top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology - ASIACRYPT 2009 [[electronic resource] ] : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings / / edited by Mitsuri Matsui
Advances in Cryptology - ASIACRYPT 2009 [[electronic resource] ] : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings / / edited by Mitsuri Matsui
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 722 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer programming
Discrete mathematics
Algorithms
Data structures (Computer science)
Computer science—Mathematics
Cryptology
Programming Techniques
Discrete Mathematics
Algorithm Analysis and Problem Complexity
Data Structures and Information Theory
Discrete Mathematics in Computer Science
Soggetto genere / forma Kongress.
Tokio (2009)
ISBN 3-642-10366-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Block Ciphers -- Related-Key Cryptanalysis of the Full AES-192 and AES-256 -- The Key-Dependent Attack on Block Ciphers -- Cascade Encryption Revisited -- Quantum and Post-Quantum -- Quantum-Secure Coin-Flipping and Applications -- On the Power of Two-Party Quantum Cryptography -- Security Bounds for the Design of Code-Based Cryptosystems -- Hash Functions I -- Rebound Attack on the Full Lane Compression Function -- Rebound Distinguishers: Results on the Full Whirlpool Compression Function -- MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners -- The Intel AES Instructions Set and the SHA-3 Candidates -- Encryption Schemes -- Group Encryption: Non-interactive Realization in the Standard Model -- On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations -- Hierarchical Predicate Encryption for Inner-Products -- Hedged Public-Key Encryption: How to Protect against Bad Randomness -- Multi Party Computation -- Secure Two-Party Computation Is Practical -- Secure Multi-party Computation Minimizing Online Rounds -- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols -- Cryptographic Protocols -- Non-malleable Statistically Hiding Commitment from Any One-Way Function -- Proofs of Storage from Homomorphic Identification Protocols -- Simple Adaptive Oblivious Transfer without Random Oracle -- Hash Functions II -- Improved Generic Algorithms for 3-Collisions -- A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical -- How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! -- Models and Frameworks I -- On the Analysis of Cryptographic Assumptions in the Generic Ring Model -- Zero Knowledge in the Random Oracle Model, Revisited -- A Framework for Universally Composable Non-committing Blind Signatures -- Cryptanalysis: Sqaure and Quadratic -- Cryptanalysis of the Square Cryptosystems -- Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses -- Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? -- Models and Frameworks II -- Security Notions and Generic Constructions for Client Puzzles -- Foundations of Non-malleable Hash and One-Way Functions -- Hash Functions III -- Improved Cryptanalysis of Skein -- Linearization Framework for Collision Attacks: Application to CubeHash and MD6 -- Preimages for Step-Reduced SHA-2 -- Lattice-Based -- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures -- Efficient Public Key Encryption Based on Ideal Lattices -- Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices -- Side Channels -- PSS Is Secure against Random Fault Attacks -- Cache-Timing Template Attacks -- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions -- Signature Schemes with Bounded Leakage Resilience.
Record Nr. UNISA-996465928203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology - CRYPTO 2009 [[electronic resource] ] : 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009, Proceedings / / edited by Shai Halevi
Advances in Cryptology - CRYPTO 2009 [[electronic resource] ] : 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009, Proceedings / / edited by Shai Halevi
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 692 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Algebra
Coding theory
Information theory
Computer security
Computer science—Mathematics
Cryptology
Data Structures and Information Theory
Coding and Information Theory
Systems and Data Security
Discrete Mathematics in Computer Science
Soggetto genere / forma Kongress.
Santa Barbara (Calif., 2009)
ISBN 3-642-03356-3
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Key Leakage -- Reconstructing RSA Private Keys from Random Key Bits -- Public-Key Cryptosystems Resilient to Key Leakage -- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model -- Hash-Function Cryptanalysis -- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate -- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 -- Privacy and Anonymity -- Private Mutual Authentication and Conditional Oblivious Transfer -- Randomizable Proofs and Delegatable Anonymous Credentials -- Computational Differential Privacy -- Interactive Proofs and Zero-Knowledge -- Probabilistically Checkable Arguments -- On the Composition of Public-Coin Zero-Knowledge Protocols -- On the Amortized Complexity of Zero-Knowledge Protocols -- Linear Algebra with Sub-linear Zero-Knowledge Arguments -- Block-Cipher Cryptanalysis -- New Birthday Attacks on Some MACs Based on Block Ciphers -- Distinguisher and Related-Key Attack on the Full AES-256 -- Cryptanalysis of C2 -- Modes of Operation -- Message Authentication Codes from Unpredictable Block Ciphers -- How to Encipher Messages on a Small Domain -- Elliptic Curves -- How to Hash into Elliptic Curves -- Batch Binary Edwards -- Cryptographic Hardness -- Solving Hidden Number Problem with One Bit Oracle and Advice -- Computational Indistinguishability Amplification: Tight Product Theorems for System Composition -- Merkle Puzzles -- Merkle Puzzles Are Optimal — An O(n 2)-Query Attack on Any Key Exchange from a Random Oracle -- Cryptography in the Physical World -- Position Based Cryptography -- Improving the Security of Quantum Protocols via Commit-and-Open -- Attacks on Signature Schemes -- Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures -- How Risky Is the Random-Oracle Model? -- Invited Talk -- Abstraction in Cryptography -- Secret Sharing and Secure Computation -- Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field -- The Round Complexity of Verifiable Secret Sharing Revisited -- Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer -- Cryptography and Game-Theory -- Collusion-Free Multiparty Computation in the Mediated Model -- Privacy-Enhancing Auctions Using Rational Cryptography -- Utility Dependence in Correct and Fair Rational Secret Sharing -- Cryptography and Lattices -- On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem -- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems -- Identity-Based Encryption -- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions -- Cryptographers’ Toolbox -- The Group of Signed Quadratic Residues and Applications -- Short and Stateless Signatures from the RSA Assumption -- Smooth Projective Hashing for Conditionally Extractable Commitments.
Record Nr. UNISA-996465756803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2009 [[electronic resource] ] : 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009, Proceedings / / edited by Antoine Joux
Advances in Cryptology – EUROCRYPT 2009 [[electronic resource] ] : 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009, Proceedings / / edited by Antoine Joux
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XV, 611 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Coding theory
Information theory
Computer communication systems
Computer security
Algorithms
Computer science—Mathematics
Cryptology
Coding and Information Theory
Computer Communication Networks
Systems and Data Security
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Soggetto genere / forma Kongress.
Köln (2009)
ISBN 3-642-01001-6
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security, Proofs and Models (1) -- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening -- Breaking RSA Generically Is Equivalent to Factoring -- Resettably Secure Computation -- On the Security Loss in Cryptographic Reductions -- Hash Cryptanalysis -- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures -- Cryptanalysis of MDC-2 -- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC -- Finding Preimages in Full MD5 Faster Than Exhaustive Search -- Group and Broadcast Encryption -- Asymmetric Group Key Agreement -- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) -- Traitors Collaborating in Public: Pirates 2.0 -- Cryptosystems (1) -- Key Agreement from Close Secrets over Unsecured Channels -- Order-Preserving Symmetric Encryption -- A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier -- Cryptanalysis -- On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis -- Cube Attacks on Tweakable Black Box Polynomials -- Smashing SQUASH-0 -- Cryptosystems (2) -- Practical Chosen Ciphertext Secure Encryption from Factoring -- Realizing Hash-and-Sign Signatures under Standard Assumptions -- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks -- Invited Talk -- Cryptography without (Hardly Any) Secrets ? -- Security, Proofs and Models (2) -- Salvaging Merkle-Damgård for Practical Applications -- On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model -- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme -- On the Portability of Generalized Schnorr Proofs -- Side Channels -- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks -- A Leakage-Resilient Mode of Operation -- Curves -- ECM on Graphics Cards -- Double-Base Number System for Multi-scalar Multiplications -- Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves -- Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields -- Randomness -- Verifiable Random Functions from Identity-Based Key Encapsulation -- Optimal Randomness Extraction from a Diffie-Hellman Element -- A New Randomness Extraction Paradigm for Hybrid Encryption.
Record Nr. UNISA-996466018603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Databases and Information Systems [[electronic resource] ] : Associated Workshops and Doctoral Consortium of the 13th East European Conference, ADBIS 2009, Riga, Lativia, September 7-10, 2009. Revised Selected Papers / / edited by Janis Grundspenkis, Marite Kirikova, Yannis Manolopoulos, Leonids Novickis
Advances in Databases and Information Systems [[electronic resource] ] : Associated Workshops and Doctoral Consortium of the 13th East European Conference, ADBIS 2009, Riga, Lativia, September 7-10, 2009. Revised Selected Papers / / edited by Janis Grundspenkis, Marite Kirikova, Yannis Manolopoulos, Leonids Novickis
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (258 p. 100 illus.)
Disciplina 005.74
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data structures (Computer science)
Database management
Information storage and retrieval
Data mining
Application software
Computer simulation
Data Structures and Information Theory
Database Management
Information Storage and Retrieval
Data Mining and Knowledge Discovery
Information Systems Applications (incl. Internet)
Simulation and Modeling
Soggetto genere / forma Kongress.
Riga (2009)
ISBN 1-280-38591-X
9786613563835
3-642-12082-2
Classificazione DAT 600f
DAT 650f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Virtual Reality Platforms for Education and Training in Industry -- Virtual Reality Platforms for Education and Training in Industry -- Evaluating Students’ Concept Maps in the Concept Map Based Intelligent Knowledge Assessment System -- Agent-Based Simulation Use in Multi-step Training Systems Based on Applicant’s Character Recognition -- Application of Information Technologies to Active Teaching in Logistic Information Systems -- Building a Learner Psychophysiological Model Based Adaptive e-Learning System: A General Framework and Its Implementation -- Quality of Study Programs: An Ecosystems Perspective -- Learning Support and Legally Ruled Collaboration in the VirtualLife Virtual World Platform -- Rule-Based Management of Schema Changes at ETL Sources -- Multiversion Spatio-temporal Telemetric Data Warehouse -- Indexing Multiversion Data Warehouse: From ROWID-Based Multiversion Join Index to Bitmap-Based Multiversion Join Index -- Towards Evolving Constraints in Data Transformation for XML Data Warehousing -- Semantic Optimization of XQuery by Rewriting -- XCase - A Tool for Conceptual XML Data Modeling -- Linear Systems for Regular Hedge Languages -- Element Algebra -- Shall I Trust a Recommendation? Towards an Evaluation of the Trustworthiness of Recommender Sites -- Comment Classification for Internet Auction Platforms -- ProtoTrust: An Environment for Improved Trust Management in Internet Auctions -- Extending Trust in Peer-to-Peer Networks -- Business Rule Model Integration into the Model of Transformation Driven Software Development -- From Requirements to Code in a Model Driven Way -- What Is CIM: An Information System Perspective -- Category Theoretic Integration Framework for Formal Notations in Model Driven Software Engineering -- Application of BPMN Instead of GRAPES for Two-Hemisphere Model Driven Approach -- Doctoral Consortium Section -- Using Force-Based Graph Layout for Clustering of Relational Data -- Data Structures for Multiversion Data Warehouse -- Location Based Information Storage and Dissemination in Vehicular Ad Hoc Networks -- Software Development with the Emphasis on Topology -- Towards an XML Schema for Configuration of Project Management Information Systems: Conceptual Modelling -- Clustering XML Documents by Structure -- Multidimensional Business Process Modeling Approach.
Record Nr. UNISA-996465339103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Databases and Information Systems [[electronic resource] ] : 13th East European Conference, ADBIS 2009, Riga, Latvia, September 7-10, 2009, Proceedings / / edited by Janis Grundspenkis, Tadeusz Morzy, Gottfried Vossen
Advances in Databases and Information Systems [[electronic resource] ] : 13th East European Conference, ADBIS 2009, Riga, Latvia, September 7-10, 2009, Proceedings / / edited by Janis Grundspenkis, Tadeusz Morzy, Gottfried Vossen
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 379 p.)
Disciplina 005.74
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data structures (Computer science)
Database management
Data mining
Application software
Information storage and retrieval
Multimedia information systems
Data Structures and Information Theory
Database Management
Data Mining and Knowledge Discovery
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Multimedia Information Systems
Soggetto genere / forma Kongress.
Riga (2009)
ISBN 3-642-03973-1
Classificazione DAT 600f
DAT 650f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Sausalito: An Application Servers for RESTful Services in the Cloud -- Business Processes -- Versions to Address Business Process Flexibility Issue -- A Rule-Based Modeling for the Description of Flexible and Self-healing Business Processes -- Business Process Aware IS Change Management in SMEs -- Design Issues -- Performance Driven Database Design for Scalable Web Applications -- Generic Entity Resolution in Relational Databases -- Tool Support for the Design and Management of Spatial Context Models -- Advanced Query Processing -- Efficient Set Similarity Joins Using Min-prefixes -- Probabilistic Granule-Based Inside and Nearest Neighbor Queries -- Window Update Patterns in Stream Operators -- Query Processing and Optimization -- Systematic Exploration of Efficient Query Plans for Automated Database Restructuring -- Using Structural Joins and Holistic Twig Joins for Native XML Query Optimization -- Approximate Rewriting of Queries Using Views -- Query Languages -- SQL Triggers Reacting on Time Events: An Extension Proposal -- Pushing Predicates into Recursive SQL Common Table Expressions -- On Containment of Conjunctive Queries with Negation -- Indexing and Caching -- Optimizing Maintenance of Constraint-Based Database Caches -- The Onion-Tree: Quick Indexing of Complex Data in the Main Memory -- Data Integration -- Cost-Based Vectorization of Instance-Based Integration Processes -- Empowering Provenance in Data Integration -- Applications -- Detecting Moving Objects in Noisy Radar Data Using a Relational Database -- Study of Dependencies in Executions of E-Contract Activities -- Object Tag Architecture for Innovative Intelligent Transportation Systems -- Portpourri -- Conceptual Universal Database Language: Moving Up the Database Design Levels -- Temporal Data Classification Using Linear Classifiers -- SPAX – PAX with Super-Pages.
Record Nr. UNISA-996465758603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Information and Computer Security [[electronic resource] ] : 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings / / edited by Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki
Advances in Information and Computer Security [[electronic resource] ] : 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings / / edited by Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 371 p. 83 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico User interfaces (Computer systems)
Computers and civilization
Computer programming
Computer security
Management information systems
Computer science
Data encryption (Computer science)
User Interfaces and Human Computer Interaction
Computers and Society
Programming Techniques
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Soggetto genere / forma Kongress.
ISBN 3-642-16825-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Automating Security Configuration and Administration: An Access Control Perspective -- Security Metrics and Security Investment Models -- Encryption -- Publishing Upper Half of RSA Decryption Exponent -- PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples -- A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model -- An Improvement of Key Generation Algorithm for Gentry’s Homomorphic Encryption Scheme -- Data and Web Security -- Practical Universal Random Sampling -- Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints -- Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel -- Validating Security Policy Conformance with WS-Security Requirements -- Protocols -- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption -- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage -- Group Signature Implies PKE with Non-interactive Opening and Threshold PKE -- Network Security -- A Generic Binary Analysis Method for Malware -- A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs -- Securing MANET Multicast Using DIPLOMA -- Block Cipher -- Preimage Attacks against Variants of Very Smooth Hash -- Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification -- Mutual Information Analysis under the View of Higher-Order Statistics -- Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter -- Implementation and Real Life Security -- Differential Addition in Generalized Edwards Coordinates -- Efficient Implementation of Pairing on BREW Mobile Phones -- Introducing Mitigation Use Cases to Enhance the Scope of Test Cases -- Optimal Adversary Behavior for the Serial Model of Financial Attack Trees.
Record Nr. UNISA-996466266603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Information and Computer Security [[electronic resource] ] : 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings / / edited by Tsuyoshi Takagi, Masahiro Mambo
Advances in Information and Computer Security [[electronic resource] ] : 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings / / edited by Tsuyoshi Takagi, Masahiro Mambo
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XII, 229 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Computer programming
Operating systems (Computers)
Management information systems
Computer science
Computers and civilization
Systems and Data Security
Computer Communication Networks
Programming Techniques
Operating Systems
Management of Computing and Information Systems
Computers and Society
Soggetto genere / forma Kongress.
Toyama (2009)
ISBN 3-642-04846-3
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- The Future of Cryptographic Algorithms -- Block Cipher -- Bit-Free Collision: Application to APOP Attack -- Impossible Boomerang Attack for Block Cipher Structures -- Improved Distinguishing Attacks on HC-256 -- Cryptographic Protocols -- A Generic Construction of Timed-Release Encryption with Pre-open Capability -- An Efficient Identity-Based Signcryption Scheme for Multiple Receivers -- Universal Designated Verifier Signatures with Threshold-Signers -- Reducing Complexity Assumptions for Oblivious Transfer -- Protection and Intrusion Detection -- Tamper-Tolerant Software: Modeling and Implementation -- An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation -- Efficient Intrusion Detection Based on Static Analysis and Stack Walks -- Authentication -- Strongly Secure Authenticated Key Exchange without NAXOS’ Approach -- ID-Based Group Password-Authenticated Key Exchange -- A Proposal of Efficient Remote Biometric Authentication Protocol.
Record Nr. UNISA-996465664803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Information Retrieval [[electronic resource] ] : 32nd European Conference on IR Research, ECIR 2010, Milton Keynes, UK, March 28-31, 2010. Proceedings / / edited by Cathal Gurrin, Yulan He, Gabriella Kazai, Udo Kruschwitz, Suzanne Little, Thomas Roelleke, Stefan Rüger, Keith van Rijsbergen
Advances in Information Retrieval [[electronic resource] ] : 32nd European Conference on IR Research, ECIR 2010, Milton Keynes, UK, March 28-31, 2010. Proceedings / / edited by Cathal Gurrin, Yulan He, Gabriella Kazai, Udo Kruschwitz, Suzanne Little, Thomas Roelleke, Stefan Rüger, Keith van Rijsbergen
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIX, 677 p.)
Disciplina 005.74
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data mining
Database management
Computer engineering
Information storage and retrieval
Application software
Multimedia information systems
Data Mining and Knowledge Discovery
Database Management
Computer Engineering
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Multimedia Information Systems
Soggetto genere / forma Kongress.
Milton Keynes (2010)
ISBN 1-280-38610-X
9786613564023
3-642-12275-2
Classificazione DAT 616f
DAT 825f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Recent Developments in Information Retrieval -- Recent Developments in Information Retrieval -- Invited Talks -- Web Search Futures: Personal, Collaborative, Social -- IR, NLP, and Visualization -- Image and Natural Language Processing for Multimedia Information Retrieval -- Regular Papers -- A Language Modeling Approach for Temporal Information Needs -- Analyzing Information Retrieval Methods to Recover Broken Web Links -- Between Bags and Trees – Constructional Patterns in Text Used for Attitude Identification -- Improving Medical Information Retrieval with PICO Element Detection -- The Role of Query Sessions in Extracting Instance Attributes from Web Search Queries -- Transliteration Equivalence Using Canonical Correlation Analysis -- Explicit Search Result Diversification through Sub-queries -- Interpreting User Inactivity on Search Results -- Learning to Select a Ranking Function -- Mining Anchor Text Trends for Retrieval -- Predicting Query Performance via Classification -- A Case for Automatic System Evaluation -- Aggregation of Multiple Judgments for Evaluating Ordered Lists -- Evaluation and User Preference Study on Spatial Diversity -- News Comments:Exploring, Modeling, and Online Prediction -- Query Performance Prediction: Evaluation Contrasted with Effectiveness -- A Framework for Evaluating Automatic Image Annotation Algorithms -- BASIL: Effective Near-Duplicate Image Detection Using Gene Sequence Alignment -- Beyond Shot Retrieval: Searching for Broadcast News Items Using Language Models of Concepts -- Ranking Fusion Methods Applied to On-Line Handwriting Information Retrieval -- Improving Query Correctness Using Centralized Probably Approximately Correct (PAC) Search -- Learning to Distribute Queries into Web Search Nodes -- Text Clustering for Peer-to-Peer Networks with Probabilistic Guarantees -- XML Retrieval Using Pruned Element-Index Files -- Category-Based Query Modeling for Entity Search -- Maximum Margin Ranking Algorithms for Information Retrieval -- Query Aspect Based Term Weighting Regularization in Information Retrieval -- Using the Quantum Probability Ranking Principle to Rank Interdependent Documents -- Wikipedia-Based Semantic Smoothing for the Language Modeling Approach to Information Retrieval -- A Performance Prediction Approach to Enhance Collaborative Filtering Performance -- Collaborative Filtering: The Aim of Recommender Systems and the Significance of User Ratings -- Goal-Driven Collaborative Filtering – A Directional Error Based Approach -- Personalizing Web Search with Folksonomy-Based User and Document Profiles -- Tripartite Hidden Topic Models for Personalised Tag Suggestion -- Extracting Multilingual Topics from Unaligned Comparable Corpora -- Improving Retrievability of Patents in Prior-Art Search -- Mining OOV Translations from Mixed-Language Web Pages for Cross Language Information Retrieval -- On Foreign Name Search -- Promoting Ranking Diversity for Biomedical Information Retrieval Using Wikipedia -- Temporal Shingling for Version Identification in Web Archives -- Biometric Response as a Source of Query Independent Scoring in Lifelog Retrieval -- Enabling Interactive Query Expansion through Eliciting the Potential Effect of Expansion Terms -- Evaluation of an Adaptive Search Suggestion System -- How Different Are Language Models andWord Clouds? -- Posters -- Colouring the Dimensions of Relevance -- On Improving Pseudo-Relevance Feedback Using Pseudo-Irrelevant Documents -- Laplacian Co-hashing of Terms and Documents -- Query Difficulty Prediction for Contextual Image Retrieval -- Estimating Translation Probabilities from the Web for Structured Queries on CLIR -- Using Weighted Tagging to Facilitate Enterprise Search -- An Empirical Study of Query Specificity -- Semantically Enhanced Term Frequency -- Crowdsourcing Assessments for XML Ranked Retrieval -- Evaluating Server Selection for Federated Search -- A Comparison of Language Identification Approaches on Short, Query-Style Texts -- Filtering Documents with Subspaces -- User’s Latent Interest-Based Collaborative Filtering -- Evaluating the Potential of Explicit Phrases for Retrieval Quality -- Developing a Test Collection for the Evaluation of Integrated Search -- Retrieving Customary Web Language to Assist Writers -- Enriching Peer-to-Peer File Descriptors Using Association Rules on Query Logs -- Cross-Language High Similarity Search: Why No Sub-linear Time Bound Can Be Expected -- Exploiting Result Consistency to Select Query Expansions for Spoken Content Retrieval -- Statistics of Online User-Generated Short Documents -- Mining Neighbors’ Topicality to Better Control Authority Flow -- Finding Wormholes with Flickr Geotags -- Enhancing N-Gram-Based Summary Evaluation Using Information Content and a Taxonomy -- Demos -- NEAT: News Exploration Along Time -- Opinion Summarization of Web Comments -- EUROGENE: Multilingual Retrieval and Machine Translation Applied to Human Genetics -- Netspeak—Assisting Writers in Choosing Words -- A Data Analysis and Modelling Framework for the Evaluation of Interactive Information Retrieval.
Record Nr. UNISA-996465293603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Intelligent Data Analysis VIII [[electronic resource] ] : 8th International Symposium on Intelligent Data Analysis, IDA 2009, Lyon, France, August 31 - September 2, 2009, Proceedings / / edited by Niall M. Adams, Céline Robardet, Arno Siebes, Jean-Francois Boulicaut
Advances in Intelligent Data Analysis VIII [[electronic resource] ] : 8th International Symposium on Intelligent Data Analysis, IDA 2009, Lyon, France, August 31 - September 2, 2009, Proceedings / / edited by Niall M. Adams, Céline Robardet, Arno Siebes, Jean-Francois Boulicaut
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 418 p.)
Disciplina 006.31222gerDNB
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computers
Information storage and retrieval
Data mining
Pattern recognition
Data structures (Computer science)
Information technology
Business—Data processing
Theory of Computation
Information Storage and Retrieval
Data Mining and Knowledge Discovery
Pattern Recognition
Data Structures
IT in Business
Soggetto genere / forma Kongress.
Lyon (2008)
ISBN 3-642-03915-4
Classificazione DAT 703f
MAT 620f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Intelligent Data Analysis in the 21st Century -- Analyzing the Localization of Retail Stores with Complex Systems Tools -- Selected Contributions 1 (Long Talks) -- Change (Detection) You Can Believe in: Finding Distributional Shifts in Data Streams -- Exploiting Data Missingness in Bayesian Network Modeling -- DEMScale: Large Scale MDS Accounting for a Ridge Operator and Demographic Variables -- How to Control Clustering Results? Flexible Clustering Aggregation -- Compensation of Translational Displacement in Time Series Clustering Using Cross Correlation -- Context-Based Distance Learning for Categorical Data Clustering -- Semi-supervised Text Classification Using RBF Networks -- Improving k-NN for Human Cancer Classification Using the Gene Expression Profiles -- Subgroup Discovery for Test Selection: A Novel Approach and Its Application to Breast Cancer Diagnosis -- Trajectory Voting and Classification Based on Spatiotemporal Similarity in Moving Object Databases -- Leveraging Call Center Logs for Customer Behavior Prediction -- Condensed Representation of Sequential Patterns According to Frequency-Based Measures -- ART-Based Neural Networks for Multi-label Classification -- Two-Way Grouping by One-Way Topic Models -- Selecting and Weighting Data for Building Consensus Gene Regulatory Networks -- Incremental Bayesian Network Learning for Scalable Feature Selection -- Feature Extraction and Selection from Vibration Measurements for Structural Health Monitoring -- Zero-Inflated Boosted Ensembles for Rare Event Counts -- Selected Contributions 2 (Short Talks) -- Mining the Temporal Dimension of the Information Propagation -- Adaptive Learning from Evolving Data Streams -- An Application of Intelligent Data Analysis Techniques to a Large Software Engineering Dataset -- Which Distance for the Identification and the Differentiation of Cell-Cycle Expressed Genes? -- Ontology-Driven KDD Process Composition -- Mining Frequent Gradual Itemsets from Large Databases -- Selecting Computer Architectures by Means of Control-Flow-Graph Mining -- Visualization-Driven Structural and Statistical Analysis of Turbulent Flows -- Distributed Algorithm for Computing Formal Concepts Using Map-Reduce Framework -- Multi-Optimisation Consensus Clustering -- Improving Time Series Forecasting by Discovering Frequent Episodes in Sequences -- Measure of Similarity and Compactness in Competitive Space -- Bayesian Solutions to the Label Switching Problem -- Efficient Vertical Mining of Frequent Closures and Generators -- Isotonic Classification Trees.
Record Nr. UNISA-996465760203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Multimedia Information Processing - PCM 2009 [[electronic resource] ] : 10th Pacific Rim Conference on Multimedia, Bangkok, Thailand, December 15-18, 2009. Proceedings / / edited by Paisarn Muneesawang, Feng Wu, Itsuo Kumazawa, Athikom Roeksabutr, Hong-Yuan Mark Liao, Xiaoou Tang
Advances in Multimedia Information Processing - PCM 2009 [[electronic resource] ] : 10th Pacific Rim Conference on Multimedia, Bangkok, Thailand, December 15-18, 2009. Proceedings / / edited by Paisarn Muneesawang, Feng Wu, Itsuo Kumazawa, Athikom Roeksabutr, Hong-Yuan Mark Liao, Xiaoou Tang
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XXXVII, 1323 p.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Computer communication systems
Multimedia information systems
Optical data processing
Pattern recognition
User interfaces (Computer systems)
Computer Applications
Computer Communication Networks
Multimedia Information Systems
Computer Imaging, Vision, Pattern Recognition and Graphics
Pattern Recognition
User Interfaces and Human Computer Interaction
Soggetto genere / forma Bangkok (2009)
Kongress.
ISBN 1-280-38327-5
9786613561190
3-642-10467-3
Classificazione DAT 670f
DAT 760f
DAT 825f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Paper -- Special Session 1: Exploring Large-Scale Videos: Automatic Content Genre Classification, Repair, Enhancement, and Authentication -- Session 1: Human Behavior Classification and Recognition -- Session 2: Art -- Special Session 2: Image and Video Coding towards Perceptual Quality Improvement -- Session 3: Image Annotation, Retrieval, and Classification -- Session 4: Application -- Session 5: Object Detection and Tracking -- Session 6: Networking Technologies -- Session 7: Audio Processing and Applications -- Special Session 3: 3DTV and Multi-view Video -- Session 8: Image Watermarking -- Session 9: Multimedia Document Search and Retrieval -- Special Session 4: Intelligent Multimedia Security and Forensics (I) -- Session 10: Multimedia Content Management -- Session 11: Image Analysis and Matching -- Special Session 4: Intelligent Multimedia Security and Forensics (II) -- Poster Session 1: Multimedia Analysis and Retrieval -- Poster Session 2: Advanced Image and Video Processing Techniques -- Session 12: Coding -- Poster Session 3: Multimedia Systems and Applications -- Poster Session 4: Multimedia Communication and Networking -- Session 13: Advanced Image Processing Techniques -- Poster Session 5: Multimedia Compression and Optimization -- Poster Session 6: Multimedia Security Rights and Management.
Record Nr. UNISA-996465923003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui