top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Autore Krimmer Robert
Pubbl/distr/stampa Cham, : Springer Nature, 2022
Descrizione fisica 1 online resource (197 pages)
Altri autori (Persone) VolkamerMelanie
Duenas-CidDavid
RønnePeter
GermannMicha
Collana Lecture Notes in Computer Science
Soggetto topico Coding theory & cryptology
Information retrieval
Artificial intelligence
Network security
Computer security
Network hardware
Soggetto non controllato artificial intelligence
communication
communication systems
computer crime
computer hardware
computer networks
computer science
computer security
computer systems
computer vision
cryptography
data security
engineering
fuzzy sets
internet
network protocols
network security
privacy
signal processing
telecommunication systems
ISBN 3-031-15911-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910590067403321
Krimmer Robert  
Cham, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The golden ticket [[electronic resource] ] : P, NP, and the search for the impossible / / Lance Fortnow
The golden ticket [[electronic resource] ] : P, NP, and the search for the impossible / / Lance Fortnow
Autore Fortnow Lance <1963->
Edizione [Course Book]
Pubbl/distr/stampa Princeton, : Princeton University Press, 2013
Descrizione fisica 1 online resource (189 p.)
Disciplina 511.3/52
Soggetto topico NP-complete problems
Computer algorithms
Soggetto non controllato Facebook
Frenemy
Hamiltonian paths
Internet
Ketan Mulmuley
Leonid Levin
Martin Hellman
NP problem
NP problems
NP-complete problems
NP-complete
P versus NP problem
P versus NP
Richard Feynman
Steve Cook
Twitter
Urbana algorithm
Whitfield Diffie
academic work
algebraic geometry
algorithm
algorithms
approximation
big data
computational problems
computer science
computers
computing
cryptography
cryptosystem
database
decryption
digital computers
efficient algorithms
efficient computation
encryption
factoring
fast computers
graph isomorphism
heuristics
linear programming
mathematics
max-cut
network security
networking
new technologies
parallel computation
perebor
prime numbers
problems
programming
public-key cryptography
quantum computers
quantum computing
quantum cryptography
quantum mechanics
quantum physical systems
research community
secret messages
social networking data
solution
teleportation
ISBN 1-4008-4661-7
1-299-15656-8
Classificazione COM051300MAT015000MAT017000MAT034000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front matter -- Contents -- Preface -- Chapter 1 The Golden Ticket -- Chapter 2 The Beautiful World -- Chapter 3 P and NP -- Chapter 4 The Hardest Problems in NP -- Chapter 5 The Prehistory of P versus NP -- Chapter 6 Dealing with Hardness -- Chapter 7 Proving P ≠ NP -- Chapter 8 Secrets -- Chapter 9 Quantum -- Chapter 10 The Future -- Acknowledgments -- Chapter Notes and Sources -- Index
Record Nr. UNINA-9910779319903321
Fortnow Lance <1963->  
Princeton, : Princeton University Press, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The golden ticket : P, NP, and the search for the impossible / / Lance Fortnow
The golden ticket : P, NP, and the search for the impossible / / Lance Fortnow
Autore Fortnow Lance <1963->
Edizione [Course Book]
Pubbl/distr/stampa Princeton, : Princeton University Press, 2013
Descrizione fisica 1 online resource (189 p.)
Disciplina 511.3/52
Soggetto topico NP-complete problems
Computer algorithms
Soggetto non controllato Facebook
Frenemy
Hamiltonian paths
Internet
Ketan Mulmuley
Leonid Levin
Martin Hellman
NP problem
NP problems
NP-complete problems
NP-complete
P versus NP problem
P versus NP
Richard Feynman
Steve Cook
Twitter
Urbana algorithm
Whitfield Diffie
academic work
algebraic geometry
algorithm
algorithms
approximation
big data
computational problems
computer science
computers
computing
cryptography
cryptosystem
database
decryption
digital computers
efficient algorithms
efficient computation
encryption
factoring
fast computers
graph isomorphism
heuristics
linear programming
mathematics
max-cut
network security
networking
new technologies
parallel computation
perebor
prime numbers
problems
programming
public-key cryptography
quantum computers
quantum computing
quantum cryptography
quantum mechanics
quantum physical systems
research community
secret messages
social networking data
solution
teleportation
ISBN 1-4008-4661-7
1-299-15656-8
Classificazione COM051300MAT015000MAT017000MAT034000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front matter -- Contents -- Preface -- Chapter 1 The Golden Ticket -- Chapter 2 The Beautiful World -- Chapter 3 P and NP -- Chapter 4 The Hardest Problems in NP -- Chapter 5 The Prehistory of P versus NP -- Chapter 6 Dealing with Hardness -- Chapter 7 Proving P ≠ NP -- Chapter 8 Secrets -- Chapter 9 Quantum -- Chapter 10 The Future -- Acknowledgments -- Chapter Notes and Sources -- Index
Record Nr. UNINA-9910818849503321
Fortnow Lance <1963->  
Princeton, : Princeton University Press, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2019 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory
Proceedings of the 2019 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory
Autore Beyerer Jürgen
Pubbl/distr/stampa Karlsruhe, : KIT Scientific Publishing, 2020
Descrizione fisica 1 electronic resource (170 p.)
Collana Karlsruher Schriften zur Anthropomatik
Soggetto topico Family law: children
Soggetto non controllato usage control
network security
metrology
machine vision
machine learning
Usage Control
Netzwerksicherheit
Messtechnik
Machine Vision
Maschinelles Lernen
ISBN 1000118012
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910586567903321
Beyerer Jürgen  
Karlsruhe, : KIT Scientific Publishing, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.]
Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.]
Autore Gelenbe Erol <1945->
Pubbl/distr/stampa Cham, : Springer Nature, 2022
Descrizione fisica 1 online resource (145 pages)
Altri autori (Persone) JankovicMarija
KehagiasDionysios
MartonAnna
VilmosAndras
Collana Communications in computer and information science
Soggetto topico Computer networks - Security measures
Computer security
Soggetto non controllato architecture types
artificial intelligence
communication systems
computer crime
computer hardware
computer networks
computer security
computer systems
cryptography
data security
Internet of Things (IoT)
network protocols
network security
signal processing
software architecture
software design
software engineering
telecommunication networks
telecommunication systems
ISBN 3-031-09357-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results Application of a Human-Centric Approach in Security by Design for IoT Architecture Development An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction Correlation-based Anomaly Detection for the CAN Bus Botnet Attack Detection with Incremental Online Learning Optimizing Energy Usage for an Electric Drone T-RAID: TEE-based Remote Attestation for IoT Devices Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints Energy, QoS and Security Aware Services at the Edge Mitigating the Massive Access Problem in the IoT
Record Nr. UNISA-996478861203316
Gelenbe Erol <1945->  
Cham, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.]
Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.]
Autore Gelenbe Erol <1945->
Pubbl/distr/stampa Cham, : Springer Nature, 2022
Descrizione fisica 1 online resource (145 pages)
Altri autori (Persone) JankovicMarija
KehagiasDionysios
MartonAnna
VilmosAndras
Collana Communications in computer and information science
Soggetto topico Computer networks - Security measures
Computer security
Soggetto non controllato architecture types
artificial intelligence
communication systems
computer crime
computer hardware
computer networks
computer security
computer systems
cryptography
data security
Internet of Things (IoT)
network protocols
network security
signal processing
software architecture
software design
software engineering
telecommunication networks
telecommunication systems
ISBN 3-031-09357-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results Application of a Human-Centric Approach in Security by Design for IoT Architecture Development An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction Correlation-based Anomaly Detection for the CAN Bus Botnet Attack Detection with Incremental Online Learning Optimizing Energy Usage for an Electric Drone T-RAID: TEE-based Remote Attestation for IoT Devices Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints Energy, QoS and Security Aware Services at the Edge Mitigating the Massive Access Problem in the IoT
Record Nr. UNINA-9910580293203321
Gelenbe Erol <1945->  
Cham, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security of Networks and Services in an All-Connected World [[electronic resource] ] : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings / / edited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller
Security of Networks and Services in an All-Connected World [[electronic resource] ] : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings / / edited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller
Autore Daphne Tuncer
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Springer Nature, 2017
Descrizione fisica 1 online resource (XX, 192 p. 55 illus.)
Disciplina 004.6
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Computer security
Data structures (Computer science)
Computer system failures
Computers and civilization
Application software
Computer Communication Networks
Systems and Data Security
Data Structures and Information Theory
System Performance and Evaluation
Computers and Society
Information Systems Applications (incl. Internet)
Soggetto non controllato cyber crime
network security
data security
web
anomaly detection
wireless
cloud computing
artificial intelligence
internet
ISBN 3-319-60774-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains.
Record Nr. UNINA-9910231238203321
Daphne Tuncer  
Springer Nature, 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security of Networks and Services in an All-Connected World [[electronic resource] ] : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings / / edited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller
Security of Networks and Services in an All-Connected World [[electronic resource] ] : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings / / edited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller
Autore Daphne Tuncer
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Springer Nature, 2017
Descrizione fisica 1 online resource (XX, 192 p. 55 illus.)
Disciplina 004.6
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Computer security
Data structures (Computer science)
Computer system failures
Computers and civilization
Application software
Computer Communication Networks
Systems and Data Security
Data Structures and Information Theory
System Performance and Evaluation
Computers and Society
Information Systems Applications (incl. Internet)
Soggetto non controllato cyber crime
network security
data security
web
anomaly detection
wireless
cloud computing
artificial intelligence
internet
ISBN 3-319-60774-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains.
Record Nr. UNISA-996466461803316
Daphne Tuncer  
Springer Nature, 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui