top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Computing Science - ASIAN 2000 [[electronic resource] ] : 6th Asian Computing Science Conference Penang, Malaysia, November 25-27, 2000 Proceedings / / edited by Jifeng He, Masahiko Sato
Advances in Computing Science - ASIAN 2000 [[electronic resource] ] : 6th Asian Computing Science Conference Penang, Malaysia, November 25-27, 2000 Proceedings / / edited by Jifeng He, Masahiko Sato
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (X, 306 p.)
Disciplina 004
Collana Lecture Notes in Computer Science
Soggetto topico Computers
Mathematical logic
Computer logic
Artificial intelligence
Computer communication systems
Algorithms
Theory of Computation
Mathematical Logic and Formal Languages
Logics and Meanings of Programs
Artificial Intelligence
Computer Communication Networks
Algorithm Analysis and Problem Complexity
ISBN 3-540-44464-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Finite Digital Synchronous Circuits Are Characterized by 2-Algebraic Truth Tables -- Performance Evaluation of Networks: New Problems and Challenges -- Emerging Patterns and Classification -- IPv6 Performance Analysis on FreeBSD Workstation Using Simple Applications -- Performance of Location Caching Scheme to Support Call Locality in Wireless Networks -- A Practical Parity Scheme for Tolerating Triple Disk Failures in RAID Architectures -- Genetic Algorithm for Extended Cell Assignment Problem in Wireless ATM Network -- Spatial Congruence for Ambients Is Decidable -- A Spatio-temporal Representation Scheme for Modeling Moving Objects in Video Data -- Node-to-Set Disjoint Paths Problem in Rotator Graphs -- On Simulation-Checking with Sequential Systems -- Reusing Animations in Databases for Multimedia Presentations -- Reflecting BDDs in Coq -- On Model Checking Synchronised Hardware Circuits -- Safe Ambients: Control Flow Analysis and Security -- Security Types for Mobile Safe Ambients -- Improving Functional Logic Programs by Difference-Lists -- A New Multihop Logical Topology for Reliable Broadband Communication -- A New Scalable Topology for Multihop Optical Networks -- On Computable Tree Functions -- Sharpening the Undecidability of Interval Temporal Logic.
Record Nr. UNINA-9910143609403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Computing Science - ASIAN 2000 [[electronic resource] ] : 6th Asian Computing Science Conference Penang, Malaysia, November 25-27, 2000 Proceedings / / edited by Jifeng He, Masahiko Sato
Advances in Computing Science - ASIAN 2000 [[electronic resource] ] : 6th Asian Computing Science Conference Penang, Malaysia, November 25-27, 2000 Proceedings / / edited by Jifeng He, Masahiko Sato
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (X, 306 p.)
Disciplina 004
Collana Lecture Notes in Computer Science
Soggetto topico Computers
Mathematical logic
Computer logic
Artificial intelligence
Computer communication systems
Algorithms
Theory of Computation
Mathematical Logic and Formal Languages
Logics and Meanings of Programs
Artificial Intelligence
Computer Communication Networks
Algorithm Analysis and Problem Complexity
ISBN 3-540-44464-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Finite Digital Synchronous Circuits Are Characterized by 2-Algebraic Truth Tables -- Performance Evaluation of Networks: New Problems and Challenges -- Emerging Patterns and Classification -- IPv6 Performance Analysis on FreeBSD Workstation Using Simple Applications -- Performance of Location Caching Scheme to Support Call Locality in Wireless Networks -- A Practical Parity Scheme for Tolerating Triple Disk Failures in RAID Architectures -- Genetic Algorithm for Extended Cell Assignment Problem in Wireless ATM Network -- Spatial Congruence for Ambients Is Decidable -- A Spatio-temporal Representation Scheme for Modeling Moving Objects in Video Data -- Node-to-Set Disjoint Paths Problem in Rotator Graphs -- On Simulation-Checking with Sequential Systems -- Reusing Animations in Databases for Multimedia Presentations -- Reflecting BDDs in Coq -- On Model Checking Synchronised Hardware Circuits -- Safe Ambients: Control Flow Analysis and Security -- Security Types for Mobile Safe Ambients -- Improving Functional Logic Programs by Difference-Lists -- A New Multihop Logical Topology for Reliable Broadband Communication -- A New Scalable Topology for Multihop Optical Networks -- On Computable Tree Functions -- Sharpening the Undecidability of Interval Temporal Logic.
Record Nr. UNISA-996466179103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Conceptual Modeling [[electronic resource] ] : ER 2023 Workshops, CMLS, CMOMM4FAIR, EmpER, JUSMOD, OntoCom, QUAMES, and SmartFood, Lisbon, Portugal, November 6–9, 2023, Proceedings / / edited by Tiago Prince Sales, João Araújo, José Borbinha, Giancarlo Guizzardi
Advances in Conceptual Modeling [[electronic resource] ] : ER 2023 Workshops, CMLS, CMOMM4FAIR, EmpER, JUSMOD, OntoCom, QUAMES, and SmartFood, Lisbon, Portugal, November 6–9, 2023, Proceedings / / edited by Tiago Prince Sales, João Araújo, José Borbinha, Giancarlo Guizzardi
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (353 pages)
Disciplina 929.605
Collana Lecture Notes in Computer Science
Soggetto topico Software engineering
Artificial intelligence
Database management
Data mining
Application software
Computer science
Software Engineering
Artificial Intelligence
Database Management
Data Mining and Knowledge Discovery
Computer and Information Systems Applications
Theory of Computation
ISBN 3-031-47112-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CMLS: An Ontology for Breast Cancer Screening -- Integrating Nuclear Medicine and Radiopharmacy Data: A Conceptual Model for Precision Medicine and Enhanced Patient Care -- Comprehensive Representation of Variation Interpretation Data via Conceptual Modeling -- Enhancing Precision Medicine: An Automatic Pipeline Approach for Exploring Genetic Variant-Disease Literature -- CMOMM4FAIR: euFAIR: A Digital Tool for Assessing the FAIR Principles -- EmpER: Empirical Exploration of Open-Source Issues for Predicting Privacy Compliance -- Human-Centred Conceptual Modelling for Re-Designing Urban Planning -- Using Knowledge Graphs to Generate SQL Queries from Textual Specifications -- A Systematic Approach to Generate TOGAF Artifacts Founded on Multiple Data Sources and Ontology -- Bridging the Gap: Conceptual Modeling and Machine Learning for Web Portals -- JUSMOD: New-Generation Templates Facilitating the Shift from Documents to Data in the Italian Judiciary -- Supervised Learning, Explanation and Interpretation from Pretrial Detention Decisions by Italian and Brazilian Supreme Courts -- Few-Shot Legal Text Segmentation via Rewiring Conditional Random Fields: A Preliminary Study -- Identification and Visualization of Legal Definitions and Legal Term Relations -- Comparative Analysis of Disinformation Regulations: A Preliminary Analysis -- Privacy-Preserving Data Integration for Digital Justice -- Public Procurement Analysis with Process Discovery Techniques and Event Log Enrichment -- Formalising Legal Knowledge of Sri Lankan Civil Appellate High Court Domain from Ontological Perspective -- OntoCom: Towards Semantics for Abstractions in Ontology-Driven Conceptual Modeling -- Misalignments of Social and Numerical Identity – An Ontological Analysis -- Using an Ontology for Defining Semantics of Fractal Enterprise Model -- One Model to Rule Them All: A Demonstration of Ontology-Driven Minimum Viable Product Development for a Local Tourism Platform -- Enhancing Requirement-Information Mapping for Sustainable Buildings: Introducing the SFIR Ontology -- On the Use of ChatGPT for Classifying Domain Terms According to Upper Ontologies -- QUAMES: Exploring Understandability in Socio-Technical Models for Data Protection Analysis: Results from a Focus Group -- FlowTGE: Automating Functional Testing of Executable Business Process Models Based on BPMN -- An Approach Aligned with Model Driven Development to Evaluate the Quality of Explainable Artificial Intelligence -- SmartFood: Unveiling major Knowledge Organization Systems’ artifacts for Agriculture with network graphs -- Design Implications Towards Human-Centric Semantic Recommenders for Sustainable Food Consumption -- CoffeeWKG: A Weather Knowledge Graph for Coffee Regions in Colombia.
Record Nr. UNISA-996558465503316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Conceptual Modeling [[electronic resource] ] : ER 2023 Workshops, CMLS, CMOMM4FAIR, EmpER, JUSMOD, OntoCom, QUAMES, and SmartFood, Lisbon, Portugal, November 6–9, 2023, Proceedings / / edited by Tiago Prince Sales, João Araújo, José Borbinha, Giancarlo Guizzardi
Advances in Conceptual Modeling [[electronic resource] ] : ER 2023 Workshops, CMLS, CMOMM4FAIR, EmpER, JUSMOD, OntoCom, QUAMES, and SmartFood, Lisbon, Portugal, November 6–9, 2023, Proceedings / / edited by Tiago Prince Sales, João Araújo, José Borbinha, Giancarlo Guizzardi
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (353 pages)
Disciplina 929.605
Collana Lecture Notes in Computer Science
Soggetto topico Software engineering
Artificial intelligence
Database management
Data mining
Application software
Computer science
Software Engineering
Artificial Intelligence
Database Management
Data Mining and Knowledge Discovery
Computer and Information Systems Applications
Theory of Computation
ISBN 3-031-47112-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CMLS: An Ontology for Breast Cancer Screening -- Integrating Nuclear Medicine and Radiopharmacy Data: A Conceptual Model for Precision Medicine and Enhanced Patient Care -- Comprehensive Representation of Variation Interpretation Data via Conceptual Modeling -- Enhancing Precision Medicine: An Automatic Pipeline Approach for Exploring Genetic Variant-Disease Literature -- CMOMM4FAIR: euFAIR: A Digital Tool for Assessing the FAIR Principles -- EmpER: Empirical Exploration of Open-Source Issues for Predicting Privacy Compliance -- Human-Centred Conceptual Modelling for Re-Designing Urban Planning -- Using Knowledge Graphs to Generate SQL Queries from Textual Specifications -- A Systematic Approach to Generate TOGAF Artifacts Founded on Multiple Data Sources and Ontology -- Bridging the Gap: Conceptual Modeling and Machine Learning for Web Portals -- JUSMOD: New-Generation Templates Facilitating the Shift from Documents to Data in the Italian Judiciary -- Supervised Learning, Explanation and Interpretation from Pretrial Detention Decisions by Italian and Brazilian Supreme Courts -- Few-Shot Legal Text Segmentation via Rewiring Conditional Random Fields: A Preliminary Study -- Identification and Visualization of Legal Definitions and Legal Term Relations -- Comparative Analysis of Disinformation Regulations: A Preliminary Analysis -- Privacy-Preserving Data Integration for Digital Justice -- Public Procurement Analysis with Process Discovery Techniques and Event Log Enrichment -- Formalising Legal Knowledge of Sri Lankan Civil Appellate High Court Domain from Ontological Perspective -- OntoCom: Towards Semantics for Abstractions in Ontology-Driven Conceptual Modeling -- Misalignments of Social and Numerical Identity – An Ontological Analysis -- Using an Ontology for Defining Semantics of Fractal Enterprise Model -- One Model to Rule Them All: A Demonstration of Ontology-Driven Minimum Viable Product Development for a Local Tourism Platform -- Enhancing Requirement-Information Mapping for Sustainable Buildings: Introducing the SFIR Ontology -- On the Use of ChatGPT for Classifying Domain Terms According to Upper Ontologies -- QUAMES: Exploring Understandability in Socio-Technical Models for Data Protection Analysis: Results from a Focus Group -- FlowTGE: Automating Functional Testing of Executable Business Process Models Based on BPMN -- An Approach Aligned with Model Driven Development to Evaluate the Quality of Explainable Artificial Intelligence -- SmartFood: Unveiling major Knowledge Organization Systems’ artifacts for Agriculture with network graphs -- Design Implications Towards Human-Centric Semantic Recommenders for Sustainable Food Consumption -- CoffeeWKG: A Weather Knowledge Graph for Coffee Regions in Colombia.
Record Nr. UNINA-9910755079903321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology - CRYPTO '98 [[electronic resource] ] : 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings / / edited by Hugo Krawczyk
Advances in Cryptology - CRYPTO '98 [[electronic resource] ] : 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings / / edited by Hugo Krawczyk
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Descrizione fisica 1 online resource (XII, 524 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer security
Computers
Computer science—Mathematics
Computer communication systems
Management information systems
Computer science
Cryptology
Systems and Data Security
Theory of Computation
Discrete Mathematics in Computer Science
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-540-68462-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1 -- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack -- Relations among notions of security for public-key encryption schemes -- Cryptography and the internet -- Differential collisions in SHA-0 -- From differential cryptanalysis to ciphertext-only attacks -- A simplified approach to threshold and proactive RSA -- New efficient and secure protocols for verifiable signature sharing and other applications -- Trading correctness for privacy in unconditional multi-party computation -- Fast digital identity revocation -- Self-delegation with controlled propagation — or — What if you lose your laptop -- Identity escrow -- Generalized birthday attacks on unbalanced Feistel networks -- Quadratic relation of S-box and its application to the linear attack of full round DES -- Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree -- Cryptanalysis of the Ajtai-Dwork cryptosystem -- Cryptanalysis of the Chor-Rivest cryptosystem -- Cryptanalysis of the oil and vinegar signature scheme -- From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs -- Many-to-one trapdoor functions and their relation to public-key cryptosystems -- Authentication, enhanced security and error correcting codes -- An efficient discrete log pseudo random generator -- Fast RSA-type cryptosystem modulo p k q -- An elliptic curve implementation of the finite field digital signature algorithm -- Quantum bit commitment from a physical assumption -- On concrete security treatment of signatures derived from identification -- Building PRFs from PRPs -- Security amplification by composition: The case of doubly-iterated, ideal ciphers -- On the existence of 3-round zero-knowledge protocols -- Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free? -- Concurrent zero-knowledge: Reducing the need for timing constraints -- The solution of McCurley's discrete log challenge -- Optimal extension fields for fast arithmetic in public-key algorithms -- Time-stamping with binary linking schemes -- Threshold traitor tracing.
Record Nr. UNISA-996466138803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology - CRYPTO '98 [[electronic resource] ] : 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings / / edited by Hugo Krawczyk
Advances in Cryptology - CRYPTO '98 [[electronic resource] ] : 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings / / edited by Hugo Krawczyk
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Descrizione fisica 1 online resource (XII, 524 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer security
Computers
Computer science—Mathematics
Computer communication systems
Management information systems
Computer science
Cryptology
Systems and Data Security
Theory of Computation
Discrete Mathematics in Computer Science
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-540-68462-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1 -- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack -- Relations among notions of security for public-key encryption schemes -- Cryptography and the internet -- Differential collisions in SHA-0 -- From differential cryptanalysis to ciphertext-only attacks -- A simplified approach to threshold and proactive RSA -- New efficient and secure protocols for verifiable signature sharing and other applications -- Trading correctness for privacy in unconditional multi-party computation -- Fast digital identity revocation -- Self-delegation with controlled propagation — or — What if you lose your laptop -- Identity escrow -- Generalized birthday attacks on unbalanced Feistel networks -- Quadratic relation of S-box and its application to the linear attack of full round DES -- Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree -- Cryptanalysis of the Ajtai-Dwork cryptosystem -- Cryptanalysis of the Chor-Rivest cryptosystem -- Cryptanalysis of the oil and vinegar signature scheme -- From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs -- Many-to-one trapdoor functions and their relation to public-key cryptosystems -- Authentication, enhanced security and error correcting codes -- An efficient discrete log pseudo random generator -- Fast RSA-type cryptosystem modulo p k q -- An elliptic curve implementation of the finite field digital signature algorithm -- Quantum bit commitment from a physical assumption -- On concrete security treatment of signatures derived from identification -- Building PRFs from PRPs -- Security amplification by composition: The case of doubly-iterated, ideal ciphers -- On the existence of 3-round zero-knowledge protocols -- Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free? -- Concurrent zero-knowledge: Reducing the need for timing constraints -- The solution of McCurley's discrete log challenge -- Optimal extension fields for fast arithmetic in public-key algorithms -- Time-stamping with binary linking schemes -- Threshold traitor tracing.
Record Nr. UNINA-9910767583803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology - CRYPTO 2001 [[electronic resource] ] : 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings / / edited by Joe Kilian
Advances in Cryptology - CRYPTO 2001 [[electronic resource] ] : 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings / / edited by Joe Kilian
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Descrizione fisica 1 online resource (XII, 604 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Coding theory
Information theory
Data encryption (Computer science)
Computers
Algorithms
Computer science—Mathematics
Operating systems (Computers)
Coding and Information Theory
Cryptology
Theory of Computation
Algorithm Analysis and Problem Complexity
Mathematics of Computing
Operating Systems
ISBN 3-540-44647-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foundations -- On the (Im)possibility of Obfuscating Programs -- Universally Composable Commitments -- Traitor Tracing -- Revocation and Tracing Schemes for Stateless Receivers -- Self Protecting Pirates and Black-Box Traitor Tracing -- Multi-party Computation -- Minimal Complete Primitives for Secure Multi-party Computation -- Robustness for Free in Unconditional Multi-party Computation -- Secure Distributed Linear Algebra in a Constant Number of Rounds -- Two-Party Computation -- Two-Party Generation of DSA Signatures -- Oblivious Transfer in the Bounded Storage Model -- Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation -- Elliptic Curves -- Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms -- On the Unpredictability of Bits of the Elliptic Curve Diffie-Hellman Scheme -- Identity-Based Encryption from the Weil Pairing -- OAEP -- A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 -- OAEP Reconsidered -- RSA-OAEP Is Secure under the RSA Assumption -- Simplified OAEP for the RSA and Rabin Functions -- Encryption and Authentication -- Online Ciphers and the Hash-CBC Construction -- The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) -- Signature Schemes -- Forward-Secure Signatures with Optimal Signing and Verifying -- Improved Online/Offline Signature Schemes -- Protocols -- An Efficient Scheme for Proving a Shuffle -- An Identity Escrow Scheme with Appointed Verifiers -- Session-Key Generation Using Human Passwords Only -- Cryptanalysis -- Cryptanalysis of RSA Signatures with Fixed-Pattern Padding -- Correlation Analysis of the Shrinking Generator -- Applications of Groups and Codes -- Nonlinear Vector Resilient Functions -- New Public Key Cryptosystem Using Finite Non Abelian Groups -- Pseudorandomness from Braid Groups -- Broadcast and Secret Sharing -- On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase -- Secure and Efficient Asynchronous Broadcast Protocols -- Soundness and Zero-Knowledge -- Soundness in the Public-Key Model -- Robust Non-interactive Zero Knowledge.
Record Nr. UNINA-9910143628203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology - CRYPTO 2001 [[electronic resource] ] : 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings / / edited by Joe Kilian
Advances in Cryptology - CRYPTO 2001 [[electronic resource] ] : 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings / / edited by Joe Kilian
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Descrizione fisica 1 online resource (XII, 604 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Coding theory
Information theory
Data encryption (Computer science)
Computers
Algorithms
Computer science—Mathematics
Operating systems (Computers)
Coding and Information Theory
Cryptology
Theory of Computation
Algorithm Analysis and Problem Complexity
Mathematics of Computing
Operating Systems
ISBN 3-540-44647-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foundations -- On the (Im)possibility of Obfuscating Programs -- Universally Composable Commitments -- Traitor Tracing -- Revocation and Tracing Schemes for Stateless Receivers -- Self Protecting Pirates and Black-Box Traitor Tracing -- Multi-party Computation -- Minimal Complete Primitives for Secure Multi-party Computation -- Robustness for Free in Unconditional Multi-party Computation -- Secure Distributed Linear Algebra in a Constant Number of Rounds -- Two-Party Computation -- Two-Party Generation of DSA Signatures -- Oblivious Transfer in the Bounded Storage Model -- Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation -- Elliptic Curves -- Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms -- On the Unpredictability of Bits of the Elliptic Curve Diffie-Hellman Scheme -- Identity-Based Encryption from the Weil Pairing -- OAEP -- A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 -- OAEP Reconsidered -- RSA-OAEP Is Secure under the RSA Assumption -- Simplified OAEP for the RSA and Rabin Functions -- Encryption and Authentication -- Online Ciphers and the Hash-CBC Construction -- The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) -- Signature Schemes -- Forward-Secure Signatures with Optimal Signing and Verifying -- Improved Online/Offline Signature Schemes -- Protocols -- An Efficient Scheme for Proving a Shuffle -- An Identity Escrow Scheme with Appointed Verifiers -- Session-Key Generation Using Human Passwords Only -- Cryptanalysis -- Cryptanalysis of RSA Signatures with Fixed-Pattern Padding -- Correlation Analysis of the Shrinking Generator -- Applications of Groups and Codes -- Nonlinear Vector Resilient Functions -- New Public Key Cryptosystem Using Finite Non Abelian Groups -- Pseudorandomness from Braid Groups -- Broadcast and Secret Sharing -- On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase -- Secure and Efficient Asynchronous Broadcast Protocols -- Soundness and Zero-Knowledge -- Soundness in the Public-Key Model -- Robust Non-interactive Zero Knowledge.
Record Nr. UNISA-996465793803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology -- ASIACRYPT 2014 [[electronic resource] ] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I / / edited by Palash Sarkar, Tetsu Iwata
Advances in Cryptology -- ASIACRYPT 2014 [[electronic resource] ] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I / / edited by Palash Sarkar, Tetsu Iwata
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XX, 574 p. 74 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
Management information systems
Computer science
Computers
Computer science—Mathematics
Cryptology
Systems and Data Security
Coding and Information Theory
Management of Computing and Information Systems
Theory of Computation
Mathematics of Computing
ISBN 3-662-45611-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side channel analysis -- Hyperelliptic curve cryptography -- Factoring and discrete log -- Cryptanalysis -- Signatures -- Zero knowledge -- Encryption schemes -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation.
Record Nr. UNINA-9910482998003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology -- ASIACRYPT 2014 [[electronic resource] ] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II / / edited by Palash Sarkar, Tetsu Iwata
Advances in Cryptology -- ASIACRYPT 2014 [[electronic resource] ] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II / / edited by Palash Sarkar, Tetsu Iwata
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XXII, 528 p. 76 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
Management information systems
Computer science
Computers
Computer science—Mathematics
Cryptology
Systems and Data Security
Coding and Information Theory
Management of Computing and Information Systems
Theory of Computation
Mathematics of Computing
ISBN 3-662-45608-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side channel analysis -- Hyperelliptic curve cryptography -- Factoring and discrete log -- Cryptanalysis -- Signatures -- Zero knowledge -- Encryption schemes -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation.
Record Nr. UNINA-9910484064703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui