Trusted Systems [[electronic resource] ] : Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers / / edited by Liqun Chen, Moti Yung, Liehuang Zhu |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XII, 351 p. 77 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Electronic data processing—Management Computer networks Computers and civilization Information technology—Management Data and Information Security Cryptology IT Operations Computer Communication Networks Computers and Society Computer Application in Administrative Data Processing |
ISBN | 3-642-32298-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Flexible Software Development and Emulation Framework for ARM TrustZone -- Mass Transit Ticketing with NFC Mobile Phones -- Some Improvements to the Cost-Based Framework for Analyzing -- Denial of Service Attacks -- Fault Detection of the MacGuffin Cipher against Differential Fault Attack -- Computationally Sound Symbolic Analysis of EAP-TNC Protocol -- A Technique for Remote Detection of Certain Virtual Machine Monitors -- Indifferentiability of Domain Extension Modes for Hash Functions. |
Record Nr. | UNISA-996465758703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trusted Systems [[electronic resource] ] : Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers / / edited by Liqun Chen, Moti Yung |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XIV, 362 p. 73 illus.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Computer networks
Cryptography Data encryption (Computer science) Electronic data processing—Management Algorithms Computers and civilization Data protection Computer Communication Networks Cryptology IT Operations Computers and Society Data and Information Security |
ISBN | 3-642-25283-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Title -- Preface -- Table of Contents -- Implementation Technology -- Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks -- Introduction -- Related Work -- Our Contribution and Background -- Architecture Overview -- Comparison to Classic TCG Trusted Software Stacks -- Connection and Context Setup -- Using the doTSS Client API -- System Implementation -- Server Architecture -- Client Architecture -- Client/Server Communication Protocol -- doTSS on Embedded Systems -- Conclusion and Future Work -- References -- Design and Implementation of Document Access Control Model Based on Role and Security Policy -- Introduction -- Background and Motivation -- Previous Works -- Challenging Issues -- Our Contributions -- XACML-RBAC Framework -- Document Access Control Model -- Security Requirements of Model -- Security Policy of the Model -- Static Security Rules -- Dynamic Security Rules -- Information Flow Analysis -- Document Access Control System -- Implementation -- Evaluation -- Conclusion and Future Work -- References -- Towards High-Performance IPsec on Cavium OCTEON Platform -- Introduction -- Background -- Cavium OCTEON -- Run-to-Completion vs Pipeline -- IPsec -- Encrypting Algorithms -- IPsec Implementation -- OUTBOUND Design -- INBOUND Design -- Performance Evaluation -- Development Platform and Test Environments -- Experiment on Different Encryption Algorithms and Packet Length -- Experiment on Different Core Numbers -- Experiment on Pipeline and Run-to-Completion Mechanism -- Conclusion -- References -- Security Analysis -- An Abstract Model of a Trusted Platform -- Introduction -- Trusted Computing -- Trusted Platforms -- The Need for Reasoning about Platform Properties -- A CSP Primer -- Why CSP -- An Abstract Model -- Runtime System -- Resources -- Applications -- Platform Configurations.
Platform Instantiation and Property Verification -- Initial Memory Contents -- Component Location Configuration -- Application Logic -- Property Specification and Verification -- Case Study: Cooper's Trusted Grid Platform -- Property Specification -- Common Setup -- Instantiating a Malicious Platform -- Instantiating a Non-malicious Platform -- Property Verification, Results and Discussion -- Performance Results -- Observations -- Application Specification -- Extending Configurations -- State Space Reduction -- Performance and Scalability of the Model -- Related Work -- Conclusion and Future Work -- References -- Modeling TCG-Based Secure Systems with Colored Petri Nets -- Introduction -- Preliminaries -- Trusted Computing -- Colored Petri Nets -- Modeling TCG-Based Secure Systems with CPN -- Basic Model -- Process Management -- Synchronous I/O -- Data Management -- Late Launch -- Case Studies -- Memory Protection in TrustVisor -- Remote Attestation Based on Dynamic Root of Trust -- Related Work -- Secure Systems Based on Trusted Computing -- CPN Based Formal Studies -- Formal Verification on Trusted Computing -- Conclusion -- References -- Information Flow Graph: An Approach to Identifying Covert Storage Channels -- Introduction -- The Information Flow Graph Approach -- Graph Notation and Semantics -- Constructing An Information Flow Graph -- Pruning the Information Flow Graph -- Searching for Information Flow Paths -- Analyzing Operation Sequences -- Example Analyses Using Information Flow Graph -- A Brief Description of the File System Example -- Example Information Flow Graph and Scenario List for File System Example -- Comparison of IFG, CFT and SRM Analyses for the File System Example -- Comparison among SRM, CFT and IFG -- Conclusion and Future Work -- References -- Trusted Subjects Configuration Based on TE Model in MLS Systems. Introduction -- Related Works -- Trusted Subjects Configuration -- Notation for Trusted Subject -- Information Flow Graph -- MLS Policy Information Flow Graph -- Type Enforcement Policy and Entity Information Flow Graph -- Determine the Trusted Subjects -- Security Label Range of Trusted Subjects -- Risk Information Flow Graph -- Risk of Trusted Subjects -- Risk Security -- The Assurance Requirements of Trusted Subjects -- Conclusions -- References -- Cryptographic Aspects (I) -- Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol -- Introduction -- Our Contribution -- Related Work -- Organization of the Paper -- Background and Building Blocks -- Notations -- Review of DAA -- Review of SIGMA Key Exchange Protocol -- Security Model -- Review of Canetti-Krawczyk Key Exchange Model -- Security Model for Key Exchange with Anonymous Authentication -- Proposed DAA-SIGMA Protocol -- Security Proof of the DAA-SIGMA Protocol -- Proof of Property P1 -- Proof of Property P2 -- Discussions and Extensions -- Using Group Signatures Instead of DAA -- Use Certificates Instead of Identities -- Supporting User-Controlled-Traceability and DAA Revocation -- Mutual Anonymous Authentication Using DAA -- Conclusions and Future Work -- References -- Revocation of Direct Anonymous Attestation -- Introduction -- General Concept of DAA Revocation -- Two Approaches -- Security Properties -- Review Three Types of DAA Schemes -- The RSA-DAA Scheme -- The LRSW-DAA Schemes -- The SDH-DAA Schemes -- Review of the Existing Revocation Solutions -- Rekey-Based Revocation -- An Overview -- Rekey in the RSA-DAA Scheme -- Rekey in the LRSW-DAA Schemes -- Rekey in the SDH-DAA Schemes -- Verifier-Local Revocation -- An Overview -- New VLR in the RSA-DAA Scheme -- New VLR in the SDH-DAA Schemes -- Comparisons and Discussions -- Performance Measurement. Comparisons of VLR Methods -- Comparisons between Rekey and VLR Methods -- Using Rekey and VLR Approaches Together -- Conclusions -- References -- Measuring Random Tests by Conditional Entropy and Optimal Execution Order -- Introduction -- Preliminaries -- Principle of a Statistical Test -- NIST Random Test Package -- The Conditional Entropy of the Tests -- The Application of the Entropy -- The Result and Analysis -- The Order of the Tests' Execution -- The Way to Decide the Execution Order -- The Result and Analysis -- Conclusion -- References -- Cryptographic Aspects (II) -- Leakage Resilient Strong Key-Insulated Signatures in Public Channel -- Introduction -- Our Contribution -- Definitions -- Some Impossibility Results -- Our Proposal -- A Concrete Instantiation -- References -- Two-Head Dragon Protocol: Preventing Cloning of Signature Keys -- Introduction -- Previous Work -- Preliminaries -- A Simple Solution -- Target Application Area -- Two-Head Dragon Protocol -- Preliminaries -- Card Deployment -- Signature Creation and Verification -- Situation of an Adversary -- Security Considerations -- Remarks on Cloning Assumptions -- Composition Issues -- Final Remarks -- Further Applications -- Conclusion -- References -- Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing -- Introduction -- Preliminaries -- Model of Unidirectional Proxy Re-encryption -- Review of Chow et al.'s Scheme -- Our Method -- Overview of the Method -- Modifying Chow et al.'s Scheme -- Details of Our Method -- Security Analysis -- Discussions -- Conclusion -- References -- Mobile Trusted Systems -- Can Hand-Held Computers Still Be Better Smart Cards? -- Introduction -- System Requirements and Use Cases -- Background -- Standards in the Field -- Trusted Hardware -- Architecture. Host Computer Smart Card Middlewares and Smart Card Filesystem -- Smart Card Provisioning Server -- Credential Life-Cycle -- Implementation -- Speed Measurements -- Security Analysis -- Related Work -- Conclusions and Future Work -- References -- TruWalletM: Secure Web Authentication on Mobile Platforms -- Introduction -- Model and Requirement Analysis -- Architecture and Design Decisions -- Design Decisions -- Architecture -- Use Cases and Protocols -- Establishing SSL/TLS Connection and Managing Two Logical SSL/TLS Subchannels -- TruWalletM Initialization -- Registration -- Login -- Password Change -- Implementation -- Security Considerations -- Related Work -- Conclusion and Future Work -- References -- A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs -- Introduction -- Background and Motivation -- Related Works -- Challenging Issues -- Our Contributions -- Threat Analysis -- Reputation Mechanism -- Misbehavior Prediction -- Surveillance Game -- Multilevel Surveillance -- Reward and Punishment Scheme -- Surveillance Game Model -- Game Solutions -- Decision Making -- Case Study -- Conclusion -- References -- Hardware Security -- Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software -- Introduction -- Preliminaries and Related Work -- Bug Attacks -- Micro-Architectural Side-Channels -- Fault Attacks -- Activation Mechanisms -- Method 1: Snooping the Data Bus -- Method 2: Snooping Operands of Instructions -- Effects of the Trojan -- Fault Induction -- Timing Variation -- Variation of Power Consumption -- Case Studies -- Attacking AES -- Attacking RSA -- Conclusions -- References -- An Emerging Threat: Eve Meets a Robot -- Introduction -- What is a Robot? -- Security of Robotics -- A Simple Active Attack and a Countermeasure -- Active Attacks on Robots. Information Leakage Attacks on Robots. |
Record Nr. | UNISA-996465682303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trusted Systems [[electronic resource] ] : First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings / / edited by Liqun Chen, Moti Yung |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIV, 263 p. 64 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer science
Computer networks Cryptography Data encryption (Computer science) Electronic data processing—Management Algorithms Computers and civilization Theory of Computation Computer Communication Networks Cryptology IT Operations Computers and Society |
ISBN |
1-280-38811-0
9786613566034 3-642-14597-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talk -- On Design of a Trusted Software Base with Support of TPCM -- Secure Storage -- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing -- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks -- Attestation -- Remote Attestation on Function Execution (Work-in-Progress) -- Scalable Remote Attestation with Privacy Protection -- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation -- Trusted Network -- SocialClouds: Concept, Security Architecture and Some Mechanisms -- Privacy Enhanced Trusted Network Connect -- Research on Multistage Interconnection Architecture and Collision Detection Model -- Virtualization -- Trusted Virtual Domains – Design, Implementation and Lessons Learned -- Trusted Integrity Measurement and Reporting for Virtualized Platforms -- Applications -- A Feather-Weight Application Isolation Model -- Exploring Trust of Mobile Applications Based on User Behaviors -- Trusted Firmware Services Based on TPM -- Supporting Technology -- Improved Cryptanalysis of the FOX Block Cipher -- Bitwise Higher Order Differential Cryptanalysis. |
Record Nr. | UNISA-996465788903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trusted Systems [[electronic resource] ] : First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings / / edited by Liqun Chen, Moti Yung |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIV, 263 p. 64 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer science
Computer networks Cryptography Data encryption (Computer science) Electronic data processing—Management Algorithms Computers and civilization Theory of Computation Computer Communication Networks Cryptology IT Operations Computers and Society |
ISBN |
1-280-38811-0
9786613566034 3-642-14597-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talk -- On Design of a Trusted Software Base with Support of TPCM -- Secure Storage -- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing -- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks -- Attestation -- Remote Attestation on Function Execution (Work-in-Progress) -- Scalable Remote Attestation with Privacy Protection -- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation -- Trusted Network -- SocialClouds: Concept, Security Architecture and Some Mechanisms -- Privacy Enhanced Trusted Network Connect -- Research on Multistage Interconnection Architecture and Collision Detection Model -- Virtualization -- Trusted Virtual Domains – Design, Implementation and Lessons Learned -- Trusted Integrity Measurement and Reporting for Virtualized Platforms -- Applications -- A Feather-Weight Application Isolation Model -- Exploring Trust of Mobile Applications Based on User Behaviors -- Trusted Firmware Services Based on TPM -- Supporting Technology -- Improved Cryptanalysis of the FOX Block Cipher -- Bitwise Higher Order Differential Cryptanalysis. |
Record Nr. | UNINA-9910484457503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Trustworthy Global Computing [[electronic resource] ] : 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers / / edited by Catuscia Palamidessi, Mark D. Ryan |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 213 p. 37 illus.) |
Disciplina | 005.8 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Electronic data processing—Management Algorithms Software engineering Coding theory Information theory Cryptology Computer Communication Networks IT Operations Software Engineering Coding and Information Theory |
ISBN | 3-642-41157-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | From Rational Number Reconstruction to Set Reconciliation and File Synchronization -- Affine Refinement Types for Authentication and Authorization -- Seamless Distributed Computing from the Geometry of Interaction -- A Beginner’s Guide to the DeadLock Analysis Model -- Formal Modeling and Reasoning about the Android Security Framework -- A Type System for Flexible Role Assignment in Multiparty Communicating Systems -- A Multiparty Multi-session Logic -- LTS Semantics for Compensation-Based Processes -- Linking Unlinkability -- Towards Quantitative Analysis of Opacity -- An Algebra for Symbolic Diffie-Hellman Protocol Analysis -- Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability -- Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus. |
Record Nr. | UNISA-996465552703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trustworthy Global Computing [[electronic resource] ] : 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers / / edited by Catuscia Palamidessi, Mark D. Ryan |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 213 p. 37 illus.) |
Disciplina | 005.8 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Electronic data processing—Management Algorithms Software engineering Coding theory Information theory Cryptology Computer Communication Networks IT Operations Software Engineering Coding and Information Theory |
ISBN | 3-642-41157-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | From Rational Number Reconstruction to Set Reconciliation and File Synchronization -- Affine Refinement Types for Authentication and Authorization -- Seamless Distributed Computing from the Geometry of Interaction -- A Beginner’s Guide to the DeadLock Analysis Model -- Formal Modeling and Reasoning about the Android Security Framework -- A Type System for Flexible Role Assignment in Multiparty Communicating Systems -- A Multiparty Multi-session Logic -- LTS Semantics for Compensation-Based Processes -- Linking Unlinkability -- Towards Quantitative Analysis of Opacity -- An Algebra for Symbolic Diffie-Hellman Protocol Analysis -- Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability -- Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus. |
Record Nr. | UNINA-9910482992403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Trustworthy Global Computing [[electronic resource] ] : 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers / / edited by Roberto Bruni, Vladimiro Sassone |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (X, 243 p. 54 illus.) |
Disciplina | 005.82 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Electronic data processing—Management Algorithms Software engineering Coding theory Information theory Cryptology Computer Communication Networks IT Operations Software Engineering Coding and Information Theory |
ISBN | 3-642-30065-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465393803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trustworthy Global Computing [[electronic resource] ] : 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers / / edited by Martin Wirsing, Martin Hofmann, Axel Rauschmayer |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XII, 380 p. 72 illus.) |
Disciplina | 005.8 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Electronic data processing—Management Algorithms Software engineering Coding theory Information theory Cryptology Computer Communication Networks IT Operations Software Engineering Coding and Information Theory |
ISBN |
1-280-38883-8
9786613566751 3-642-15640-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode -- Perspectives in Certificate Translation -- Uniform Labeled Transition Systems for Nondeterministic, Probabilistic, and Stochastic Processes -- Toward a Game-Theoretic Model of Grid Systems -- Functions as Processes: Termination and the -Calculus -- Predicate Encryption for Secure Remote Storage -- Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols -- Types and Processes -- Expressiveness of Generic Process Shape Types -- A Java Inspired Semantics for Transactions in SOC -- Responsive Choice in Mobile Processes -- A Model of Evolvable Components -- Games and Concurrent Systems -- The Impact of Altruism on the Efficiency of Atomic Congestion Games -- Stressed Web Environments as Strategic Games: Risk Profiles and Weltanschauung -- An Algebra of Hierarchical Graphs -- Property-Preserving Refinement of Concurrent Systems -- Certification of Correctness -- Certificate Translation for the Verification of Concurrent Programs -- Certified Result Checking for Polyhedral Analysis of Bytecode Programs -- Tools and Languages -- A Novel Resource-Driven Job Allocation Scheme for Desktop Grid Environments -- A Framework for Rule-Based Dynamic Adaptation -- CarPal: Interconnecting Overlay Networks for a Community-Driven Shared Mobility -- Refactoring Long Running Transactions: A Case Study -- Probabilistic Aspects -- Approximate Model Checking of Stochastic COWS -- Probabilistic Aspects: Checking Security in an Imperfect World -- A Tool for Checking Probabilistic Properties of COWS Services. |
Record Nr. | UNISA-996465907903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trustworthy Global Computing [[electronic resource] ] : 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers / / edited by Martin Wirsing, Martin Hofmann, Axel Rauschmayer |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XII, 380 p. 72 illus.) |
Disciplina | 005.8 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Electronic data processing—Management Algorithms Software engineering Coding theory Information theory Cryptology Computer Communication Networks IT Operations Software Engineering Coding and Information Theory |
ISBN |
1-280-38883-8
9786613566751 3-642-15640-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode -- Perspectives in Certificate Translation -- Uniform Labeled Transition Systems for Nondeterministic, Probabilistic, and Stochastic Processes -- Toward a Game-Theoretic Model of Grid Systems -- Functions as Processes: Termination and the -Calculus -- Predicate Encryption for Secure Remote Storage -- Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols -- Types and Processes -- Expressiveness of Generic Process Shape Types -- A Java Inspired Semantics for Transactions in SOC -- Responsive Choice in Mobile Processes -- A Model of Evolvable Components -- Games and Concurrent Systems -- The Impact of Altruism on the Efficiency of Atomic Congestion Games -- Stressed Web Environments as Strategic Games: Risk Profiles and Weltanschauung -- An Algebra of Hierarchical Graphs -- Property-Preserving Refinement of Concurrent Systems -- Certification of Correctness -- Certificate Translation for the Verification of Concurrent Programs -- Certified Result Checking for Polyhedral Analysis of Bytecode Programs -- Tools and Languages -- A Novel Resource-Driven Job Allocation Scheme for Desktop Grid Environments -- A Framework for Rule-Based Dynamic Adaptation -- CarPal: Interconnecting Overlay Networks for a Community-Driven Shared Mobility -- Refactoring Long Running Transactions: A Case Study -- Probabilistic Aspects -- Approximate Model Checking of Stochastic COWS -- Probabilistic Aspects: Checking Security in an Imperfect World -- A Tool for Checking Probabilistic Properties of COWS Services. |
Record Nr. | UNINA-9910484197103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Unconventional Computation and Natural Computation [[electronic resource] ] : 16th International Conference, UCNC 2017, Fayetteville, AR, USA, June 5-9, 2017, Proceedings / / edited by Matthew J. Patitz, Mike Stannett |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVIII, 221 p. 89 illus.) |
Disciplina | 004 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer science
Software engineering Artificial intelligence Electronic data processing—Management Computer Science Logic and Foundations of Programming Software Engineering Artificial Intelligence IT Operations |
ISBN | 3-319-58187-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Power of Analogue-digital Machines -- Ways to Compute in Euclidean Frameworks. - Real-Time Computability of Real Numbers by Chemical Reaction Networks -- Temporal logic computation using DNA strand displacement reactions -- Quantum-dot Cellular Automata: a Clocked Architecture for High-speed, Energy-efficient Molecular Computing -- Platform color designs for interactive molecular arrangements -- Self-Assembly of Shapes at Constant Scale using Repulsive Forces -- Verification in Staged Tile Self-Assembly.-Self-Assembly of 4-sided Fractals in the Two-handed Tile Assembly Model.-Self-Assembled DC Resistive Circuits with Voltage Controlled Growth -- Morphogenetic and Homeostatic Self-Assembled Systems -- Superposition as memory: unlocking quantum automatic complexity -- Solving the Bin-Packing Problem by Means of Tissue P System with 2-Division -- Universal Matrix Insertion Grammars with Small Size -- Analysis on the Nested Duplication String System and Its Capacity -- Descrambling Order Analysis in Ciliates. |
Record Nr. | UNISA-996466232703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|