top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security - ESORICS 2014 [[electronic resource] ] : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II / / edited by Miroslaw Kutylowski, Jaideep Vaidya
Computer Security - ESORICS 2014 [[electronic resource] ] : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II / / edited by Miroslaw Kutylowski, Jaideep Vaidya
Pubbl/distr/stampa Cham, : Springer, 2014
Descrizione fisica xvi, 516p ; : ill
Disciplina 005.8
Altri autori (Persone) KutylowskiMiroslaw
VaidyaJaideep
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
ISBN 3-319-11212-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996202529203316
Cham, : Springer, 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2014 [[electronic resource] ] : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I / / edited by Miroslaw Kutylowski, Jaideep Vaidya
Computer Security - ESORICS 2014 [[electronic resource] ] : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I / / edited by Miroslaw Kutylowski, Jaideep Vaidya
Pubbl/distr/stampa Cham, : Springer, 2014
Descrizione fisica xvi, 545p. ; : ill
Disciplina 005.8
Altri autori (Persone) KutylowskiMiroslaw
VaidyaJaideep
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
ISBN 3-319-11203-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996202529303316
Cham, : Springer, 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I / / edited by Miroslaw Kutylowski, Jaideep Vaidya
Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I / / edited by Miroslaw Kutylowski, Jaideep Vaidya
Pubbl/distr/stampa Cham, : Springer, 2014
Descrizione fisica xvi, 545p. ; : ill
Disciplina 005.8
Altri autori (Persone) KutylowskiMiroslaw
VaidyaJaideep
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
ISBN 3-319-11203-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484845303321
Cham, : Springer, 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II / / edited by Miroslaw Kutylowski, Jaideep Vaidya
Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II / / edited by Miroslaw Kutylowski, Jaideep Vaidya
Pubbl/distr/stampa Cham, : Springer, 2014
Descrizione fisica xvi, 516p ; : ill
Disciplina 005.8
Altri autori (Persone) KutylowskiMiroslaw
VaidyaJaideep
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
ISBN 3-319-11212-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484085003321
Cham, : Springer, 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fundamentals of Computation Theory [[electronic resource] ] : 17th International Symposium, FCT 2009, Wroclaw, Poland, September 2-4, 2009, Proceedings / / edited by Miroslaw Kutylowski, Maciej Gebala, Witold Charatonik
Fundamentals of Computation Theory [[electronic resource] ] : 17th International Symposium, FCT 2009, Wroclaw, Poland, September 2-4, 2009, Proceedings / / edited by Miroslaw Kutylowski, Maciej Gebala, Witold Charatonik
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 357 p.)
Disciplina 004n/a
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer programming
Compilers (Computer programs)
Computer science
Algorithms
Machine theory
Programming Techniques
Compilers and Interpreters
Theory of Computation
Formal Languages and Automata Theory
ISBN 3-642-03409-8
Classificazione DAT 542f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lectures -- How to Guard the Guards Themselves -- Alternating Weighted Automata -- Contributions -- Maintaining Arrays of Contiguous Objects -- The k-Anonymity Problem Is Hard -- Independence Results for n-Ary Recursion Theorems -- Depletable Channels: Dynamics and Behaviour -- Noise-Resilient Group Testing: Limitations and Constructions -- Martingales on Trees and the Empire Chromatic Number of Random Trees -- Competitive Group Testing and Learning Hidden Vertex Covers with Minimum Adaptivity -- Combinatorial Queries and Updates on Partial Words -- The Longest Haplotype Reconstruction Problem Revisited -- Earliest Query Answering for Deterministic Nested Word Automata -- Multiway In-Place Merging -- On Convex Greedy Embedding Conjecture for 3-Connected Planar Graphs -- On Random Betweenness Constraints -- Directed Graphs of Entanglement Two -- Parametrized Regular Infinite Games and Higher-Order Pushdown Strategies -- Computing Role Assignments of Chordal Graphs -- Three-Valued Abstractions of Markov Chains: Completeness for a Sizeable Fragment of PCTL -- Closure Operators for Order Structures -- Correcting Sorted Sequences in a Single Hop Radio Network -- A Local Distributed Algorithm to Approximate MST in Unit Disc Graphs -- Small-Space Analogues of Valiant’s Classes -- Small Weakly Universal Turing Machines -- Open Maps Bisimulations for Higher Dimensional Automata Models -- Decision Version of the Road Coloring Problem Is NP-Complete -- NP-Completeness of st-Orientations for Plane Graphs -- Equivalence of Deterministic Nested Word to Word Transducers -- Reachability in K 3,3-Free Graphs and K 5-Free Graphs Is in Unambiguous Log-Space -- Energy Complexity and Depth of Threshold Circuits -- 1-Local 17/12-Competitive Algorithm for Multicoloring Hexagonal Graphs.
Record Nr. UNISA-996465633903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Fundamentals of Computation Theory [[electronic resource] ] : 17th International Symposium, FCT 2009, Wroclaw, Poland, September 2-4, 2009, Proceedings / / edited by Miroslaw Kutylowski, Maciej Gebala, Witold Charatonik
Fundamentals of Computation Theory [[electronic resource] ] : 17th International Symposium, FCT 2009, Wroclaw, Poland, September 2-4, 2009, Proceedings / / edited by Miroslaw Kutylowski, Maciej Gebala, Witold Charatonik
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 357 p.)
Disciplina 004n/a
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer programming
Compilers (Computer programs)
Computer science
Algorithms
Machine theory
Programming Techniques
Compilers and Interpreters
Theory of Computation
Formal Languages and Automata Theory
ISBN 3-642-03409-8
Classificazione DAT 542f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lectures -- How to Guard the Guards Themselves -- Alternating Weighted Automata -- Contributions -- Maintaining Arrays of Contiguous Objects -- The k-Anonymity Problem Is Hard -- Independence Results for n-Ary Recursion Theorems -- Depletable Channels: Dynamics and Behaviour -- Noise-Resilient Group Testing: Limitations and Constructions -- Martingales on Trees and the Empire Chromatic Number of Random Trees -- Competitive Group Testing and Learning Hidden Vertex Covers with Minimum Adaptivity -- Combinatorial Queries and Updates on Partial Words -- The Longest Haplotype Reconstruction Problem Revisited -- Earliest Query Answering for Deterministic Nested Word Automata -- Multiway In-Place Merging -- On Convex Greedy Embedding Conjecture for 3-Connected Planar Graphs -- On Random Betweenness Constraints -- Directed Graphs of Entanglement Two -- Parametrized Regular Infinite Games and Higher-Order Pushdown Strategies -- Computing Role Assignments of Chordal Graphs -- Three-Valued Abstractions of Markov Chains: Completeness for a Sizeable Fragment of PCTL -- Closure Operators for Order Structures -- Correcting Sorted Sequences in a Single Hop Radio Network -- A Local Distributed Algorithm to Approximate MST in Unit Disc Graphs -- Small-Space Analogues of Valiant’s Classes -- Small Weakly Universal Turing Machines -- Open Maps Bisimulations for Higher Dimensional Automata Models -- Decision Version of the Road Coloring Problem Is NP-Complete -- NP-Completeness of st-Orientations for Plane Graphs -- Equivalence of Deterministic Nested Word to Word Transducers -- Reachability in K 3,3-Free Graphs and K 5-Free Graphs Is in Unambiguous Log-Space -- Energy Complexity and Depth of Threshold Circuits -- 1-Local 17/12-Competitive Algorithm for Multicoloring Hexagonal Graphs.
Record Nr. UNINA-9910483734003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Cryptology [[electronic resource] ] : 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers / / edited by Miroslaw Kutylowski, Moti Yung
Information Security and Cryptology [[electronic resource] ] : 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers / / edited by Miroslaw Kutylowski, Moti Yung
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 393 p. 61 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Coding theory
Information theory
Data and Information Security
Cryptology
Coding and Information Theory
ISBN 3-642-38519-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466290003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Cryptology : 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers / / edited by Miroslaw Kutylowski, Moti Yung
Information Security and Cryptology : 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers / / edited by Miroslaw Kutylowski, Moti Yung
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 393 p. 61 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Coding theory
Information theory
Data and Information Security
Cryptology
Coding and Information Theory
ISBN 3-642-38519-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484002503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Towards Trustworthy Elections [[electronic resource] ] : New Directions in Electronic Voting / / edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida
Towards Trustworthy Elections [[electronic resource] ] : New Directions in Electronic Voting / / edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (VIII, 403 p. 60 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Algorithms
Computers and civilization
Application software
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Information Systems Applications (incl. Internet)
ISBN 1-280-38645-2
9786613564375
3-642-12980-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Witness-Voting System -- Coercion-Resistant Electronic Elections -- Receipt-Free K-out-of-L Voting Based on ElGamal Encryption -- A Secure Architecture for Voting Electronically (SAVE) -- A Modular Voting Architecture (“Frog Voting”) -- Unconditionally Secure Electronic Voting -- Electronic Elections: A Balancing Act -- An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization -- The Vector-Ballot Approach for Online Voting Procedures -- On Optical Mark-Sense Scanning -- On Some Incompatible Properties of Voting Schemes -- A Threat Analysis of Prêt à Voter -- Anonymity in Voting Revisited -- Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting -- An Introduction to PunchScan -- Component Based Electronic Voting Systems -- A Verifiable Voting Protocol Based on Farnel -- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster -- Improving Remote Voting Security with CodeVoting -- A Practical and Secure Coercion-Resistant Scheme for Internet Voting -- Scratch, Click & Vote: E2E Voting over the Internet -- Securing Optical-Scan Voting -- Attacking Paper-Based E2E Voting Systems -- Aperio: High Integrity Elections for Developing Countries.
Record Nr. UNISA-996465947703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Towards Trustworthy Elections : New Directions in Electronic Voting / / edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida
Towards Trustworthy Elections : New Directions in Electronic Voting / / edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (VIII, 403 p. 60 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Algorithms
Computers and civilization
Application software
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Information Systems Applications (incl. Internet)
ISBN 1-280-38645-2
9786613564375
3-642-12980-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Witness-Voting System -- Coercion-Resistant Electronic Elections -- Receipt-Free K-out-of-L Voting Based on ElGamal Encryption -- A Secure Architecture for Voting Electronically (SAVE) -- A Modular Voting Architecture (“Frog Voting”) -- Unconditionally Secure Electronic Voting -- Electronic Elections: A Balancing Act -- An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization -- The Vector-Ballot Approach for Online Voting Procedures -- On Optical Mark-Sense Scanning -- On Some Incompatible Properties of Voting Schemes -- A Threat Analysis of Prêt à Voter -- Anonymity in Voting Revisited -- Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting -- An Introduction to PunchScan -- Component Based Electronic Voting Systems -- A Verifiable Voting Protocol Based on Farnel -- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster -- Improving Remote Voting Security with CodeVoting -- A Practical and Secure Coercion-Resistant Scheme for Internet Voting -- Scratch, Click & Vote: E2E Voting over the Internet -- Securing Optical-Scan Voting -- Attacking Paper-Based E2E Voting Systems -- Aperio: High Integrity Elections for Developing Countries.
Record Nr. UNINA-9910484852003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui