Advances in Computing Science - ASIAN 2000 [[electronic resource] ] : 6th Asian Computing Science Conference Penang, Malaysia, November 25-27, 2000 Proceedings / / edited by Jifeng He, Masahiko Sato |
Edizione | [1st ed. 2000.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000 |
Descrizione fisica | 1 online resource (X, 306 p.) |
Disciplina | 004 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers
Mathematical logic Computer logic Artificial intelligence Computer communication systems Algorithms Theory of Computation Mathematical Logic and Formal Languages Logics and Meanings of Programs Artificial Intelligence Computer Communication Networks Algorithm Analysis and Problem Complexity |
ISBN | 3-540-44464-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Finite Digital Synchronous Circuits Are Characterized by 2-Algebraic Truth Tables -- Performance Evaluation of Networks: New Problems and Challenges -- Emerging Patterns and Classification -- IPv6 Performance Analysis on FreeBSD Workstation Using Simple Applications -- Performance of Location Caching Scheme to Support Call Locality in Wireless Networks -- A Practical Parity Scheme for Tolerating Triple Disk Failures in RAID Architectures -- Genetic Algorithm for Extended Cell Assignment Problem in Wireless ATM Network -- Spatial Congruence for Ambients Is Decidable -- A Spatio-temporal Representation Scheme for Modeling Moving Objects in Video Data -- Node-to-Set Disjoint Paths Problem in Rotator Graphs -- On Simulation-Checking with Sequential Systems -- Reusing Animations in Databases for Multimedia Presentations -- Reflecting BDDs in Coq -- On Model Checking Synchronised Hardware Circuits -- Safe Ambients: Control Flow Analysis and Security -- Security Types for Mobile Safe Ambients -- Improving Functional Logic Programs by Difference-Lists -- A New Multihop Logical Topology for Reliable Broadband Communication -- A New Scalable Topology for Multihop Optical Networks -- On Computable Tree Functions -- Sharpening the Undecidability of Interval Temporal Logic. |
Record Nr. | UNINA-9910143609403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Computing Science - ASIAN 2000 [[electronic resource] ] : 6th Asian Computing Science Conference Penang, Malaysia, November 25-27, 2000 Proceedings / / edited by Jifeng He, Masahiko Sato |
Edizione | [1st ed. 2000.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000 |
Descrizione fisica | 1 online resource (X, 306 p.) |
Disciplina | 004 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers
Mathematical logic Computer logic Artificial intelligence Computer communication systems Algorithms Theory of Computation Mathematical Logic and Formal Languages Logics and Meanings of Programs Artificial Intelligence Computer Communication Networks Algorithm Analysis and Problem Complexity |
ISBN | 3-540-44464-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Finite Digital Synchronous Circuits Are Characterized by 2-Algebraic Truth Tables -- Performance Evaluation of Networks: New Problems and Challenges -- Emerging Patterns and Classification -- IPv6 Performance Analysis on FreeBSD Workstation Using Simple Applications -- Performance of Location Caching Scheme to Support Call Locality in Wireless Networks -- A Practical Parity Scheme for Tolerating Triple Disk Failures in RAID Architectures -- Genetic Algorithm for Extended Cell Assignment Problem in Wireless ATM Network -- Spatial Congruence for Ambients Is Decidable -- A Spatio-temporal Representation Scheme for Modeling Moving Objects in Video Data -- Node-to-Set Disjoint Paths Problem in Rotator Graphs -- On Simulation-Checking with Sequential Systems -- Reusing Animations in Databases for Multimedia Presentations -- Reflecting BDDs in Coq -- On Model Checking Synchronised Hardware Circuits -- Safe Ambients: Control Flow Analysis and Security -- Security Types for Mobile Safe Ambients -- Improving Functional Logic Programs by Difference-Lists -- A New Multihop Logical Topology for Reliable Broadband Communication -- A New Scalable Topology for Multihop Optical Networks -- On Computable Tree Functions -- Sharpening the Undecidability of Interval Temporal Logic. |
Record Nr. | UNISA-996466179103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Conceptual Modeling [[electronic resource] ] : ER 2023 Workshops, CMLS, CMOMM4FAIR, EmpER, JUSMOD, OntoCom, QUAMES, and SmartFood, Lisbon, Portugal, November 6–9, 2023, Proceedings / / edited by Tiago Prince Sales, João Araújo, José Borbinha, Giancarlo Guizzardi |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (353 pages) |
Disciplina | 929.605 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Software engineering
Artificial intelligence Database management Data mining Application software Computer science Software Engineering Artificial Intelligence Database Management Data Mining and Knowledge Discovery Computer and Information Systems Applications Theory of Computation |
ISBN | 3-031-47112-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | CMLS: An Ontology for Breast Cancer Screening -- Integrating Nuclear Medicine and Radiopharmacy Data: A Conceptual Model for Precision Medicine and Enhanced Patient Care -- Comprehensive Representation of Variation Interpretation Data via Conceptual Modeling -- Enhancing Precision Medicine: An Automatic Pipeline Approach for Exploring Genetic Variant-Disease Literature -- CMOMM4FAIR: euFAIR: A Digital Tool for Assessing the FAIR Principles -- EmpER: Empirical Exploration of Open-Source Issues for Predicting Privacy Compliance -- Human-Centred Conceptual Modelling for Re-Designing Urban Planning -- Using Knowledge Graphs to Generate SQL Queries from Textual Specifications -- A Systematic Approach to Generate TOGAF Artifacts Founded on Multiple Data Sources and Ontology -- Bridging the Gap: Conceptual Modeling and Machine Learning for Web Portals -- JUSMOD: New-Generation Templates Facilitating the Shift from Documents to Data in the Italian Judiciary -- Supervised Learning, Explanation and Interpretation from Pretrial Detention Decisions by Italian and Brazilian Supreme Courts -- Few-Shot Legal Text Segmentation via Rewiring Conditional Random Fields: A Preliminary Study -- Identification and Visualization of Legal Definitions and Legal Term Relations -- Comparative Analysis of Disinformation Regulations: A Preliminary Analysis -- Privacy-Preserving Data Integration for Digital Justice -- Public Procurement Analysis with Process Discovery Techniques and Event Log Enrichment -- Formalising Legal Knowledge of Sri Lankan Civil Appellate High Court Domain from Ontological Perspective -- OntoCom: Towards Semantics for Abstractions in Ontology-Driven Conceptual Modeling -- Misalignments of Social and Numerical Identity – An Ontological Analysis -- Using an Ontology for Defining Semantics of Fractal Enterprise Model -- One Model to Rule Them All: A Demonstration of Ontology-Driven Minimum Viable Product Development for a Local Tourism Platform -- Enhancing Requirement-Information Mapping for Sustainable Buildings: Introducing the SFIR Ontology -- On the Use of ChatGPT for Classifying Domain Terms According to Upper Ontologies -- QUAMES: Exploring Understandability in Socio-Technical Models for Data Protection Analysis: Results from a Focus Group -- FlowTGE: Automating Functional Testing of Executable Business Process Models Based on BPMN -- An Approach Aligned with Model Driven Development to Evaluate the Quality of Explainable Artificial Intelligence -- SmartFood: Unveiling major Knowledge Organization Systems’ artifacts for Agriculture with network graphs -- Design Implications Towards Human-Centric Semantic Recommenders for Sustainable Food Consumption -- CoffeeWKG: A Weather Knowledge Graph for Coffee Regions in Colombia. |
Record Nr. | UNISA-996558465503316 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Conceptual Modeling [[electronic resource] ] : ER 2023 Workshops, CMLS, CMOMM4FAIR, EmpER, JUSMOD, OntoCom, QUAMES, and SmartFood, Lisbon, Portugal, November 6–9, 2023, Proceedings / / edited by Tiago Prince Sales, João Araújo, José Borbinha, Giancarlo Guizzardi |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (353 pages) |
Disciplina | 929.605 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Software engineering
Artificial intelligence Database management Data mining Application software Computer science Software Engineering Artificial Intelligence Database Management Data Mining and Knowledge Discovery Computer and Information Systems Applications Theory of Computation |
ISBN | 3-031-47112-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | CMLS: An Ontology for Breast Cancer Screening -- Integrating Nuclear Medicine and Radiopharmacy Data: A Conceptual Model for Precision Medicine and Enhanced Patient Care -- Comprehensive Representation of Variation Interpretation Data via Conceptual Modeling -- Enhancing Precision Medicine: An Automatic Pipeline Approach for Exploring Genetic Variant-Disease Literature -- CMOMM4FAIR: euFAIR: A Digital Tool for Assessing the FAIR Principles -- EmpER: Empirical Exploration of Open-Source Issues for Predicting Privacy Compliance -- Human-Centred Conceptual Modelling for Re-Designing Urban Planning -- Using Knowledge Graphs to Generate SQL Queries from Textual Specifications -- A Systematic Approach to Generate TOGAF Artifacts Founded on Multiple Data Sources and Ontology -- Bridging the Gap: Conceptual Modeling and Machine Learning for Web Portals -- JUSMOD: New-Generation Templates Facilitating the Shift from Documents to Data in the Italian Judiciary -- Supervised Learning, Explanation and Interpretation from Pretrial Detention Decisions by Italian and Brazilian Supreme Courts -- Few-Shot Legal Text Segmentation via Rewiring Conditional Random Fields: A Preliminary Study -- Identification and Visualization of Legal Definitions and Legal Term Relations -- Comparative Analysis of Disinformation Regulations: A Preliminary Analysis -- Privacy-Preserving Data Integration for Digital Justice -- Public Procurement Analysis with Process Discovery Techniques and Event Log Enrichment -- Formalising Legal Knowledge of Sri Lankan Civil Appellate High Court Domain from Ontological Perspective -- OntoCom: Towards Semantics for Abstractions in Ontology-Driven Conceptual Modeling -- Misalignments of Social and Numerical Identity – An Ontological Analysis -- Using an Ontology for Defining Semantics of Fractal Enterprise Model -- One Model to Rule Them All: A Demonstration of Ontology-Driven Minimum Viable Product Development for a Local Tourism Platform -- Enhancing Requirement-Information Mapping for Sustainable Buildings: Introducing the SFIR Ontology -- On the Use of ChatGPT for Classifying Domain Terms According to Upper Ontologies -- QUAMES: Exploring Understandability in Socio-Technical Models for Data Protection Analysis: Results from a Focus Group -- FlowTGE: Automating Functional Testing of Executable Business Process Models Based on BPMN -- An Approach Aligned with Model Driven Development to Evaluate the Quality of Explainable Artificial Intelligence -- SmartFood: Unveiling major Knowledge Organization Systems’ artifacts for Agriculture with network graphs -- Design Implications Towards Human-Centric Semantic Recommenders for Sustainable Food Consumption -- CoffeeWKG: A Weather Knowledge Graph for Coffee Regions in Colombia. |
Record Nr. | UNINA-9910755079903321 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Cryptology - CRYPTO '98 [[electronic resource] ] : 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings / / edited by Hugo Krawczyk |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 |
Descrizione fisica | 1 online resource (XII, 524 p.) |
Disciplina | 005.82 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer security Computers Computer science—Mathematics Computer communication systems Management information systems Computer science Cryptology Systems and Data Security Theory of Computation Discrete Mathematics in Computer Science Computer Communication Networks Management of Computing and Information Systems |
ISBN | 3-540-68462-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1 -- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack -- Relations among notions of security for public-key encryption schemes -- Cryptography and the internet -- Differential collisions in SHA-0 -- From differential cryptanalysis to ciphertext-only attacks -- A simplified approach to threshold and proactive RSA -- New efficient and secure protocols for verifiable signature sharing and other applications -- Trading correctness for privacy in unconditional multi-party computation -- Fast digital identity revocation -- Self-delegation with controlled propagation — or — What if you lose your laptop -- Identity escrow -- Generalized birthday attacks on unbalanced Feistel networks -- Quadratic relation of S-box and its application to the linear attack of full round DES -- Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree -- Cryptanalysis of the Ajtai-Dwork cryptosystem -- Cryptanalysis of the Chor-Rivest cryptosystem -- Cryptanalysis of the oil and vinegar signature scheme -- From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs -- Many-to-one trapdoor functions and their relation to public-key cryptosystems -- Authentication, enhanced security and error correcting codes -- An efficient discrete log pseudo random generator -- Fast RSA-type cryptosystem modulo p k q -- An elliptic curve implementation of the finite field digital signature algorithm -- Quantum bit commitment from a physical assumption -- On concrete security treatment of signatures derived from identification -- Building PRFs from PRPs -- Security amplification by composition: The case of doubly-iterated, ideal ciphers -- On the existence of 3-round zero-knowledge protocols -- Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free? -- Concurrent zero-knowledge: Reducing the need for timing constraints -- The solution of McCurley's discrete log challenge -- Optimal extension fields for fast arithmetic in public-key algorithms -- Time-stamping with binary linking schemes -- Threshold traitor tracing. |
Record Nr. | UNISA-996466138803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Cryptology - CRYPTO '98 [[electronic resource] ] : 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings / / edited by Hugo Krawczyk |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 |
Descrizione fisica | 1 online resource (XII, 524 p.) |
Disciplina | 005.82 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer security Computers Computer science—Mathematics Computer communication systems Management information systems Computer science Cryptology Systems and Data Security Theory of Computation Discrete Mathematics in Computer Science Computer Communication Networks Management of Computing and Information Systems |
ISBN | 3-540-68462-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1 -- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack -- Relations among notions of security for public-key encryption schemes -- Cryptography and the internet -- Differential collisions in SHA-0 -- From differential cryptanalysis to ciphertext-only attacks -- A simplified approach to threshold and proactive RSA -- New efficient and secure protocols for verifiable signature sharing and other applications -- Trading correctness for privacy in unconditional multi-party computation -- Fast digital identity revocation -- Self-delegation with controlled propagation — or — What if you lose your laptop -- Identity escrow -- Generalized birthday attacks on unbalanced Feistel networks -- Quadratic relation of S-box and its application to the linear attack of full round DES -- Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree -- Cryptanalysis of the Ajtai-Dwork cryptosystem -- Cryptanalysis of the Chor-Rivest cryptosystem -- Cryptanalysis of the oil and vinegar signature scheme -- From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs -- Many-to-one trapdoor functions and their relation to public-key cryptosystems -- Authentication, enhanced security and error correcting codes -- An efficient discrete log pseudo random generator -- Fast RSA-type cryptosystem modulo p k q -- An elliptic curve implementation of the finite field digital signature algorithm -- Quantum bit commitment from a physical assumption -- On concrete security treatment of signatures derived from identification -- Building PRFs from PRPs -- Security amplification by composition: The case of doubly-iterated, ideal ciphers -- On the existence of 3-round zero-knowledge protocols -- Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free? -- Concurrent zero-knowledge: Reducing the need for timing constraints -- The solution of McCurley's discrete log challenge -- Optimal extension fields for fast arithmetic in public-key algorithms -- Time-stamping with binary linking schemes -- Threshold traitor tracing. |
Record Nr. | UNINA-9910767583803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Cryptology - CRYPTO 2001 [[electronic resource] ] : 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings / / edited by Joe Kilian |
Edizione | [1st ed. 2001.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 |
Descrizione fisica | 1 online resource (XII, 604 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Coding theory
Information theory Data encryption (Computer science) Computers Algorithms Computer science—Mathematics Operating systems (Computers) Coding and Information Theory Cryptology Theory of Computation Algorithm Analysis and Problem Complexity Mathematics of Computing Operating Systems |
ISBN | 3-540-44647-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foundations -- On the (Im)possibility of Obfuscating Programs -- Universally Composable Commitments -- Traitor Tracing -- Revocation and Tracing Schemes for Stateless Receivers -- Self Protecting Pirates and Black-Box Traitor Tracing -- Multi-party Computation -- Minimal Complete Primitives for Secure Multi-party Computation -- Robustness for Free in Unconditional Multi-party Computation -- Secure Distributed Linear Algebra in a Constant Number of Rounds -- Two-Party Computation -- Two-Party Generation of DSA Signatures -- Oblivious Transfer in the Bounded Storage Model -- Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation -- Elliptic Curves -- Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms -- On the Unpredictability of Bits of the Elliptic Curve Diffie-Hellman Scheme -- Identity-Based Encryption from the Weil Pairing -- OAEP -- A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 -- OAEP Reconsidered -- RSA-OAEP Is Secure under the RSA Assumption -- Simplified OAEP for the RSA and Rabin Functions -- Encryption and Authentication -- Online Ciphers and the Hash-CBC Construction -- The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) -- Signature Schemes -- Forward-Secure Signatures with Optimal Signing and Verifying -- Improved Online/Offline Signature Schemes -- Protocols -- An Efficient Scheme for Proving a Shuffle -- An Identity Escrow Scheme with Appointed Verifiers -- Session-Key Generation Using Human Passwords Only -- Cryptanalysis -- Cryptanalysis of RSA Signatures with Fixed-Pattern Padding -- Correlation Analysis of the Shrinking Generator -- Applications of Groups and Codes -- Nonlinear Vector Resilient Functions -- New Public Key Cryptosystem Using Finite Non Abelian Groups -- Pseudorandomness from Braid Groups -- Broadcast and Secret Sharing -- On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase -- Secure and Efficient Asynchronous Broadcast Protocols -- Soundness and Zero-Knowledge -- Soundness in the Public-Key Model -- Robust Non-interactive Zero Knowledge. |
Record Nr. | UNINA-9910143628203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Cryptology - CRYPTO 2001 [[electronic resource] ] : 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings / / edited by Joe Kilian |
Edizione | [1st ed. 2001.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 |
Descrizione fisica | 1 online resource (XII, 604 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Coding theory
Information theory Data encryption (Computer science) Computers Algorithms Computer science—Mathematics Operating systems (Computers) Coding and Information Theory Cryptology Theory of Computation Algorithm Analysis and Problem Complexity Mathematics of Computing Operating Systems |
ISBN | 3-540-44647-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foundations -- On the (Im)possibility of Obfuscating Programs -- Universally Composable Commitments -- Traitor Tracing -- Revocation and Tracing Schemes for Stateless Receivers -- Self Protecting Pirates and Black-Box Traitor Tracing -- Multi-party Computation -- Minimal Complete Primitives for Secure Multi-party Computation -- Robustness for Free in Unconditional Multi-party Computation -- Secure Distributed Linear Algebra in a Constant Number of Rounds -- Two-Party Computation -- Two-Party Generation of DSA Signatures -- Oblivious Transfer in the Bounded Storage Model -- Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation -- Elliptic Curves -- Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms -- On the Unpredictability of Bits of the Elliptic Curve Diffie-Hellman Scheme -- Identity-Based Encryption from the Weil Pairing -- OAEP -- A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 -- OAEP Reconsidered -- RSA-OAEP Is Secure under the RSA Assumption -- Simplified OAEP for the RSA and Rabin Functions -- Encryption and Authentication -- Online Ciphers and the Hash-CBC Construction -- The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) -- Signature Schemes -- Forward-Secure Signatures with Optimal Signing and Verifying -- Improved Online/Offline Signature Schemes -- Protocols -- An Efficient Scheme for Proving a Shuffle -- An Identity Escrow Scheme with Appointed Verifiers -- Session-Key Generation Using Human Passwords Only -- Cryptanalysis -- Cryptanalysis of RSA Signatures with Fixed-Pattern Padding -- Correlation Analysis of the Shrinking Generator -- Applications of Groups and Codes -- Nonlinear Vector Resilient Functions -- New Public Key Cryptosystem Using Finite Non Abelian Groups -- Pseudorandomness from Braid Groups -- Broadcast and Secret Sharing -- On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase -- Secure and Efficient Asynchronous Broadcast Protocols -- Soundness and Zero-Knowledge -- Soundness in the Public-Key Model -- Robust Non-interactive Zero Knowledge. |
Record Nr. | UNISA-996465793803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Cryptology -- ASIACRYPT 2014 [[electronic resource] ] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I / / edited by Palash Sarkar, Tetsu Iwata |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XX, 574 p. 74 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Coding theory Information theory Management information systems Computer science Computers Computer science—Mathematics Cryptology Systems and Data Security Coding and Information Theory Management of Computing and Information Systems Theory of Computation Mathematics of Computing |
ISBN | 3-662-45611-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side channel analysis -- Hyperelliptic curve cryptography -- Factoring and discrete log -- Cryptanalysis -- Signatures -- Zero knowledge -- Encryption schemes -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation. |
Record Nr. | UNINA-9910482998003321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Cryptology -- ASIACRYPT 2014 [[electronic resource] ] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II / / edited by Palash Sarkar, Tetsu Iwata |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XXII, 528 p. 76 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Coding theory Information theory Management information systems Computer science Computers Computer science—Mathematics Cryptology Systems and Data Security Coding and Information Theory Management of Computing and Information Systems Theory of Computation Mathematics of Computing |
ISBN | 3-662-45608-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side channel analysis -- Hyperelliptic curve cryptography -- Factoring and discrete log -- Cryptanalysis -- Signatures -- Zero knowledge -- Encryption schemes -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation. |
Record Nr. | UNINA-9910484064703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|