and selected from 55 submissions. They cover a wide range of topics and application areas of artificial intelligence, including generative approaches to music and visual art, deep learning, and architecture. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13988 606 $aComputer science 606 $aMachine learning 606 $aEducation$xData processing 606 $aSignal processing 606 $aInformation storage and retrieval systems 606 $aComputer vision 606 $aTheory of Computation 606 $aMachine Learning 606 $aComputers and Education 606 $aSignal, Speech and Image Processing 606 $aInformation Storage and Retrieval 606 $aComputer Vision 615 0$aComputer science. 615 0$aMachine learning. 615 0$aEducation$xData processing. 615 0$aSignal processing. 615 0$aInformation storage and retrieval systems. 615 0$aComputer vision. 615 14$aTheory of Computation. 615 24$aMachine Learning. 615 24$aComputers and Education. 615 24$aSignal, Speech and Image Processing. 615 24$aInformation Storage and Retrieval. 615 24$aComputer Vision. 676 $a006.3 702 $aJohnson$b Colin$f1941- 702 $aRodri?guez-Ferna?ndez$b Nereida 702 $aRebelo$b Se?rgio M. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910686789703321 996 $aArtificial Intelligence in Music, Sound, Art and Design$92257587 997 $aUNINA