top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Public Key Cryptography - PKC 2006 [[electronic resource] ] : 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings / / edited by Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin
Public Key Cryptography - PKC 2006 [[electronic resource] ] : 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings / / edited by Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 543 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Algorithms
Computer networks
Computers and civilization
Electronic data processing—Management
Cryptology
Computer Communication Networks
Computers and Society
IT Operations
ISBN 3-540-33852-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis and Protocol Weaknesses -- New Attacks on RSA with Small Secret CRT-Exponents -- An Attack on a Modified Niederreiter Encryption Scheme -- Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm -- Distributed Crypto-computing -- Efficient Polynomial Operations in the Shared-Coefficients Setting -- Generic On-Line/Off-Line Threshold Signatures -- Linear Integer Secret Sharing and Distributed Exponentiation -- Encryption Methods -- Encoding-Free ElGamal Encryption Without Random Oracles -- Parallel Key-Insulated Public Key Encryption -- Provably Secure Steganography with Imperfect Sampling -- Cryptographic Hash and Applications -- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited -- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption -- Number Theory Algorithms -- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve -- Efficient Scalar Multiplication by Isogeny Decompositions -- Curve25519: New Diffie-Hellman Speed Records -- Pairing-Based Cryptography -- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman -- Generalization of the Selective-ID Security Model for HIBE Protocols -- Identity-Based Aggregate Signatures -- On the Limitations of the Spread of an IBE-to-PKE Transformation -- Cryptosystems Design and Analysis -- Inoculating Multivariate Schemes Against Differential Attacks -- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol -- High-Order Attacks Against the Exponent Splitting Protection -- Signature and Identification -- New Online/Offline Signature Schemes Without Random Oracles -- Anonymous Signature Schemes -- The Power of Identification Schemes -- Authentication and Key Establishment -- Security Analysis of KEA Authenticated Key Exchange Protocol -- SAS-Based Authenticated Key Agreement -- The Twist-AUgmented Technique for Key Exchange -- Password-Based Group Key Exchange in a Constant Number of Rounds -- Multi-party Computation -- Conditional Oblivious Cast -- Efficiency Tradeoffs for Malicious Two-Party Computation -- PKI Techniques -- On Constructing Certificateless Cryptosystems from Identity Based Encryption -- Building Better Signcryption Schemes with Tag-KEMs -- Security-Mediated Certificateless Cryptography -- k-Times Anonymous Authentication with a Constant Proving Cost.
Record Nr. UNINA-9910483440203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Safety and Security in Multiagent Systems [[electronic resource] ] : Research Results from 2004-2006 / / edited by Mike Barley, Haris Mouratidis, Amy Unruh, Diana F. Gordon-Spears, Paul Scerri, Fabio MASSACCI
Safety and Security in Multiagent Systems [[electronic resource] ] : Research Results from 2004-2006 / / edited by Mike Barley, Haris Mouratidis, Amy Unruh, Diana F. Gordon-Spears, Paul Scerri, Fabio MASSACCI
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (VIII, 343 p.)
Disciplina 006.3
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
User interfaces (Computer systems)
Human-computer interaction
Data protection
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Computer networks
Artificial Intelligence
User Interfaces and Human Computer Interaction
Data and Information Security
Cryptology
IT Operations
Computer Communication Networks
ISBN 3-642-04879-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Methodological Approaches to High-Assurance Systems -- Towards Safe Coordination in Multi-agent Systems -- Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems -- Dependable Multi-agent Systems: Layered Reference Architecture and Representative Mechanisms -- Towards Using Simulation to Evaluate Safety Policy for Systems of Systems -- A Guardian Agent Approach to Safety in Medical Multi-agent Systems -- A Distributed Numerical Approach for Managing Uncertainty in Large-Scale Multi-agent Systems -- Prevention and Response to Harm/Failures -- The First Law of Robotics -- Safe Stochastic Planning: Planning to Avoid Fatal States -- Building Coordinated Real-Time Control Plans -- A Framework for Goal-Based Semantic Compensation in Agent Systems -- Safe Agents in Space: Preventing and Responding to Anomalies in the Autonomous Sciencecraft Experiment -- Stochastic Approaches to Predictability and Unpredictability -- Uncertain Agent Verification through Probabilistic Model-Checking -- Safety and Security Multi-agent Systems -- Coordinating Randomized Policies for Increasing Security in Multiagent Systems -- Safety and Security in Human-Computer Interactions -- Safety in the Context of Coordination via Adjustable Autonomy -- Command and Authorization Services for Multiple Humans Interacting with a Software Control Agent for Advanced Life Support -- Analyzing Dangers in Multiagent Rescue Using DEFACTO -- Using Multi-agent Systems to Specify Safe and Secure Services for Virtual Organisations -- MLBPR: MAS for Large-Scale Biometric Pattern Recognition -- Self-Protection -- Intentional Agents in Defense -- Security and Privacy Issues in Agent-Based Location-Aware Mobile Commerce -- Biologically-Inspired Concepts for Autonomic Self-protection in Multiagent Systems -- Erratum to: Fluid-Like Swarms with Predictable Macroscopic Behavior.
Record Nr. UNISA-996465298703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Safety and Security in Multiagent Systems [[electronic resource] ] : Research Results from 2004-2006 / / edited by Mike Barley, Haris Mouratidis, Amy Unruh, Diana F. Gordon-Spears, Paul Scerri, Fabio MASSACCI
Safety and Security in Multiagent Systems [[electronic resource] ] : Research Results from 2004-2006 / / edited by Mike Barley, Haris Mouratidis, Amy Unruh, Diana F. Gordon-Spears, Paul Scerri, Fabio MASSACCI
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (VIII, 343 p.)
Disciplina 006.3
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
User interfaces (Computer systems)
Human-computer interaction
Data protection
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Computer networks
Artificial Intelligence
User Interfaces and Human Computer Interaction
Data and Information Security
Cryptology
IT Operations
Computer Communication Networks
ISBN 3-642-04879-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Methodological Approaches to High-Assurance Systems -- Towards Safe Coordination in Multi-agent Systems -- Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems -- Dependable Multi-agent Systems: Layered Reference Architecture and Representative Mechanisms -- Towards Using Simulation to Evaluate Safety Policy for Systems of Systems -- A Guardian Agent Approach to Safety in Medical Multi-agent Systems -- A Distributed Numerical Approach for Managing Uncertainty in Large-Scale Multi-agent Systems -- Prevention and Response to Harm/Failures -- The First Law of Robotics -- Safe Stochastic Planning: Planning to Avoid Fatal States -- Building Coordinated Real-Time Control Plans -- A Framework for Goal-Based Semantic Compensation in Agent Systems -- Safe Agents in Space: Preventing and Responding to Anomalies in the Autonomous Sciencecraft Experiment -- Stochastic Approaches to Predictability and Unpredictability -- Uncertain Agent Verification through Probabilistic Model-Checking -- Safety and Security Multi-agent Systems -- Coordinating Randomized Policies for Increasing Security in Multiagent Systems -- Safety and Security in Human-Computer Interactions -- Safety in the Context of Coordination via Adjustable Autonomy -- Command and Authorization Services for Multiple Humans Interacting with a Software Control Agent for Advanced Life Support -- Analyzing Dangers in Multiagent Rescue Using DEFACTO -- Using Multi-agent Systems to Specify Safe and Secure Services for Virtual Organisations -- MLBPR: MAS for Large-Scale Biometric Pattern Recognition -- Self-Protection -- Intentional Agents in Defense -- Security and Privacy Issues in Agent-Based Location-Aware Mobile Commerce -- Biologically-Inspired Concepts for Autonomic Self-protection in Multiagent Systems -- Erratum to: Fluid-Like Swarms with Predictable Macroscopic Behavior.
Record Nr. UNINA-9910484886103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Sailing Routes in the World of Computation [[electronic resource] ] : 14th Conference on Computability in Europe, CiE 2018, Kiel, Germany, July 30 – August 3, 2018, Proceedings / / edited by Florin Manea, Russell G. Miller, Dirk Nowotka
Sailing Routes in the World of Computation [[electronic resource] ] : 14th Conference on Computability in Europe, CiE 2018, Kiel, Germany, July 30 – August 3, 2018, Proceedings / / edited by Florin Manea, Russell G. Miller, Dirk Nowotka
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XV, 434 p. 28 illus.)
Disciplina 511.352
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science—Mathematics
Numerical analysis
Computer science
Electronic data processing—Management
Mathematical Applications in Computer Science
Numerical Analysis
Theory of Computation
IT Operations
ISBN 3-319-94418-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Journey To Computably Enumerable Structures (Tutorial Lectures) -- Polynomial-time Presentations of Algebraic Number Fields (Extended abstract) -- Multiple Permitting and Array Noncomputability -- Degrees of Categoricity for Prime and Homogeneous Models -- Universality in Freezing Cellular Automata -- A Deontic Logic Reasoning Infrastructure -- Optimised Program Extraction for Induction and Coinduction -- Computing Tree Width: From Theory to Practice and Back -- Using Structural Properties for Integer Programs -- From Eventually Different Functions to Pandemic Numberings -- Divide and Conquer Computation of the Multi-String BWT and LCP Array -- Some Observations on Infinitary Complexity -- Taming Koepke's Zoo -- Online Computability and Differentiation in the Cantor Space -- Turing's Vision and Deep Learning -- Computing and Scheduling with Explorable Uncertainty -- Diminishable Parameterized Problems and Strict Polynomial Kernelization -- New Nonterminal Complexity Results for Semi-Conditional Grammars -- Kernelization Lower Bounds for Finding Constant-Size Subgraphs -- On General Sum Approximations of Irrational Numbers -- Computability of Ordinary Differential Equations -- Topological Analysis of Representations -- A Unified Framework for Designing EPTAS's for Load Balancing on Parallel Machines -- Weak Reduction Principle and Computable Metric Spaces -- Decidable and Undecidable Fragments of First-Order Concatenation Theory -- Algorithm Analysis through Proof Complexity -- Computing with SAT Oracles: Past, Present & Future -- The Isometry Degree of a Computable Copy of ℓᵖ -- Algorithmic Statistics and Prediction for Polynomial Time-Bounded Algorithms -- A c.e. Weak Truth Table Degree which is Array Noncomputable and r-maximal -- The Complexity of Tukey Types and Cofinal Types -- Functionals of Type 3 as Realisers of Classical Theorems in Analysis -- Enumeration Degrees and Topology -- A Taxonomy of Deviant Encodings -- Elementary Bi-embeddability Spectra of Structures -- A Generic m-reducibility -- Some Nonstandard Equivalences in Reverse Mathematics -- Bit Complexity of Computing Solutions for Symmetric Hyperbolic Systems of PDEs (Extended abstract) -- What is the Concept of Computation? -- Witness Hiding without Extractors or Simulators -- Algorithms and Geometric Constructions -- Computing with Multisets : A Survey on Reaction Automata Theory.
Record Nr. UNISA-996466185503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Sailing Routes in the World of Computation [[electronic resource] ] : 14th Conference on Computability in Europe, CiE 2018, Kiel, Germany, July 30 – August 3, 2018, Proceedings / / edited by Florin Manea, Russell G. Miller, Dirk Nowotka
Sailing Routes in the World of Computation [[electronic resource] ] : 14th Conference on Computability in Europe, CiE 2018, Kiel, Germany, July 30 – August 3, 2018, Proceedings / / edited by Florin Manea, Russell G. Miller, Dirk Nowotka
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XV, 434 p. 28 illus.)
Disciplina 511.352
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science—Mathematics
Numerical analysis
Computer science
Electronic data processing—Management
Mathematical Applications in Computer Science
Numerical Analysis
Theory of Computation
IT Operations
ISBN 3-319-94418-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Journey To Computably Enumerable Structures (Tutorial Lectures) -- Polynomial-time Presentations of Algebraic Number Fields (Extended abstract) -- Multiple Permitting and Array Noncomputability -- Degrees of Categoricity for Prime and Homogeneous Models -- Universality in Freezing Cellular Automata -- A Deontic Logic Reasoning Infrastructure -- Optimised Program Extraction for Induction and Coinduction -- Computing Tree Width: From Theory to Practice and Back -- Using Structural Properties for Integer Programs -- From Eventually Different Functions to Pandemic Numberings -- Divide and Conquer Computation of the Multi-String BWT and LCP Array -- Some Observations on Infinitary Complexity -- Taming Koepke's Zoo -- Online Computability and Differentiation in the Cantor Space -- Turing's Vision and Deep Learning -- Computing and Scheduling with Explorable Uncertainty -- Diminishable Parameterized Problems and Strict Polynomial Kernelization -- New Nonterminal Complexity Results for Semi-Conditional Grammars -- Kernelization Lower Bounds for Finding Constant-Size Subgraphs -- On General Sum Approximations of Irrational Numbers -- Computability of Ordinary Differential Equations -- Topological Analysis of Representations -- A Unified Framework for Designing EPTAS's for Load Balancing on Parallel Machines -- Weak Reduction Principle and Computable Metric Spaces -- Decidable and Undecidable Fragments of First-Order Concatenation Theory -- Algorithm Analysis through Proof Complexity -- Computing with SAT Oracles: Past, Present & Future -- The Isometry Degree of a Computable Copy of ℓᵖ -- Algorithmic Statistics and Prediction for Polynomial Time-Bounded Algorithms -- A c.e. Weak Truth Table Degree which is Array Noncomputable and r-maximal -- The Complexity of Tukey Types and Cofinal Types -- Functionals of Type 3 as Realisers of Classical Theorems in Analysis -- Enumeration Degrees and Topology -- A Taxonomy of Deviant Encodings -- Elementary Bi-embeddability Spectra of Structures -- A Generic m-reducibility -- Some Nonstandard Equivalences in Reverse Mathematics -- Bit Complexity of Computing Solutions for Symmetric Hyperbolic Systems of PDEs (Extended abstract) -- What is the Concept of Computation? -- Witness Hiding without Extractors or Simulators -- Algorithms and Geometric Constructions -- Computing with Multisets : A Survey on Reaction Automata Theory.
Record Nr. UNINA-9910349417903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Cryptography for Networks [[electronic resource] ] : 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings / / edited by Roberto De Prisco, Moti Yung
Security and Cryptography for Networks [[electronic resource] ] : 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings / / edited by Roberto De Prisco, Moti Yung
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 368 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Electronic data processing—Management
Algorithms
Computers and civilization
Cryptology
Computer Communication Networks
Operating Systems
IT Operations
Computers and Society
ISBN 3-540-38081-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Distributed Systems Security: Foundations -- Edge Eavesdropping Games -- Universally Composable Simultaneous Broadcast -- Signature Schemes Variants -- Relations Among Security Notions for Undeniable Signature Schemes -- Concurrent Blind Signatures Without Random Oracles -- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions -- Block Ciphers Analysis -- Understanding Two-Round Differentials in AES -- Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b -- Anonymity and E-Commerce -- Constant-Size Dynamic k-TAA -- On Secure Orders in the Presence of Faults -- Balancing Accountability and Privacy Using E-Cash (Extended Abstract) -- Public Key Encryption and Key Exchange -- About the Security of MTI/C0 and MQV -- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles -- A New Key Exchange Protocol Based on MQV Assuming Public Computations -- Secret Sharing -- Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants -- Cheating Immune (2,n)-Threshold Visual Secret Sharing -- Rational Secret Sharing, Revisited -- Symmetric Key Cryptanalysis and Randomness -- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) -- Distinguishing Stream Ciphers with Convolutional Filters -- On Statistical Testing of Random Numbers Generators -- Applied Authentication -- Lightweight Email Signatures (Extended Abstract) -- Shoehorning Security into the EPC Tag Standard -- Proof-Carrying Proxy Certificates -- Public Key Related Cryptanalysis -- Cryptanalysis of Rainbow -- An Improved LPN Algorithm -- Invited Talk -- Theory and Practice of Multiparty Computation.
Record Nr. UNISA-996466120803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Cryptography for Networks [[electronic resource] ] : 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings / / edited by Roberto De Prisco, Moti Yung
Security and Cryptography for Networks [[electronic resource] ] : 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings / / edited by Roberto De Prisco, Moti Yung
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 368 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Electronic data processing—Management
Algorithms
Computers and civilization
Cryptology
Computer Communication Networks
Operating Systems
IT Operations
Computers and Society
ISBN 3-540-38081-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Distributed Systems Security: Foundations -- Edge Eavesdropping Games -- Universally Composable Simultaneous Broadcast -- Signature Schemes Variants -- Relations Among Security Notions for Undeniable Signature Schemes -- Concurrent Blind Signatures Without Random Oracles -- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions -- Block Ciphers Analysis -- Understanding Two-Round Differentials in AES -- Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b -- Anonymity and E-Commerce -- Constant-Size Dynamic k-TAA -- On Secure Orders in the Presence of Faults -- Balancing Accountability and Privacy Using E-Cash (Extended Abstract) -- Public Key Encryption and Key Exchange -- About the Security of MTI/C0 and MQV -- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles -- A New Key Exchange Protocol Based on MQV Assuming Public Computations -- Secret Sharing -- Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants -- Cheating Immune (2,n)-Threshold Visual Secret Sharing -- Rational Secret Sharing, Revisited -- Symmetric Key Cryptanalysis and Randomness -- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) -- Distinguishing Stream Ciphers with Convolutional Filters -- On Statistical Testing of Random Numbers Generators -- Applied Authentication -- Lightweight Email Signatures (Extended Abstract) -- Shoehorning Security into the EPC Tag Standard -- Proof-Carrying Proxy Certificates -- Public Key Related Cryptanalysis -- Cryptanalysis of Rainbow -- An Improved LPN Algorithm -- Invited Talk -- Theory and Practice of Multiparty Computation.
Record Nr. UNINA-9910483867003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Self-Stabilizing Systems [[electronic resource] ] : 7th International Symposium, SSS 2005, Barcelona, Spain, October 26-27, 2005 / / edited by Sébastien Tixeuil, Ted Herman
Self-Stabilizing Systems [[electronic resource] ] : 7th International Symposium, SSS 2005, Barcelona, Spain, October 26-27, 2005 / / edited by Sébastien Tixeuil, Ted Herman
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (X, 229 p.)
Disciplina 004.6
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Software engineering
Computers, Special purpose
Computer science
Algorithms
Electronic data processing—Management
Computer Communication Networks
Software Engineering
Special Purpose and Application-Based Systems
Theory of Computation
IT Operations
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Snap-Stabilizing Optimal Binary Search Tree -- Synchronous vs. Asynchronous Unison -- A Snap-Stabilizing DFS with a Lower Space Requirement -- Self-stabilization of Byzantine Protocols -- Self-stabilization with r-Operators Revisited -- Self-stabilization Preserving Compiler -- Self-stabilizing Mobile Node Location Management and Message Routing -- Memory Management for Self-stabilizing Operating Systems -- Code Stabilization -- Stabilizing Certificate Dispersal -- On the Possibility and the Impossibility of Message-Driven Self-stabilizing Failure Detection -- Approximation of Self-stabilizing Vertex Cover Less Than 2 -- Self-stabilization in Spite of Frequent Changes of Networks: Case Study of Mutual Exclusion on Dynamic Rings -- Towards Automatic Convergence Verification of Self-stabilizing Algorithms -- About the Self-stabilization of a Virtual Topology for Self-organization in Ad Hoc Networks.
Record Nr. UNISA-996465729303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Self-Stabilizing Systems [[electronic resource] ] : 7th International Symposium, SSS 2005, Barcelona, Spain, October 26-27, 2005 / / edited by Sébastien Tixeuil, Ted Herman
Self-Stabilizing Systems [[electronic resource] ] : 7th International Symposium, SSS 2005, Barcelona, Spain, October 26-27, 2005 / / edited by Sébastien Tixeuil, Ted Herman
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (X, 229 p.)
Disciplina 004.6
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Software engineering
Computers, Special purpose
Computer science
Algorithms
Electronic data processing—Management
Computer Communication Networks
Software Engineering
Special Purpose and Application-Based Systems
Theory of Computation
IT Operations
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Snap-Stabilizing Optimal Binary Search Tree -- Synchronous vs. Asynchronous Unison -- A Snap-Stabilizing DFS with a Lower Space Requirement -- Self-stabilization of Byzantine Protocols -- Self-stabilization with r-Operators Revisited -- Self-stabilization Preserving Compiler -- Self-stabilizing Mobile Node Location Management and Message Routing -- Memory Management for Self-stabilizing Operating Systems -- Code Stabilization -- Stabilizing Certificate Dispersal -- On the Possibility and the Impossibility of Message-Driven Self-stabilizing Failure Detection -- Approximation of Self-stabilizing Vertex Cover Less Than 2 -- Self-stabilization in Spite of Frequent Changes of Networks: Case Study of Mutual Exclusion on Dynamic Rings -- Towards Automatic Convergence Verification of Self-stabilizing Algorithms -- About the Self-stabilization of a Virtual Topology for Self-organization in Ad Hoc Networks.
Record Nr. UNINA-9910484055203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Sequences and Their Applications - SETA 2010 [[electronic resource] ] : 6th International Conference, Paris, France, September 13-17, 2010. Proceedings / / edited by Claude Carlet, Alexander Pott
Sequences and Their Applications - SETA 2010 [[electronic resource] ] : 6th International Conference, Paris, France, September 13-17, 2010. Proceedings / / edited by Claude Carlet, Alexander Pott
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (X, 465 p. 50 illus.)
Disciplina 515.24
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science—Mathematics
Discrete mathematics
Algorithms
Cryptography
Data encryption (Computer science)
Computer networks
Electronic data processing—Management
Coding theory
Information theory
Discrete Mathematics in Computer Science
Cryptology
Computer Communication Networks
IT Operations
Coding and Information Theory
ISBN 1-280-38916-8
9786613567086
3-642-15874-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Paper -- Low Correlation Zone Sequences -- Algorithmic Aspects -- Decimation Generator of Zadoff-Chu Sequences -- An Algorithm for Constructing a Fastest Galois NLFSR Generating a Given Sequence -- Acquisition Times of Contiguous and Distributed Marker Sequences: A Cross-Bifix Analysis -- Frequency Hopping -- Lower Bounds on the Average Partial Hamming Correlations of Frequency Hopping Sequences with Low Hit Zone -- New Families of Frequency-Hopping Sequences of Length mN Derived from the k-Fold Cyclotomy -- Multiple Access Systems -- User-Irrepressible Sequences -- New Optimal Variable-Weight Optical Orthogonal Codes -- Invited Paper -- Recent Results on Recursive Nonlinear Pseudorandom Number Generators -- Linear Complexity -- A General Approach to Construction and Determination of the Linear Complexity of Sequences Based on Cosets -- On the Autocorrelation and the Linear Complexity of q-Ary Prime n-Square Sequences -- An Improved Approximation Algorithm for Computing the k-Error Linear Complexity of Sequences Using the Discrete Fourier Transform -- Finite Fields -- Transformations on Irreducible Binary Polynomials -- Power Permutations in Dimension 32 -- Character Sums -- Multiplicative Character Sums with Counter-Dependent Nonlinear Congruential Pseudorandom Number Generators -- Ternary Kloosterman Sums Modulo 18 Using Stickelberger’s Theorem -- Merit Factor -- Appended m-Sequences with Merit Factor Greater than 3.34 -- FCSR -- A With-Carry Walsh Transform -- Clock-Controlled FCSR Sequence with Large Linear Complexity -- Vectorial Conception of FCSR -- Hadamard Matrices and Transforms -- Fourier Duals of Björck Sequences -- New Constructions of Complete Non-cyclic Hadamard Matrices, Related Function Families and LCZ Sequences -- Cryptography -- ?4-Nonlinearity of a Constructed Quaternary Cryptographic Functions Class -- A Public Key Cryptosystem Based upon Euclidean Addition Chains -- Optimal Authentication Codes from Difference Balanced Functions -- Invited Paper -- New Extensions and Applications of Welch-Bound-Equality Sequence Sets -- Statistical Analysis -- Evaluation of Randomness Test Results for Short Sequences -- Statistical Analysis of Search for Set of Sequences in Random and Framed Data -- Boolean Functions and Related Problems -- On the Nonlinearity of Discrete Logarithm in -- On a Conjecture about Binary Strings Distribution -- Nega–Hadamard Transform, Bent and Negabent Functions -- Synchronization of Boolean Dynamical Systems: A Spectral Characterization -- Nonbinary Sequences -- Some Constructions of Almost-Perfect, Odd-Perfect and Perfect Polyphase and Almost-Polyphase Sequences -- Almost p-Ary Perfect Sequences -- Sequences, Bent Functions and Jacobsthal Sums -- Infinite Sequences -- Infinite Sequences with Finite Cross-Correlation -- Invited Paper -- Reed Muller Sensing Matrices and the LASSO.
Record Nr. UNISA-996465894003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui