Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings |
Autore | Krimmer Robert |
Pubbl/distr/stampa | Cham, : Springer Nature, 2022 |
Descrizione fisica | 1 online resource (197 pages) |
Altri autori (Persone) |
VolkamerMelanie
Duenas-CidDavid RønnePeter GermannMicha |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Coding theory & cryptology
Information retrieval Artificial intelligence Network security Computer security Network hardware |
Soggetto non controllato |
artificial intelligence
communication communication systems computer crime computer hardware computer networks computer science computer security computer systems computer vision cryptography data security engineering fuzzy sets internet network protocols network security privacy signal processing telecommunication systems |
ISBN | 3-031-15911-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910590067403321 |
Krimmer Robert
![]() |
||
Cham, : Springer Nature, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The golden ticket [[electronic resource] ] : P, NP, and the search for the impossible / / Lance Fortnow |
Autore | Fortnow Lance <1963-> |
Edizione | [Course Book] |
Pubbl/distr/stampa | Princeton, : Princeton University Press, 2013 |
Descrizione fisica | 1 online resource (189 p.) |
Disciplina | 511.3/52 |
Soggetto topico |
NP-complete problems
Computer algorithms |
Soggetto non controllato |
Facebook
Frenemy Hamiltonian paths Internet Ketan Mulmuley Leonid Levin Martin Hellman NP problem NP problems NP-complete problems NP-complete P versus NP problem P versus NP Richard Feynman Steve Cook Urbana algorithm Whitfield Diffie academic work algebraic geometry algorithm algorithms approximation big data computational problems computer science computers computing cryptography cryptosystem database decryption digital computers efficient algorithms efficient computation encryption factoring fast computers graph isomorphism heuristics linear programming mathematics max-cut network security networking new technologies parallel computation perebor prime numbers problems programming public-key cryptography quantum computers quantum computing quantum cryptography quantum mechanics quantum physical systems research community secret messages social networking data solution teleportation |
ISBN |
1-4008-4661-7
1-299-15656-8 |
Classificazione | COM051300MAT015000MAT017000MAT034000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Front matter -- Contents -- Preface -- Chapter 1 The Golden Ticket -- Chapter 2 The Beautiful World -- Chapter 3 P and NP -- Chapter 4 The Hardest Problems in NP -- Chapter 5 The Prehistory of P versus NP -- Chapter 6 Dealing with Hardness -- Chapter 7 Proving P ≠ NP -- Chapter 8 Secrets -- Chapter 9 Quantum -- Chapter 10 The Future -- Acknowledgments -- Chapter Notes and Sources -- Index |
Record Nr. | UNINA-9910779319903321 |
Fortnow Lance <1963->
![]() |
||
Princeton, : Princeton University Press, 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The golden ticket : P, NP, and the search for the impossible / / Lance Fortnow |
Autore | Fortnow Lance <1963-> |
Edizione | [Course Book] |
Pubbl/distr/stampa | Princeton, : Princeton University Press, 2013 |
Descrizione fisica | 1 online resource (189 p.) |
Disciplina | 511.3/52 |
Soggetto topico |
NP-complete problems
Computer algorithms |
Soggetto non controllato |
Facebook
Frenemy Hamiltonian paths Internet Ketan Mulmuley Leonid Levin Martin Hellman NP problem NP problems NP-complete problems NP-complete P versus NP problem P versus NP Richard Feynman Steve Cook Urbana algorithm Whitfield Diffie academic work algebraic geometry algorithm algorithms approximation big data computational problems computer science computers computing cryptography cryptosystem database decryption digital computers efficient algorithms efficient computation encryption factoring fast computers graph isomorphism heuristics linear programming mathematics max-cut network security networking new technologies parallel computation perebor prime numbers problems programming public-key cryptography quantum computers quantum computing quantum cryptography quantum mechanics quantum physical systems research community secret messages social networking data solution teleportation |
ISBN |
1-4008-4661-7
1-299-15656-8 |
Classificazione | COM051300MAT015000MAT017000MAT034000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Front matter -- Contents -- Preface -- Chapter 1 The Golden Ticket -- Chapter 2 The Beautiful World -- Chapter 3 P and NP -- Chapter 4 The Hardest Problems in NP -- Chapter 5 The Prehistory of P versus NP -- Chapter 6 Dealing with Hardness -- Chapter 7 Proving P ≠ NP -- Chapter 8 Secrets -- Chapter 9 Quantum -- Chapter 10 The Future -- Acknowledgments -- Chapter Notes and Sources -- Index |
Record Nr. | UNINA-9910818849503321 |
Fortnow Lance <1963->
![]() |
||
Princeton, : Princeton University Press, 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 2019 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory |
Autore | Beyerer Jürgen |
Pubbl/distr/stampa | Karlsruhe, : KIT Scientific Publishing, 2020 |
Descrizione fisica | 1 electronic resource (170 p.) |
Collana | Karlsruher Schriften zur Anthropomatik |
Soggetto topico | Family law: children |
Soggetto non controllato |
usage control
network security metrology machine vision machine learning Usage Control Netzwerksicherheit Messtechnik Machine Vision Maschinelles Lernen |
ISBN | 1000118012 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910586567903321 |
Beyerer Jürgen
![]() |
||
Karlsruhe, : KIT Scientific Publishing, 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.] |
Autore | Gelenbe Erol <1945-> |
Pubbl/distr/stampa | Cham, : Springer Nature, 2022 |
Descrizione fisica | 1 online resource (145 pages) |
Altri autori (Persone) |
JankovicMarija
KehagiasDionysios MartonAnna VilmosAndras |
Collana | Communications in computer and information science |
Soggetto topico |
Computer networks - Security measures
Computer security |
Soggetto non controllato |
architecture types
artificial intelligence communication systems computer crime computer hardware computer networks computer security computer systems cryptography data security Internet of Things (IoT) network protocols network security signal processing software architecture software design software engineering telecommunication networks telecommunication systems |
ISBN | 3-031-09357-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results Application of a Human-Centric Approach in Security by Design for IoT Architecture Development An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction Correlation-based Anomaly Detection for the CAN Bus Botnet Attack Detection with Incremental Online Learning Optimizing Energy Usage for an Electric Drone T-RAID: TEE-based Remote Attestation for IoT Devices Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints Energy, QoS and Security Aware Services at the Edge Mitigating the Massive Access Problem in the IoT |
Record Nr. | UNISA-996478861203316 |
Gelenbe Erol <1945->
![]() |
||
Cham, : Springer Nature, 2022 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.] |
Autore | Gelenbe Erol <1945-> |
Pubbl/distr/stampa | Cham, : Springer Nature, 2022 |
Descrizione fisica | 1 online resource (145 pages) |
Altri autori (Persone) |
JankovicMarija
KehagiasDionysios MartonAnna VilmosAndras |
Collana | Communications in computer and information science |
Soggetto topico |
Computer networks - Security measures
Computer security |
Soggetto non controllato |
architecture types
artificial intelligence communication systems computer crime computer hardware computer networks computer security computer systems cryptography data security Internet of Things (IoT) network protocols network security signal processing software architecture software design software engineering telecommunication networks telecommunication systems |
ISBN | 3-031-09357-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results Application of a Human-Centric Approach in Security by Design for IoT Architecture Development An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction Correlation-based Anomaly Detection for the CAN Bus Botnet Attack Detection with Incremental Online Learning Optimizing Energy Usage for an Electric Drone T-RAID: TEE-based Remote Attestation for IoT Devices Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints Energy, QoS and Security Aware Services at the Edge Mitigating the Massive Access Problem in the IoT |
Record Nr. | UNINA-9910580293203321 |
Gelenbe Erol <1945->
![]() |
||
Cham, : Springer Nature, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security of Networks and Services in an All-Connected World [[electronic resource] ] : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings / / edited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller |
Autore | Daphne Tuncer |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Springer Nature, 2017 |
Descrizione fisica | 1 online resource (XX, 192 p. 55 illus.) |
Disciplina | 004.6 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Computer security Data structures (Computer science) Computer system failures Computers and civilization Application software Computer Communication Networks Systems and Data Security Data Structures and Information Theory System Performance and Evaluation Computers and Society Information Systems Applications (incl. Internet) |
Soggetto non controllato |
cyber crime
network security data security web anomaly detection wireless cloud computing artificial intelligence internet |
ISBN | 3-319-60774-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains. |
Record Nr. | UNINA-9910231238203321 |
Daphne Tuncer
![]() |
||
Springer Nature, 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security of Networks and Services in an All-Connected World [[electronic resource] ] : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings / / edited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller |
Autore | Daphne Tuncer |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Springer Nature, 2017 |
Descrizione fisica | 1 online resource (XX, 192 p. 55 illus.) |
Disciplina | 004.6 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Computer security Data structures (Computer science) Computer system failures Computers and civilization Application software Computer Communication Networks Systems and Data Security Data Structures and Information Theory System Performance and Evaluation Computers and Society Information Systems Applications (incl. Internet) |
Soggetto non controllato |
cyber crime
network security data security web anomaly detection wireless cloud computing artificial intelligence internet |
ISBN | 3-319-60774-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains. |
Record Nr. | UNISA-996466461803316 |
Daphne Tuncer
![]() |
||
Springer Nature, 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|