Information Security Applications [[electronic resource] ] : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers / / edited by Kijoon Chae, Moti Yung |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XII, 512 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Computers, Special purpose Operating systems (Computers) Algorithms Electronic data processing—Management Cryptology Computer Communication Networks Special Purpose and Application-Based Systems Operating Systems IT Operations |
ISBN |
1-280-30671-8
9786610306718 3-540-24591-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network Security -- Model Checking of Security Protocols with Pre-configuration -- Remote Access VPN with Port Protection Function by Mobile Codes -- A Role of DEVS Simulation for Information Assurance -- Mobile Security -- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes -- Reliable Cascaded Delegation Scheme for Mobile Agent Environments -- Practical Solution for Location Privacy in Mobile IPv6 -- Intrusion Detection -- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection -- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System -- Towards a Global Security Architecture for Intrusion Detection and Reaction Management -- Internet Security -- Intrusion-Tolerant System Design for Web Server Survivability -- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access -- An Automatic Security Evaluation System for IPv6 Network -- Secure Software, Hardware, and Systems I -- A Location Privacy Protection Mechanism for Smart Space -- Secure System Architecture Based on Dynamic Resource Reallocation -- Fair Exchange with Guardian Angels -- Secure Software, Hardware, and Systems II -- Sign-Based Differential Power Analysis -- Asymmetric Watermarking Scheme Using Permutation Braids -- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m ) -- E-commerce Security -- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction -- Multi-dimensional Hash Chain For Sealed-Bid Auction -- An Improved Forward Integrity Protocol for Mobile Agents -- Digital Rights Management -- Taming “Trusted Platforms” by Operating System Design -- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation -- Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes -- Biometrics and Human Interfaces I -- 3D Face Recognition under Pose Varying Environments -- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint -- Fingerprint-Based Authentication for USB Token Systems -- Biometrics and Human Interfaces II -- Iris Recognition System Using Wavelet Packet and Support Vector Machines -- Biometrics Identification and Verification Using Projection-Based Face Recognition System -- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification -- Public Key Cryptography / Key Management -- E-MHT. An Efficient Protocol for Certificate Status Checking -- A Comment on Group Independent Threshold Sharing -- Automation-Considered Logic of Authentication and Key Distribution -- Applied Cryptography -- The MESH Block Ciphers -- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves -- Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer. |
Record Nr. | UNISA-996466170803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers / / edited by Kijoon Chae, Moti Yung |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XII, 512 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Computers, Special purpose Operating systems (Computers) Algorithms Electronic data processing—Management Cryptology Computer Communication Networks Special Purpose and Application-Based Systems Operating Systems IT Operations |
ISBN |
1-280-30671-8
9786610306718 3-540-24591-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network Security -- Model Checking of Security Protocols with Pre-configuration -- Remote Access VPN with Port Protection Function by Mobile Codes -- A Role of DEVS Simulation for Information Assurance -- Mobile Security -- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes -- Reliable Cascaded Delegation Scheme for Mobile Agent Environments -- Practical Solution for Location Privacy in Mobile IPv6 -- Intrusion Detection -- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection -- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System -- Towards a Global Security Architecture for Intrusion Detection and Reaction Management -- Internet Security -- Intrusion-Tolerant System Design for Web Server Survivability -- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access -- An Automatic Security Evaluation System for IPv6 Network -- Secure Software, Hardware, and Systems I -- A Location Privacy Protection Mechanism for Smart Space -- Secure System Architecture Based on Dynamic Resource Reallocation -- Fair Exchange with Guardian Angels -- Secure Software, Hardware, and Systems II -- Sign-Based Differential Power Analysis -- Asymmetric Watermarking Scheme Using Permutation Braids -- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m ) -- E-commerce Security -- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction -- Multi-dimensional Hash Chain For Sealed-Bid Auction -- An Improved Forward Integrity Protocol for Mobile Agents -- Digital Rights Management -- Taming “Trusted Platforms” by Operating System Design -- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation -- Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes -- Biometrics and Human Interfaces I -- 3D Face Recognition under Pose Varying Environments -- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint -- Fingerprint-Based Authentication for USB Token Systems -- Biometrics and Human Interfaces II -- Iris Recognition System Using Wavelet Packet and Support Vector Machines -- Biometrics Identification and Verification Using Projection-Based Face Recognition System -- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification -- Public Key Cryptography / Key Management -- E-MHT. An Efficient Protocol for Certificate Status Checking -- A Comment on Group Independent Threshold Sharing -- Automation-Considered Logic of Authentication and Key Distribution -- Applied Cryptography -- The MESH Block Ciphers -- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves -- Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer. |
Record Nr. | UNINA-9910144208703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Membrane Computing [[electronic resource] ] : 19th International Conference, CMC 2018, Dresden, Germany, September 4–7, 2018, Revised Selected Papers / / edited by Thomas Hinze, Grzegorz Rozenberg, Arto Salomaa, Claudio Zandron |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVI, 275 p. 167 illus., 21 illus. in color.) |
Disciplina | 511.3 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer science
Software engineering Computer engineering Computer networks Artificial intelligence Electronic data processing—Management Theory of Computation Software Engineering Computer Engineering and Networks Artificial Intelligence IT Operations |
ISBN | 3-030-12797-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Papers -- Impacts of Membrane Computing on Theoretical Computer Science -- Time and Space Complexity of P Systems - And Why They Matter -- A Brute-Force Solution to the 27-Queens Puzzle Using a Distributed Computation -- Regular Papers. -Tissue P Systems with Point Mutation Rules -- Adaptive P Systems -- Chain Code P System Generating a Variant of the Peano Space-filling Curve -- APCol Systems with Agent Creation -- APCol Systems with Verifier Agents -- A Semantic Investigation of Spiking Neural P Systems -- Towards Automated Analysis of Belousov-Zhabotinsky Reactions in a Petri Dish by Membrane Computing using Optic Flow -- Testing Identifiable Kernel P Systems using an X-machine Approach -- Actor-like cP Systems -- Solving QSAT in Sublinear Depth -- Design of specific P systems simulators on GPUs -- Construction of Stable and Lightweight Technical Structures Inspired by Ossification of Bones using Osteogenetic P Systems -- On Small Universality of Spiking Neural P Systems with Multiple Channels -- Modeling Plant Development with M Systems -- An Improved Quicksort Algorithm Based on Tissue-Like P Systems with Promoters. |
Record Nr. | UNISA-996466346103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Membrane Computing : 19th International Conference, CMC 2018, Dresden, Germany, September 4–7, 2018, Revised Selected Papers / / edited by Thomas Hinze, Grzegorz Rozenberg, Arto Salomaa, Claudio Zandron |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVI, 275 p. 167 illus., 21 illus. in color.) |
Disciplina | 511.3 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer science
Software engineering Computer engineering Computer networks Artificial intelligence Electronic data processing—Management Theory of Computation Software Engineering Computer Engineering and Networks Artificial Intelligence IT Operations |
ISBN | 3-030-12797-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Papers -- Impacts of Membrane Computing on Theoretical Computer Science -- Time and Space Complexity of P Systems - And Why They Matter -- A Brute-Force Solution to the 27-Queens Puzzle Using a Distributed Computation -- Regular Papers. -Tissue P Systems with Point Mutation Rules -- Adaptive P Systems -- Chain Code P System Generating a Variant of the Peano Space-filling Curve -- APCol Systems with Agent Creation -- APCol Systems with Verifier Agents -- A Semantic Investigation of Spiking Neural P Systems -- Towards Automated Analysis of Belousov-Zhabotinsky Reactions in a Petri Dish by Membrane Computing using Optic Flow -- Testing Identifiable Kernel P Systems using an X-machine Approach -- Actor-like cP Systems -- Solving QSAT in Sublinear Depth -- Design of specific P systems simulators on GPUs -- Construction of Stable and Lightweight Technical Structures Inspired by Ossification of Bones using Osteogenetic P Systems -- On Small Universality of Spiking Neural P Systems with Multiple Channels -- Modeling Plant Development with M Systems -- An Improved Quicksort Algorithm Based on Tissue-Like P Systems with Promoters. |
Record Nr. | UNINA-9910337569503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Models in Software Engineering [[electronic resource] ] : Workshops and Symposia at MODELS 2011, Wellington, New Zealand, October 16-21, 2011, Reports and Revised Selected Papers / / edited by Jörg Kienzle |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (X, 292 p.) |
Disciplina | 005.1 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Software engineering
Compilers (Computer programs) Computer science Electronic data processing—Management Computer simulation Application software Software Engineering Compilers and Interpreters Computer Science Logic and Foundations of Programming IT Operations Computer Modelling Computer and Information Systems Applications |
ISBN | 3-642-29645-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465992903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Models in Software Engineering : Workshops and Symposia at MoDELS 2010, Olso, Norway, October 3-8, 2010, Reports and Revised Selected Papers / / edited by Juergen Dingel, Arnor Solberg |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XII, 416 p. 149 illus., 70 illus. in color.) |
Disciplina | 005.1 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Software engineering
Compilers (Computer programs) Computer science Electronic data processing—Management Computer simulation Software Engineering Compilers and Interpreters Computer Science Logic and Foundations of Programming IT Operations Computer Modelling |
ISBN | 3-642-21210-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | MODELS'10 |
Record Nr. | UNISA-996465636703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Models in Software Engineering : Workshops and Symposia at MoDELS 2010, Olso, Norway, October 3-8, 2010, Reports and Revised Selected Papers / / edited by Juergen Dingel, Arnor Solberg |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XII, 416 p. 149 illus., 70 illus. in color.) |
Disciplina | 005.1 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Software engineering
Compilers (Computer programs) Computer science Electronic data processing—Management Computer simulation Software Engineering Compilers and Interpreters Computer Science Logic and Foundations of Programming IT Operations Computer Modelling |
ISBN | 3-642-21210-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | MODELS'10 |
Record Nr. | UNINA-9910510604703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Network and System Security [[electronic resource] ] : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 540 p. 128 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks Electronic data processing—Management Computers and civilization Data and Information Security Cryptology Computer Communication Networks IT Operations Computers and Society |
ISBN | 3-319-46298-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords -- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards -- A System of Shareable Keyword Search on Encrypted Data -- Security Policy and Access Control -- An Attribute Based Protection Model for JSON Documents -- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA -- Security Protocols -- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication -- Expressive Rating Scheme by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers -- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR -- System Security -- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks -- Iris Cancellable Template Generation based on Indexing-First-One Hashing -- Web Security -- Detecting Malicious URLs Using Lexical Analysis -- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo -- Data Mining for Security Application (Short Paper) -- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining -- Provable Seucirty (Short Paper) -- Improved Security Proofs for Modular Exponentiation Bits -- Security Protocol (Short Paper) -- Secure Outsourced Bilinear Pairings Computation for Mobile Devices -- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix. |
Record Nr. | UNISA-996466241303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 540 p. 128 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks Electronic data processing—Management Computers and civilization Data and Information Security Cryptology Computer Communication Networks IT Operations Computers and Society |
ISBN | 3-319-46298-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords -- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards -- A System of Shareable Keyword Search on Encrypted Data -- Security Policy and Access Control -- An Attribute Based Protection Model for JSON Documents -- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA -- Security Protocols -- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication -- Expressive Rating Scheme by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers -- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR -- System Security -- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks -- Iris Cancellable Template Generation based on Indexing-First-One Hashing -- Web Security -- Detecting Malicious URLs Using Lexical Analysis -- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo -- Data Mining for Security Application (Short Paper) -- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining -- Provable Seucirty (Short Paper) -- Improved Security Proofs for Modular Exponentiation Bits -- Security Protocol (Short Paper) -- Secure Outsourced Bilinear Pairings Computation for Mobile Devices -- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix. |
Record Nr. | UNINA-9910484501503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Number Theory and Cryptography [[electronic resource] ] : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday / / edited by Marc Fischlin, Stefan Katzenbeisser |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 281 p. 69 illus.) |
Disciplina | 512.7 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Application software Computer science—Mathematics Discrete mathematics Computer networks Cryptography Data encryption (Computer science) Electronic data processing—Management Computer and Information Systems Applications Discrete Mathematics in Computer Science Computer Communication Networks Cryptology IT Operations |
ISBN | 3-642-42001-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Personal Tributes -- Computational Number Theory -- Hardness of Cryptographic Assumptions -- Hardware Security -- Privacy and Security -- Application Security. |
Record Nr. | UNISA-996465560803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|