Applied Cryptography and Network Security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings / / edited by Markus Jakobsson, Moti Yung, Jianying Zhou |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XIII, 511 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Operating systems (Computers) Information storage and retrieval systems Application software Electronic data processing—Management Cryptology Computer Communication Networks Operating Systems Information Storage and Retrieval Computer and Information Systems Applications IT Operations |
ISBN |
9783540248528
3-540-24852-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security and Storage -- CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap -- Private Keyword-Based Push and Pull with Applications to Anonymous Communication -- Secure Conjunctive Keyword Search over Encrypted Data -- Provably Secure Constructions -- Evaluating Security of Voting Schemes in the Universal Composability Framework -- Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security -- On the Security of Cryptosystems with All-or-Nothing Transform -- Internet Security -- Centralized Management of Virtual Security Zones in IP Networks -- S-RIP: A Secure Distance Vector Routing Protocol -- A Pay-per-Use DoS Protection Mechanism for the Web -- Digital Signature -- Limited Verifier Signature from Bilinear Pairings -- Deniable Ring Authentication Revisited -- A Fully-Functional Group Signature Scheme over Only Known-Order Group -- Security Modelling -- Some Observations on Zap and Its Applications -- Security Measurements of Steganographic Systems -- X2Rep: Enhanced Trust Semantics for the XRep Protocol -- Authenticated Key Exchange -- One-Round Protocols for Two-Party Authenticated Key Exchange -- Password Authenticated Key Exchange Using Quadratic Residues -- Key Agreement Using Statically Keyed Authenticators -- Security of Deployed Systems -- Low-Latency Cryptographic Protection for SCADA Communications -- A Best Practice for Root CA Key Update in PKI -- SQLrand: Preventing SQL Injection Attacks -- Cryptosystems: Design and Analysis -- Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem -- Success Probability in ? 2-Attacks -- More Generalized Clock-Controlled Alternating Step Generator -- Cryptographic Protocols -- FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy -- Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model -- Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity -- Side Channels and Protocol Analysis -- Security Analysis of CRT-Based Cryptosystems -- Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits -- Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords -- Intrusion Detection and DoS -- Advanced Packet Marking Mechanism with Pushback for IP Traceback -- A Parallel Intrusion Detection System for High-Speed Networks -- A Novel Framework for Alert Correlation and Understanding -- Cryptographic Algorithms -- An Improved Algorithm for uP+vQ Using JSF -- New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p n ) -- Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. |
Record Nr. | UNINA-9910144150803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied Cryptography and Network Security [[electronic resource] ] : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han |
Edizione | [1st ed. 2003.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
Descrizione fisica | 1 online resource (XII, 440 p.) |
Disciplina | 005.8/2 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer networks
Cryptography Data encryption (Computer science) Operating systems (Computers) Computers and civilization Electronic data processing—Management Computer Communication Networks Cryptology Operating Systems Computers and Society IT Operations |
ISBN | 3-540-45203-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptographic Applications -- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case -- Optimized ? 2-Attack against RC6 -- Anonymity-Enhanced Pseudonym System -- Intrusion Detection -- Using Feedback to Improve Masquerade Detection -- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services -- An IP Traceback Scheme Integrating DPM and PPM -- Cryptographic Algorithms -- Improved Scalable Hash Chain Traversal -- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem -- On the Security of Two Threshold Signature Schemes with Traceable Signers -- Digital Signature -- Proxy and Threshold One-Time Signatures -- A Threshold GQ Signature Scheme -- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary -- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme -- Security Modelling -- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems -- An Authorization Model for E-consent Requirement in a Health Care Application -- PLI: A New Framework to Protect Digital Content for P2P Networks -- Web Security -- Improved Algebraic Traitor Tracing Scheme -- Common Vulnerability Markup Language -- Trust on Web Browser: Attack vs. Defense -- Security Protocols -- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards -- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party -- Using OCSP to Secure Certificate-Using Transactions in M-commerce -- Cryptanalysis -- Differential Fault Analysis on A.E.S -- Side-Channel Attack on Substitution Blocks -- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation -- A Fast Correlation Attack for LFSR-Based Stream Ciphers -- Key Management -- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient -- An Efficient Tree-Based Group Key Agreement Using Bilinear Map -- A Key Recovery Mechanism for Reliable Group Key Management -- Efficient Implementations -- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model -- Efficient Distributed Signcryption Scheme as Group Signcryption -- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors. |
Record Nr. | UNISA-996465773503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Cryptography and Network Security : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han |
Edizione | [1st ed. 2003.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
Descrizione fisica | 1 online resource (XII, 440 p.) |
Disciplina | 005.8/2 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer networks
Cryptography Data encryption (Computer science) Operating systems (Computers) Computers and civilization Electronic data processing—Management Computer Communication Networks Cryptology Operating Systems Computers and Society IT Operations |
ISBN | 3-540-45203-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptographic Applications -- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case -- Optimized ? 2-Attack against RC6 -- Anonymity-Enhanced Pseudonym System -- Intrusion Detection -- Using Feedback to Improve Masquerade Detection -- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services -- An IP Traceback Scheme Integrating DPM and PPM -- Cryptographic Algorithms -- Improved Scalable Hash Chain Traversal -- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem -- On the Security of Two Threshold Signature Schemes with Traceable Signers -- Digital Signature -- Proxy and Threshold One-Time Signatures -- A Threshold GQ Signature Scheme -- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary -- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme -- Security Modelling -- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems -- An Authorization Model for E-consent Requirement in a Health Care Application -- PLI: A New Framework to Protect Digital Content for P2P Networks -- Web Security -- Improved Algebraic Traitor Tracing Scheme -- Common Vulnerability Markup Language -- Trust on Web Browser: Attack vs. Defense -- Security Protocols -- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards -- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party -- Using OCSP to Secure Certificate-Using Transactions in M-commerce -- Cryptanalysis -- Differential Fault Analysis on A.E.S -- Side-Channel Attack on Substitution Blocks -- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation -- A Fast Correlation Attack for LFSR-Based Stream Ciphers -- Key Management -- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient -- An Efficient Tree-Based Group Key Agreement Using Bilinear Map -- A Key Recovery Mechanism for Reliable Group Key Management -- Efficient Implementations -- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model -- Efficient Distributed Signcryption Scheme as Group Signcryption -- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors. |
Record Nr. | UNINA-9910144033103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Biosurveillance and Biosecurity [[electronic resource] ] : International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings / / edited by Daniel Zeng, Hsinchun Chen, Henry Rolka, William B. Lober |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (X, 183 p.) |
Disciplina | 362.1 |
Collana | Lecture Notes in Bioinformatics |
Soggetto topico |
Bioinformatics
Computers and civilization Electronic data processing—Management User interfaces (Computer systems) Human-computer interaction Database management Computational and Systems Biology Computers and Society IT Operations User Interfaces and Human Computer Interaction Database Management |
ISBN | 3-540-89746-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Informatics Infrastructure and Policy Considerations -- Public Health Information Fusion for Situation Awareness -- Biosurveillance, Case Reporting, and Decision Support: Public Health Interactions with a Health Information Exchange -- Bio-surveillance Event Models, Open Source Intelligence, and the Semantic Web -- Foresight China II: Identification and Detection of Infectious Diseases -- Public Health Preparedness Informatics Infrastructure. A Case Study in Integrated Surveillance and Response: 2004–2005 National Influenza Vaccine Shortage -- Network-Based Data Analytics -- Dynamic Network Model for Predicting Occurrences of Salmonella at Food Facilities -- Network-Based Analysis of Beijing SARS Data -- Tutte Polynomials and Topological Quantum Algorithms in Social Network Analysis for Epidemiology, Bio-surveillance and Bio-security -- Biosurveillance Models and Outbreak Detection -- Integrating a Commuting Model with the Bayesian Aerosol Release Detector -- A Temporal Extension of the Bayesian Aerosol Release Detector -- A Z-Score Based Multi-level Spatial Clustering Algorithm for the Detection of Disease Outbreaks -- Epidemic Thresholds in SIR and SIIR Models Applying an Algorithmic Method -- Test Power for Drug Abuse Surveillance -- Model Assessment and Case Studies -- Assessing the Accuracy of Spatiotemporal Epidemiological Models -- Simulation of Multivariate Spatial-Temporal Outbreak Data for Detection Algorithm Evaluation -- Analysis and Prediction of Epidemiological Trend of Scarlet Fever from 1957 to 2004 in the Downtown Area of Beijing -- Environmental Biosurveillance and Case Studies -- Environmental Biosurveillance for Epidemic Prediction: Experience with Rift Valley Fever -- Spatial Regression-Based Environmental Analysis in Infectious Disease Informatics. |
Record Nr. | UNISA-996465426603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Biosurveillance and Biosecurity : International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings / / edited by Daniel Zeng, Hsinchun Chen, Henry Rolka, William B. Lober |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (X, 183 p.) |
Disciplina | 362.1 |
Collana | Lecture Notes in Bioinformatics |
Soggetto topico |
Bioinformatics
Computers and civilization Electronic data processing—Management User interfaces (Computer systems) Human-computer interaction Database management Computational and Systems Biology Computers and Society IT Operations User Interfaces and Human Computer Interaction Database Management |
ISBN | 3-540-89746-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Informatics Infrastructure and Policy Considerations -- Public Health Information Fusion for Situation Awareness -- Biosurveillance, Case Reporting, and Decision Support: Public Health Interactions with a Health Information Exchange -- Bio-surveillance Event Models, Open Source Intelligence, and the Semantic Web -- Foresight China II: Identification and Detection of Infectious Diseases -- Public Health Preparedness Informatics Infrastructure. A Case Study in Integrated Surveillance and Response: 2004–2005 National Influenza Vaccine Shortage -- Network-Based Data Analytics -- Dynamic Network Model for Predicting Occurrences of Salmonella at Food Facilities -- Network-Based Analysis of Beijing SARS Data -- Tutte Polynomials and Topological Quantum Algorithms in Social Network Analysis for Epidemiology, Bio-surveillance and Bio-security -- Biosurveillance Models and Outbreak Detection -- Integrating a Commuting Model with the Bayesian Aerosol Release Detector -- A Temporal Extension of the Bayesian Aerosol Release Detector -- A Z-Score Based Multi-level Spatial Clustering Algorithm for the Detection of Disease Outbreaks -- Epidemic Thresholds in SIR and SIIR Models Applying an Algorithmic Method -- Test Power for Drug Abuse Surveillance -- Model Assessment and Case Studies -- Assessing the Accuracy of Spatiotemporal Epidemiological Models -- Simulation of Multivariate Spatial-Temporal Outbreak Data for Detection Algorithm Evaluation -- Analysis and Prediction of Epidemiological Trend of Scarlet Fever from 1957 to 2004 in the Downtown Area of Beijing -- Environmental Biosurveillance and Case Studies -- Environmental Biosurveillance for Epidemic Prediction: Experience with Rift Valley Fever -- Spatial Regression-Based Environmental Analysis in Infectious Disease Informatics. |
Record Nr. | UNINA-9910483899003321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business Process Management : Analysis, Modelling, Optimisation and Controlling of Processes / / by Andreas Gadatsch |
Autore | Gadatsch Andreas |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (233 pages) |
Disciplina | 658.4038 |
Soggetto topico |
Electronic data processing—Management
Information technology—Management Application software IT Operations Business Process Management Computer and Information Systems Applications |
ISBN |
9783658415846
9783658415839 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction to business process management -- Concepts of business process management -- Organisation and introduction of business process management -- Process controlling -- Modelling and analysis of processes -- IT support for process management. |
Record Nr. | UNINA-9910728393603321 |
Gadatsch Andreas | ||
Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Collaborative Knowledge Management Through Product Lifecycle [[electronic resource] ] : A Computational Perspective / / by Hongwei Wang, Gongzhuang Peng |
Autore | Wang Hongwei |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (295 pages) |
Disciplina | 670.285 |
Altri autori (Persone) | PengGongzhuang |
Soggetto topico |
Computer-aided engineering
Engineering design Electronic data processing—Management Application software Information storage and retrieval systems Computer systems Computer-Aided Engineering (CAD, CAE) and Design Engineering Design IT Operations Computer and Information Systems Applications Information Storage and Retrieval Computer System Implementation |
ISBN | 981-19-9626-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Knowledge management through product lifecycle -- The collaborative knowledge management paradigm -- Knowledge modelling methods -- Advanced knowledge retrieval methods -- Knowledge reuse in collaborative knowledge management -- Discussion. |
Record Nr. | UNISA-996547967103316 |
Wang Hongwei | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Collaborative Knowledge Management Through Product Lifecycle : A Computational Perspective / / by Hongwei Wang, Gongzhuang Peng |
Autore | Wang Hongwei |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (295 pages) |
Disciplina | 670.285 |
Altri autori (Persone) | PengGongzhuang |
Soggetto topico |
Computer-aided engineering
Engineering design Electronic data processing—Management Application software Information storage and retrieval systems Computer systems Computer-Aided Engineering (CAD, CAE) and Design Engineering Design IT Operations Computer and Information Systems Applications Information Storage and Retrieval Computer System Implementation |
ISBN | 981-19-9626-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Knowledge management through product lifecycle -- The collaborative knowledge management paradigm -- Knowledge modelling methods -- Advanced knowledge retrieval methods -- Knowledge reuse in collaborative knowledge management -- Discussion. |
Record Nr. | UNINA-9910678245903321 |
Wang Hongwei | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Algebra in Scientific Computing [[electronic resource] ] : 21st International Workshop, CASC 2019, Moscow, Russia, August 26–30, 2019, Proceedings / / edited by Matthew England, Wolfram Koepf, Timur M. Sadykov, Werner M. Seiler, Evgenii V. Vorozhtsov |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 479 p. 718 illus., 21 illus. in color.) |
Disciplina | 005.1 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer science—Mathematics
Algorithms Software engineering Computers, Special purpose Electronic data processing—Management Mathematics of Computing Software Engineering Special Purpose and Application-Based Systems IT Operations |
ISBN | 3-030-26831-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466425203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Algebra in Scientific Computing : 21st International Workshop, CASC 2019, Moscow, Russia, August 26–30, 2019, Proceedings / / edited by Matthew England, Wolfram Koepf, Timur M. Sadykov, Werner M. Seiler, Evgenii V. Vorozhtsov |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 479 p. 718 illus., 21 illus. in color.) |
Disciplina |
005.1
004.0151 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer science—Mathematics
Algorithms Software engineering Computers, Special purpose Electronic data processing—Management Mathematics of Computing Software Engineering Special Purpose and Application-Based Systems IT Operations |
ISBN | 3-030-26831-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910349305203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|