Autonomic and Trusted Computing [[electronic resource] ] : 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings / / edited by Juan González Nieto, Guojun Wang, Wolfgang Reif, Jadwiga Indulska |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XII, 269 p.) |
Disciplina | 005.8 |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer security
Software engineering Computer communication systems Data encryption (Computer science) Application software Management information systems Computer science Systems and Data Security Software Engineering Computer Communication Networks Cryptology Information Systems Applications (incl. Internet) Management of Computing and Information Systems |
ISBN | 3-642-02704-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Speech -- Design for Trust in Ambient and Ubiquitous Computing -- Organic and Autonomic Computing -- Towards an Organic Network Control System -- A Universal Self-Organization Mechanism for Role-Based Organic Computing Systems -- Towards Self-organization in Automotive Embedded Systems -- Analyzing the Behavior of an Artificial Hormone System for Task Allocation -- A Software Test Cases Automated Generation Algorithm Based on Immune Principles -- Management without (Detailed) Models -- Formal Development of Self-organising Systems -- Using Reinforcement Learning for Multi-policy Optimization in Decentralized Autonomic Systems – An Experimental Evaluation -- Trusted Computing -- SAConf: Semantic Attestation of Software Configurations -- ALOPA: Authorization Logic for Property Attestation in Trusted Platforms -- Wireless Sensor Networks -- Employed BPN to Multi-sensors Data Fusion for Environment Monitoring Services -- Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks -- Trust -- A Methodology towards Usable Trust Management -- Formalizing Trust Based on Usage Behaviours for Mobile Applications -- Toward Trustworthy Semantic Web Service Discovery and Selection -- Fuzzy Regression Based Trust Prediction in Service-Oriented Applications -- Theories of Trust for Communication Protocols -- Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. |
Record Nr. | UNISA-996465836903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security and Privacy [[electronic resource] ] : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings / / edited by Colin Boyd, Juan González Nieto |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XI, 470 p.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Computer security Data encryption (Computer science) Management information systems Computer science Coding theory Information theory Algorithms Computer Communication Networks Systems and Data Security Cryptology Management of Computing and Information Systems Coding and Information Theory Algorithm Analysis and Problem Complexity |
ISBN | 3-642-02620-6 |
Classificazione |
DAT 050f
DAT 460f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Lecture -- Is the Information Security King Naked? -- Network Security -- Measurement Study on Malicious Web Servers in the .nz Domain -- A Combinatorial Approach for an Anonymity Metric -- On Improving the Accuracy and Performance of Content-Based File Type Identification -- Symmetric Key Encryption -- Attacking 9 and 10 Rounds of AES-256 -- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure -- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT -- Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher -- Testing Stream Ciphers by Finding the Longest Substring of a Given Density -- New Correlations of RC4 PRGA Using Nonzero-Bit Differences -- Hash Functions -- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders -- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security -- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 -- Inside the Hypercube -- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others -- On the Weak Ideal Compression Functions -- Invited Lecture -- Hardening the Network from the Friend Within -- Public Key Cryptography -- Reducing the Complexity in the Distributed Computation of Private RSA Keys -- Efficiency Bounds for Adversary Constructions in Black-Box Reductions -- Building Key-Private Public-Key Encryption Schemes -- Multi-recipient Public-Key Encryption from Simulators in Security Proofs -- Fair Threshold Decryption with Semi-Trusted Third Parties -- Conditional Proxy Broadcast Re-Encryption -- Security on Hybrid Encryption with the Tag-KEM/DEM Framework -- Protocols -- A Highly Scalable RFID Authentication Protocol -- Strengthening the Security of Distributed Oblivious Transfer -- Towards Denial-of-Service-Resilient Key Agreement Protocols -- A Commitment-Consistent Proof of a Shuffle -- Implementation -- Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography -- Random Order m-ary Exponentiation -- Jacobi Quartic Curves Revisited. |
Record Nr. | UNISA-996465408203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|