top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Number Theory and Cryptography : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday / / edited by Marc Fischlin, Stefan Katzenbeisser
Number Theory and Cryptography : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday / / edited by Marc Fischlin, Stefan Katzenbeisser
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 281 p. 69 illus.)
Disciplina 512.7
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Application software
Computer science—Mathematics
Discrete mathematics
Computer networks
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Computer and Information Systems Applications
Discrete Mathematics in Computer Science
Computer Communication Networks
Cryptology
IT Operations
ISBN 3-642-42001-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Personal Tributes -- Computational Number Theory -- Hardness of Cryptographic Assumptions -- Hardware Security -- Privacy and Security -- Application Security.
Record Nr. UNINA-9910483410803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Principles of Distributed Systems [[electronic resource] ] : 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings / / edited by Tarek F. Abdelzaher, Michel Raynal, Nicola Santoro
Principles of Distributed Systems [[electronic resource] ] : 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings / / edited by Tarek F. Abdelzaher, Michel Raynal, Nicola Santoro
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 373 p.)
Disciplina 004.6
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computer programming
User interfaces (Computer systems)
Human-computer interaction
Computer engineering
Electronic data processing—Management
Computer Communication Networks
Programming Techniques
User Interfaces and Human Computer Interaction
Computer Engineering and Networks
IT Operations
ISBN 3-642-10877-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Transactional Memory Today: A Status Report -- Navigating the Web 2.0 with Gossple -- Distributed Scheduling -- Transactional Scheduling for Read-Dominated Workloads -- Performance Evaluation of Work Stealing for Streaming Applications -- Not All Fair Probabilistic Schedulers Are Equivalent -- Brief Announcement: Relay: A Cache-Coherence Protocol for Distributed Transactional Memory -- Distributed Robotics -- Byzantine Convergence in Robot Networks: The Price of Asynchrony -- Deaf, Dumb, and Chatting Asynchronous Robots -- Synchronization Helps Robots to Detect Black Holes in Directed Graphs -- Fault and Failure Detection -- The Fault Detection Problem -- The Minimum Information about Failures for Solving Non-local Tasks in Message-Passing Systems -- Enhanced Fault-Tolerance through Byzantine Failure Detection -- Wireless and Social Networks -- Decentralized Polling with Respectable Participants -- Efficient Power Utilization in Multi-radio Wireless Ad Hoc Networks -- Adversarial Multiple Access Channel with Individual Injection Rates -- Synchronization -- NB-FEB: A Universal Scalable Easy-to-Use Synchronization Primitive for Manycore Architectures -- Gradient Clock Synchronization Using Reference Broadcasts -- Brief Announcement: Communication-Efficient Self-stabilizing Protocols for Spanning-Tree Construction -- Storage Systems -- On the Impact of Serializing Contention Management on STM Performance -- On the Efficiency of Atomic Multi-reader, Multi-writer Distributed Memory -- Abortable Fork-Linearizable Storage -- Distributed Agreement -- On the Computational Power of Shared Objects -- Weak Synchrony Models and Failure Detectors for Message Passing (k-)Set Agreement -- Unifying Byzantine Consensus Algorithms with Weak Interactive Consistency -- Distributed Algorithms -- Safe and Eventually Safe: Comparing Self-stabilizing and Non-stabilizing Algorithms on a Common Ground -- Proactive Fortification of Fault-Tolerant Services -- Robustness of the Rotor-router Mechanism -- Brief Annoucement: Analysis of an Optimal Bit Complexity Randomised Distributed Vertex Colouring Algorithm -- Brief Annoucement: Distributed Swap Edges Computation for Minimum Routing Cost Spanning Trees.
Record Nr. UNISA-996465895203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Principles of Distributed Systems : 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings / / edited by Tarek F. Abdelzaher, Michel Raynal, Nicola Santoro
Principles of Distributed Systems : 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings / / edited by Tarek F. Abdelzaher, Michel Raynal, Nicola Santoro
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 373 p.)
Disciplina 004.6
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computer programming
User interfaces (Computer systems)
Human-computer interaction
Computer engineering
Electronic data processing—Management
Computer Communication Networks
Programming Techniques
User Interfaces and Human Computer Interaction
Computer Engineering and Networks
IT Operations
ISBN 3-642-10877-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Transactional Memory Today: A Status Report -- Navigating the Web 2.0 with Gossple -- Distributed Scheduling -- Transactional Scheduling for Read-Dominated Workloads -- Performance Evaluation of Work Stealing for Streaming Applications -- Not All Fair Probabilistic Schedulers Are Equivalent -- Brief Announcement: Relay: A Cache-Coherence Protocol for Distributed Transactional Memory -- Distributed Robotics -- Byzantine Convergence in Robot Networks: The Price of Asynchrony -- Deaf, Dumb, and Chatting Asynchronous Robots -- Synchronization Helps Robots to Detect Black Holes in Directed Graphs -- Fault and Failure Detection -- The Fault Detection Problem -- The Minimum Information about Failures for Solving Non-local Tasks in Message-Passing Systems -- Enhanced Fault-Tolerance through Byzantine Failure Detection -- Wireless and Social Networks -- Decentralized Polling with Respectable Participants -- Efficient Power Utilization in Multi-radio Wireless Ad Hoc Networks -- Adversarial Multiple Access Channel with Individual Injection Rates -- Synchronization -- NB-FEB: A Universal Scalable Easy-to-Use Synchronization Primitive for Manycore Architectures -- Gradient Clock Synchronization Using Reference Broadcasts -- Brief Announcement: Communication-Efficient Self-stabilizing Protocols for Spanning-Tree Construction -- Storage Systems -- On the Impact of Serializing Contention Management on STM Performance -- On the Efficiency of Atomic Multi-reader, Multi-writer Distributed Memory -- Abortable Fork-Linearizable Storage -- Distributed Agreement -- On the Computational Power of Shared Objects -- Weak Synchrony Models and Failure Detectors for Message Passing (k-)Set Agreement -- Unifying Byzantine Consensus Algorithms with Weak Interactive Consistency -- Distributed Algorithms -- Safe and Eventually Safe: Comparing Self-stabilizing and Non-stabilizing Algorithms on a Common Ground -- Proactive Fortification of Fault-Tolerant Services -- Robustness of the Rotor-router Mechanism -- Brief Annoucement: Analysis of an Optimal Bit Complexity Randomised Distributed Vertex Colouring Algorithm -- Brief Annoucement: Distributed Swap Edges Computation for Minimum Routing Cost Spanning Trees.
Record Nr. UNINA-9910484650803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Principles of Distributed Systems [[electronic resource] ] : 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedings / / edited by Theodore P. Baker, Alain Bui, Sebastien Tixeuil
Principles of Distributed Systems [[electronic resource] ] : 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedings / / edited by Theodore P. Baker, Alain Bui, Sebastien Tixeuil
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XIV, 580 p.)
Disciplina 004.36
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computer engineering
Electronic data processing—Management
Artificial intelligence
Computer Communication Networks
Computer Engineering and Networks
IT Operations
Artificial Intelligence
ISBN 3-540-92221-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- The Next 700 BFT Protocols -- On Replication of Software Transactional Memories -- Regular Papers -- Write Markers for Probabilistic Quorum Systems -- Byzantine Consensus with Unknown Participants -- With Finite Memory Consensus Is Easier Than Reliable Broadcast -- Group Renaming -- Global Static-Priority Preemptive Multiprocessor Scheduling with Utilization Bound 38% -- Deadline Monotonic Scheduling on Uniform Multiprocessors -- A Comparison of the M-PCP, D-PCP, and FMLP on LITMUSRT -- A Self-stabilizing Marching Algorithm for a Group of Oblivious Robots -- Fault-Tolerant Flocking in a k-Bounded Asynchronous System -- Bounds for Deterministic Reliable Geocast in Mobile Ad-Hoc Networks -- Degree 3 Suffices: A Large-Scale Overlay for P2P Networks -- On the Time-Complexity of Robust and Amnesic Storage -- Graph Augmentation via Metric Embedding -- A Lock-Based STM Protocol That Satisfies Opacity and Progressiveness -- The 0–1-Exclusion Families of Tasks -- Interval Tree Clocks -- Ordering-Based Semantics for Software Transactional Memory -- CQS-Pair: Cyclic Quorum System Pair for Wakeup Scheduling in Wireless Sensor Networks -- Impact of Information on the Complexity of Asynchronous Radio Broadcasting -- Distributed Approximation of Cellular Coverage -- Fast Geometric Routing with Concurrent Face Traversal -- Optimal Deterministic Remote Clock Estimation in Real-Time Systems -- Power-Aware Real-Time Scheduling upon Dual CPU Type Multiprocessor Platforms -- Revising Distributed UNITY Programs Is NP-Complete -- On the Solvability of Anonymous Partial Grids Exploration by Mobile Robots -- Taking Advantage of Symmetries: Gathering of Asynchronous Oblivious Robots on a Ring -- Rendezvous of Mobile Agents When Tokens Fail Anytime -- Solving Atomic Multicast When Groups Crash -- A Self-stabilizing Approximation for the Minimum Connected Dominating Set with Safe Convergence -- Leader Election in Extremely Unreliable Rings and Complete Networks -- Toward a Theory of Input Acceptance for Transactional Memories -- Geo-registers: An Abstraction for Spatial-Based Distributed Computing -- Evaluating a Data Removal Strategy for Grid Environments Using Colored Petri Nets -- Load-Balanced and Sybil-Resilient File Search in P2P Networks -- Computing and Updating the Process Number in Trees -- Redundant Data Placement Strategies for Cluster Storage Environments -- An Unreliable Failure Detector for Unknown and Mobile Networks -- Efficient Large Almost Wait-Free Single-Writer Multireader Atomic Registers -- A Distributed Algorithm for Resource Clustering in Large Scale Platforms -- Reactive Smart Buffering Scheme for Seamless Handover in PMIPv6 -- Uniprocessor EDF Scheduling with Mode Change.
Record Nr. UNISA-996466343103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Principles of Distributed Systems : 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedings / / edited by Theodore P. Baker, Alain Bui, Sebastien Tixeuil
Principles of Distributed Systems : 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedings / / edited by Theodore P. Baker, Alain Bui, Sebastien Tixeuil
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XIV, 580 p.)
Disciplina 004.36
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computer engineering
Electronic data processing—Management
Artificial intelligence
Computer Communication Networks
Computer Engineering and Networks
IT Operations
Artificial Intelligence
ISBN 3-540-92221-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- The Next 700 BFT Protocols -- On Replication of Software Transactional Memories -- Regular Papers -- Write Markers for Probabilistic Quorum Systems -- Byzantine Consensus with Unknown Participants -- With Finite Memory Consensus Is Easier Than Reliable Broadcast -- Group Renaming -- Global Static-Priority Preemptive Multiprocessor Scheduling with Utilization Bound 38% -- Deadline Monotonic Scheduling on Uniform Multiprocessors -- A Comparison of the M-PCP, D-PCP, and FMLP on LITMUSRT -- A Self-stabilizing Marching Algorithm for a Group of Oblivious Robots -- Fault-Tolerant Flocking in a k-Bounded Asynchronous System -- Bounds for Deterministic Reliable Geocast in Mobile Ad-Hoc Networks -- Degree 3 Suffices: A Large-Scale Overlay for P2P Networks -- On the Time-Complexity of Robust and Amnesic Storage -- Graph Augmentation via Metric Embedding -- A Lock-Based STM Protocol That Satisfies Opacity and Progressiveness -- The 0–1-Exclusion Families of Tasks -- Interval Tree Clocks -- Ordering-Based Semantics for Software Transactional Memory -- CQS-Pair: Cyclic Quorum System Pair for Wakeup Scheduling in Wireless Sensor Networks -- Impact of Information on the Complexity of Asynchronous Radio Broadcasting -- Distributed Approximation of Cellular Coverage -- Fast Geometric Routing with Concurrent Face Traversal -- Optimal Deterministic Remote Clock Estimation in Real-Time Systems -- Power-Aware Real-Time Scheduling upon Dual CPU Type Multiprocessor Platforms -- Revising Distributed UNITY Programs Is NP-Complete -- On the Solvability of Anonymous Partial Grids Exploration by Mobile Robots -- Taking Advantage of Symmetries: Gathering of Asynchronous Oblivious Robots on a Ring -- Rendezvous of Mobile Agents When Tokens Fail Anytime -- Solving Atomic Multicast When Groups Crash -- A Self-stabilizing Approximation for the Minimum Connected Dominating Set with Safe Convergence -- Leader Election in Extremely Unreliable Rings and Complete Networks -- Toward a Theory of Input Acceptance for Transactional Memories -- Geo-registers: An Abstraction for Spatial-Based Distributed Computing -- Evaluating a Data Removal Strategy for Grid Environments Using Colored Petri Nets -- Load-Balanced and Sybil-Resilient File Search in P2P Networks -- Computing and Updating the Process Number in Trees -- Redundant Data Placement Strategies for Cluster Storage Environments -- An Unreliable Failure Detector for Unknown and Mobile Networks -- Efficient Large Almost Wait-Free Single-Writer Multireader Atomic Registers -- A Distributed Algorithm for Resource Clustering in Large Scale Platforms -- Reactive Smart Buffering Scheme for Seamless Handover in PMIPv6 -- Uniprocessor EDF Scheduling with Mode Change.
Record Nr. UNINA-9910484075103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Principles of Security and Trust : Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013, Proceedings / / edited by David Basin, John C. Mitchell
Principles of Security and Trust : Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013, Proceedings / / edited by David Basin, John C. Mitchell
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XX, 287 p. 34 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Computer networks
Cryptography
Data encryption (Computer science)
Electronic commerce
Electronic data processing—Management
Data and Information Security
Computer Communication Networks
Cryptology
e-Commerce and e-Business
IT Operations
ISBN 3-642-36830-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks -- Practical Everlasting Privacy -- A Differentially Private Mechanism of Optimal Utility for a Region of Priors -- Proved Generation of Implementations from Computationally Secure Protocol Specifications -- Sound Security Protocol Transformations -- Logical Foundations of Secure Resource Management in Protocol Implementations -- Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage -- Lazy Mobile Intruders -- On Layout Randomization for Arrays and Functions -- A Theory of Agreements and Protection -- Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification -- Proving More Observational Equivalences with ProVerif -- Formal Verification of e-Auction Protocols -- Sessions and Separability in Security Protocols.
Record Nr. UNINA-9910739418303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy in a Digital, Networked World : Technologies, Implications and Solutions / / edited by Sherali Zeadally, Mohamad Badra
Privacy in a Digital, Networked World : Technologies, Implications and Solutions / / edited by Sherali Zeadally, Mohamad Badra
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 418 p. 65 illus.)
Disciplina 005.8
Collana Computer Communications and Networks
Soggetto topico Computer networks
Information storage and retrieval systems
Information retrieval
Computer architecture
Electronic data processing—Management
Computer Communication Networks
Information Storage and Retrieval
Data Storage Representation
IT Operations
ISBN 3-319-08470-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Database Privacy -- Privacy and Big Data -- Privacy in Crowdsourced Platforms -- Privacy in Healthcare -- Privacy in Peer-to-Peer Networks -- Privacy in the Cloud -- Privacy in Vehicular Ad-Hoc Networks -- Privacy Law and Regulation - Technologies, Implications and Solutions -- Privacy in Mobile Devices -- Privacy in Biometric Systems -- Privacy in Social Networks -- The Right to Privacy in the Age of Digital Technology -- How to Explore Consumers’ Privacy Choices with Behavioural Economics -- Techniques, Taxonomy, and Challenges of Privacy Protection in the Smart Grid -- Location-Based Privacy, Protection, Safety, and Security.
Record Nr. UNINA-9910299203903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Product Lifecycle Management. PLM in Transition Times: The Place of Humans and Transformative Technologies [[electronic resource] ] : 19th IFIP WG 5.1 International Conference, PLM 2022, Grenoble, France, July 10–13, 2022, Revised Selected Papers / / edited by Frédéric Noël, Felix Nyffenegger, Louis Rivest, Abdelaziz Bouras
Product Lifecycle Management. PLM in Transition Times: The Place of Humans and Transformative Technologies [[electronic resource] ] : 19th IFIP WG 5.1 International Conference, PLM 2022, Grenoble, France, July 10–13, 2022, Revised Selected Papers / / edited by Frédéric Noël, Felix Nyffenegger, Louis Rivest, Abdelaziz Bouras
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (706 pages)
Disciplina 658.5
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Electronic data processing—Management
Computer networks
Machine learning
Coding theory
Information theory
Application software
IT Operations
Computer Communication Networks
Machine Learning
Coding and Information Theory
Computer and Information Systems Applications
ISBN 3-031-25182-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Organisation: Knowledge Management, Business Models, Sustainability, End-to-End PLM -- POSEIDON: A Graphical Editor for Item Selection Rules Within Feature Combination Rule Contexts -- Software Parts Classification for Agile and Efficient Product Life Cycle Management -- General methodology for the generation and dissemination of manufacturing knowledge: a case study with the Double Diamond AM Knowledge Approach -- Fostering SMEs collaborations within a cluster -- Data analytics capability roadmap for PPO business models in equipment manufacturing companies -- Systematic literature review about Sustainable Business Models and Industry -- Pay-Per-X Business Models for Equipment Manufacturing Companies: A Maturity Model -- Supporting the development of circular value chains in the automotive sector through an information sharing system -- Requirements on and Selection of Data Storage Technologies for Life Cycle Assessment -- Digital Twin application to Energy Consumption Management in production: a literature review -- Product Lifecycle Management and Open Innovation in the Deep Tech Start-ups development -- Distributed Approach for Integration in Industrial Systems -- PLM needs for cosmetic and fragrance industries: a preliminary assessment -- Transiting Between Product Development and Production: How IT in Product Development and Manufacturing Integrate -- A process-oriented approach for shipbuilding industrial design using advanced PLM tools -- Modelling tools : Model-Based Systems Engineering, Geometric modelling, Maturity models, Digital Chain Process -- simulation-capable model networks in MBSE -- MBSE-PLM Integration: Initiatives and Future Outlook -- An Open Benchmark Exercise for Model-Based Design Reviews -- Enabling computational design support in model-based systems engineering using model transformations -- Knowledge Reuse of CAD Data in Parallel Development of Multiple Wiring Harness Variants -- Generative Engineering and Design – A comparison of different approaches to utilize Artificial Intelligence in CAD software tools -- Finite element mesh generation for nano-scale modeling of tilted columnar thin films for numerical simulation -- Geometric Coherence of a Digital Twin -- Developing a Technology Readiness Level template for Model-Based Design methods and tools in a collaborative environment -- Measurement Static Complexity in Mechatronic Products: Methodological proposal -- Towards a Requirements Co-engineering Improvement Framework: Supporting Digital Delivery Methods in Complex Infrastructure Projects -- Reliability of Design Data through Provenance Management -- Developing a Roadmap Towards the Digital Transformation of Small&Medium Companies: a Case Study Analysis in the Aerospace&Defence Sector -- “Metro Map” Illustrating the Digitalisation in Industry -- Integrating User Experience and Business Process Management for a better Human Interaction and Software Design -- Transversal Tools: Artificial Intelligence, Advanced Visualization and Interaction, Machine learning -- Sustainable Artificial Intelligence: In Search of Technological Resilience -- NMR spectroscopy and learning-based classification of Acerola sample -- State-of-art and maturity overview of the nuclear industry on predictive maintenance -- Smart Contracts Auto-generation for Supply Chain Contexts -- Augmented Reality-assisted Quality Control based on Asset Administration Shells for Concrete Elements -- An Application of a Wearable Device with Motion-capture and Haptic-feedback for Human–robot Collaboration -- Design and Development of a G-Code generator for CNC machine tools based on Augmented Reality (AR) -- A telexistence interface for remote control of a physical industrial robot via data distribution service -- Predicting car sale time with data analytics and machine learning -- Automatic transformation of HVAC diagrams into machine-readable format -- Intent detection for virtual reality architectural design -- A Framework to optimize laser welding process by machine learning in a SME environment -- Product development: Design Methods, Building Design, Smart Products, New Product Development -- Positive Emotions for Responsible Consumption through Product Design -- The importance of preparing customized TRIZ matrix to accelerate the innovation for design buildings -- Exploring a System Dynamics approach to develop Shared-Mobility Services models -- To develop capabilities for patient-specific devices through the configuration of product life-cycle management strategy -- Building Information Model and safety requirements for spatial program validation -- Automated classification of datapoint types in building automation systems using time series -- How may modular construction transform the built environment ecosystem? -- An overview of smart product manufacturing based on classic product development processes -- Knowledge-Based Product-Service Ecosystems -- Interconnecting tailored work plans to smart products’ bills of materials -- Strategic Planning in the digital Engineering of Smart Product-based System of Systems Reconfiguration -- Lifecycle Engineering in the context of a medical device company – leveraging MBSE -- Crowd Intelligence Driven Design Framework Based on Perception-Retrieval Cognitive Mechanism -- Digital transition and the environment: towards an approach to assess environmental impacts of digital services using Life Cycle Assessment., ZIANI -- Development of a Learning Ecosystem for Effective Learning in Socio-Technical Complex Systems -- Manufacturing: Sustainable Manufacturing, Lean Manufacturing, Models for Manufacturing -- Real-time Allocation of volatile Energy related Emissions in Manufacturing -- Development of an Industry 4.0-oriented tool supporting Circular Manufacturing: a Systematic Literature -- First approach to a theoretical framework for carbon footprint management in the aerospace manufacturing industry -- Improving the sustainability of manufactured products: Literature review and challenges for digitalization of disassembly and dismantling processes -- Characterization of Integrated Lean tools, adapted to the upstream phase of the product life cycle of Stäubli Electrical Connectors SAS -- The use of the Toyota Kata approach: a literature review and SWOT analysis -- From Ontologies to Operative Data Models: A Data Model Development Supporting Zero Defect Manufacturing -- Evaluation of a commercial Model Lifecycle Management (MLM) tool to support Models for Manufacturing (MfM) methodology -- An Approach for the Assessment of Water Use in Batik Production Processes.
Record Nr. UNISA-996546843003316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology – INDOCRYPT 2007 [[electronic resource] ] : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings / / edited by K. Srinathan, C. Pandu Rangan, Moti Yung
Progress in Cryptology – INDOCRYPT 2007 [[electronic resource] ] : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings / / edited by K. Srinathan, C. Pandu Rangan, Moti Yung
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XI, 428 p.)
Disciplina 001.5436
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Discrete mathematics
Data protection
Computer networks
Electronic data processing—Management
Cryptology
Discrete Mathematics in Computer Science
Data and Information Security
Computer Communication Networks
IT Operations
ISBN 3-540-77026-7
Classificazione 004
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hashing -- Linearization Attacks Against Syndrome Based Hashes -- A Meet-in-the-Middle Collision Attack Against the New FORK-256 -- Multilane HMAC— Security beyond the Birthday Limit -- Elliptic Curve -- On the Bits of Elliptic Curve Diffie-Hellman Keys -- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography -- Cryptoanalysis -- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses -- Related-Key Differential-Linear Attacks on Reduced AES-192 -- Improved Meet-in-the-Middle Attacks on Reduced-Round DES -- Information Theoretic Security -- Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality -- Secret Swarm Unit Reactive k??Secret Sharing -- Elliptic Curve Cryptography -- New Formulae for Efficient Elliptic Curve Arithmetic -- A Graph Theoretic Analysis of Double Base Number Systems -- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication -- Signature -- Transitive Signatures from Braid Groups -- Proxy Re-signature Schemes Without Random Oracles -- Side Channel Attack -- First-Order Differential Power Analysis on the Duplication Method -- Solving Discrete Logarithms from Partial Knowledge of the Key -- Symmetric Cryptosystem -- New Description of SMS4 by an Embedding overGF(28) -- Tweakable Enciphering Schemes from Hash-Sum-Expansion -- A Framework for Chosen IV Statistical Analysis of Stream Ciphers -- Asymmetric Cryptosystem -- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols -- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power -- Short Presentation -- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues -- On the k-Operation Linear Complexity of Periodic Sequences -- Trade-Off Traitor Tracing -- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs -- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System -- Extended Multi-Property-Preserving and ECM-Construction -- Design of a Differential Power Analysis Resistant Masked AES S-Box -- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks -- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions -- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function -- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware.
Record Nr. UNISA-996465482703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings / / edited by K. Srinathan, C. Pandu Rangan, Moti Yung
Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings / / edited by K. Srinathan, C. Pandu Rangan, Moti Yung
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XI, 428 p.)
Disciplina 001.5436
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Discrete mathematics
Data protection
Computer networks
Electronic data processing—Management
Cryptology
Discrete Mathematics in Computer Science
Data and Information Security
Computer Communication Networks
IT Operations
ISBN 3-540-77026-7
Classificazione 004
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hashing -- Linearization Attacks Against Syndrome Based Hashes -- A Meet-in-the-Middle Collision Attack Against the New FORK-256 -- Multilane HMAC— Security beyond the Birthday Limit -- Elliptic Curve -- On the Bits of Elliptic Curve Diffie-Hellman Keys -- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography -- Cryptoanalysis -- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses -- Related-Key Differential-Linear Attacks on Reduced AES-192 -- Improved Meet-in-the-Middle Attacks on Reduced-Round DES -- Information Theoretic Security -- Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality -- Secret Swarm Unit Reactive k??Secret Sharing -- Elliptic Curve Cryptography -- New Formulae for Efficient Elliptic Curve Arithmetic -- A Graph Theoretic Analysis of Double Base Number Systems -- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication -- Signature -- Transitive Signatures from Braid Groups -- Proxy Re-signature Schemes Without Random Oracles -- Side Channel Attack -- First-Order Differential Power Analysis on the Duplication Method -- Solving Discrete Logarithms from Partial Knowledge of the Key -- Symmetric Cryptosystem -- New Description of SMS4 by an Embedding overGF(28) -- Tweakable Enciphering Schemes from Hash-Sum-Expansion -- A Framework for Chosen IV Statistical Analysis of Stream Ciphers -- Asymmetric Cryptosystem -- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols -- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power -- Short Presentation -- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues -- On the k-Operation Linear Complexity of Periodic Sequences -- Trade-Off Traitor Tracing -- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs -- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System -- Extended Multi-Property-Preserving and ECM-Construction -- Design of a Differential Power Analysis Resistant Masked AES S-Box -- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks -- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions -- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function -- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware.
Record Nr. UNINA-9910484450503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui