top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Autonomic and Trusted Computing [[electronic resource] ] : 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings / / edited by Juan González Nieto, Guojun Wang, Wolfgang Reif, Jadwiga Indulska
Autonomic and Trusted Computing [[electronic resource] ] : 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings / / edited by Juan González Nieto, Guojun Wang, Wolfgang Reif, Jadwiga Indulska
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XII, 269 p.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer security
Software engineering
Computer communication systems
Data encryption (Computer science)
Application software
Management information systems
Computer science
Systems and Data Security
Software Engineering
Computer Communication Networks
Cryptology
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
ISBN 3-642-02704-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Design for Trust in Ambient and Ubiquitous Computing -- Organic and Autonomic Computing -- Towards an Organic Network Control System -- A Universal Self-Organization Mechanism for Role-Based Organic Computing Systems -- Towards Self-organization in Automotive Embedded Systems -- Analyzing the Behavior of an Artificial Hormone System for Task Allocation -- A Software Test Cases Automated Generation Algorithm Based on Immune Principles -- Management without (Detailed) Models -- Formal Development of Self-organising Systems -- Using Reinforcement Learning for Multi-policy Optimization in Decentralized Autonomic Systems – An Experimental Evaluation -- Trusted Computing -- SAConf: Semantic Attestation of Software Configurations -- ALOPA: Authorization Logic for Property Attestation in Trusted Platforms -- Wireless Sensor Networks -- Employed BPN to Multi-sensors Data Fusion for Environment Monitoring Services -- Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks -- Trust -- A Methodology towards Usable Trust Management -- Formalizing Trust Based on Usage Behaviours for Mobile Applications -- Toward Trustworthy Semantic Web Service Discovery and Selection -- Fuzzy Regression Based Trust Prediction in Service-Oriented Applications -- Theories of Trust for Communication Protocols -- Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications.
Record Nr. UNISA-996465836903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings / / edited by Colin Boyd, Juan González Nieto
Information Security and Privacy [[electronic resource] ] : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings / / edited by Colin Boyd, Juan González Nieto
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XI, 470 p.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Computer security
Data encryption (Computer science)
Management information systems
Computer science
Coding theory
Information theory
Algorithms
Computer Communication Networks
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Coding and Information Theory
Algorithm Analysis and Problem Complexity
ISBN 3-642-02620-6
Classificazione DAT 050f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lecture -- Is the Information Security King Naked? -- Network Security -- Measurement Study on Malicious Web Servers in the .nz Domain -- A Combinatorial Approach for an Anonymity Metric -- On Improving the Accuracy and Performance of Content-Based File Type Identification -- Symmetric Key Encryption -- Attacking 9 and 10 Rounds of AES-256 -- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure -- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT -- Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher -- Testing Stream Ciphers by Finding the Longest Substring of a Given Density -- New Correlations of RC4 PRGA Using Nonzero-Bit Differences -- Hash Functions -- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders -- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security -- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 -- Inside the Hypercube -- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others -- On the Weak Ideal Compression Functions -- Invited Lecture -- Hardening the Network from the Friend Within -- Public Key Cryptography -- Reducing the Complexity in the Distributed Computation of Private RSA Keys -- Efficiency Bounds for Adversary Constructions in Black-Box Reductions -- Building Key-Private Public-Key Encryption Schemes -- Multi-recipient Public-Key Encryption from Simulators in Security Proofs -- Fair Threshold Decryption with Semi-Trusted Third Parties -- Conditional Proxy Broadcast Re-Encryption -- Security on Hybrid Encryption with the Tag-KEM/DEM Framework -- Protocols -- A Highly Scalable RFID Authentication Protocol -- Strengthening the Security of Distributed Oblivious Transfer -- Towards Denial-of-Service-Resilient Key Agreement Protocols -- A Commitment-Consistent Proof of a Shuffle -- Implementation -- Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography -- Random Order m-ary Exponentiation -- Jacobi Quartic Curves Revisited.
Record Nr. UNISA-996465408203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui