top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance [[electronic resource] ] : 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, Neeraj Suri
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance [[electronic resource] ] : 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, Neeraj Suri
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 343 p. 60 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Systems and Data Security
Management of Computing and Information Systems
Cryptology
ISBN 3-319-17016-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data privacy management -- Autonomous and spontaneous security -- Quantitative aspects in security assurance.
Record Nr. UNISA-996200343503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance [[electronic resource] ] : 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, Neeraj Suri
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance [[electronic resource] ] : 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, Neeraj Suri
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 343 p. 60 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Systems and Data Security
Management of Computing and Information Systems
Cryptology
ISBN 3-319-17016-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data privacy management -- Autonomous and spontaneous security -- Quantitative aspects in security assurance.
Record Nr. UNINA-9910483321003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems [[electronic resource] ] : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012, Proceedings / / edited by Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems [[electronic resource] ] : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012, Proceedings / / edited by Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XII, 225 p. 42 illus.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Management information systems
Computer science
Data encryption (Computer science)
Data structures (Computer science)
Computer security
Computers and civilization
Computer Communication Networks
Management of Computing and Information Systems
Cryptology
Data Structures and Information Theory
Systems and Data Security
Computers and Society
ISBN 3-642-30955-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465283103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices [[electronic resource] ] : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings / / edited by Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices [[electronic resource] ] : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings / / edited by Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 386 p. 93 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Management information systems
Computer science
Data encryption (Computer science)
Algorithms
Computer security
Computers and civilization
Computer Communication Networks
Management of Computing and Information Systems
Cryptology
Algorithm Analysis and Problem Complexity
Systems and Data Security
Computers and Society
Soggetto genere / forma Kongress 2010
Kongress.
Passau (2010)
ISBN 1-280-38621-5
9786613564139
3-642-12368-6
Classificazione DAT 179f
DAT 260f
DAT 460f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Embedded Security -- Efficient and Effective Buffer Overflow Protection on ARM Processors -- Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines -- A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones -- A Smart Card Implementation of the McEliece PKC -- Evaluation Metrics of Physical Non-invasive Security -- Protocols -- Trust in Peer-to-Peer Content Distribution Protocols -- Generic Constructions of Biometric Identity Based Encryption Systems -- Design and Analysis of a Generalized Canvas Protocol -- Highly Constrained Embedded Systems -- Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures -- Practical Schemes for Privacy and Security Enhanced RFID -- MoteAODV – An AODV Implementation for TinyOS 2.0 -- Security -- Random Number Generation Based on Fingerprints -- Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML -- Fraud Detection for Voice over IP Services on Next-Generation Networks -- Smart Card Security -- Proxy Smart Card Systems -- Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract? -- Website Credential Storage and Two-Factor Web Authentication with a Java SIM -- Algorithms -- Attribute-Based Encryption with Break-Glass -- On the Security of a Two-Factor Authentication Scheme -- The Design of Secure and Efficient P2PSIP Communication Systems -- Hardware Implementations -- Novel FPGA-Based Signature Matching for Deep Packet Inspection -- Towards Electrical, Integrated Implementations of SIMPL Systems -- A Very Compact Hardware Implementation of the KASUMI Block Cipher -- Embedded Systems -- Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions -- Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions -- Security Analysis of Mobile Phones Used as OTP Generators -- An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks -- Anonymity/Database Security -- The Market Failure of Anonymity Services -- Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios -- Predicting and Preventing Insider Threat in Relational Database Systems.
Record Nr. UNISA-996465606403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices [[electronic resource] ] : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings / / edited by Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices [[electronic resource] ] : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings / / edited by Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 386 p. 93 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Management information systems
Computer science
Data encryption (Computer science)
Algorithms
Computer security
Computers and civilization
Computer Communication Networks
Management of Computing and Information Systems
Cryptology
Algorithm Analysis and Problem Complexity
Systems and Data Security
Computers and Society
Soggetto genere / forma Kongress 2010
Kongress.
Passau (2010)
ISBN 1-280-38621-5
9786613564139
3-642-12368-6
Classificazione DAT 179f
DAT 260f
DAT 460f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Embedded Security -- Efficient and Effective Buffer Overflow Protection on ARM Processors -- Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines -- A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones -- A Smart Card Implementation of the McEliece PKC -- Evaluation Metrics of Physical Non-invasive Security -- Protocols -- Trust in Peer-to-Peer Content Distribution Protocols -- Generic Constructions of Biometric Identity Based Encryption Systems -- Design and Analysis of a Generalized Canvas Protocol -- Highly Constrained Embedded Systems -- Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures -- Practical Schemes for Privacy and Security Enhanced RFID -- MoteAODV – An AODV Implementation for TinyOS 2.0 -- Security -- Random Number Generation Based on Fingerprints -- Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML -- Fraud Detection for Voice over IP Services on Next-Generation Networks -- Smart Card Security -- Proxy Smart Card Systems -- Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract? -- Website Credential Storage and Two-Factor Web Authentication with a Java SIM -- Algorithms -- Attribute-Based Encryption with Break-Glass -- On the Security of a Two-Factor Authentication Scheme -- The Design of Secure and Efficient P2PSIP Communication Systems -- Hardware Implementations -- Novel FPGA-Based Signature Matching for Deep Packet Inspection -- Towards Electrical, Integrated Implementations of SIMPL Systems -- A Very Compact Hardware Implementation of the KASUMI Block Cipher -- Embedded Systems -- Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions -- Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions -- Security Analysis of Mobile Phones Used as OTP Generators -- An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks -- Anonymity/Database Security -- The Market Failure of Anonymity Services -- Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios -- Predicting and Preventing Insider Threat in Relational Database Systems.
Record Nr. UNINA-9910483105903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Trust Management [[electronic resource] ] : 19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings / / edited by Ruben Rios, Joachim Posegga
Security and Trust Management [[electronic resource] ] : 19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings / / edited by Ruben Rios, Joachim Posegga
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (153 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer networks
Software engineering
Application software
Data mining
Security Services
Data and Information Security
Computer Communication Networks
Software Engineering
Computer and Information Systems Applications
Data Mining and Knowledge Discovery
ISBN 3-031-47198-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Impact of Consensus Protocols on the Efficiency of Registration and Authentication process in Self-Sovereign Identity -- Biometric-Based Password Management -- ‘State of the Union’: Evaluating Open Source Zero Trust Components -- Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things -- Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems -- Decentralized Global Trust Registry Platform for trust discovery and verification of e-Health credentials using TRAIN: COVID-19 Certificate use case -- Privacy-Preserving NN for IDS: A Study on the impact of TFHE restrictions -- Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System -- Consent as mechanism to preserve information privacy: Its origin, evolution, and current relevance.
Record Nr. UNINA-9910755083103321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Trust Management [[electronic resource] ] : 19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings / / edited by Ruben Rios, Joachim Posegga
Security and Trust Management [[electronic resource] ] : 19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings / / edited by Ruben Rios, Joachim Posegga
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (153 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer networks
Software engineering
Application software
Data mining
Security Services
Data and Information Security
Computer Communication Networks
Software Engineering
Computer and Information Systems Applications
Data Mining and Knowledge Discovery
ISBN 3-031-47198-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Impact of Consensus Protocols on the Efficiency of Registration and Authentication process in Self-Sovereign Identity -- Biometric-Based Password Management -- ‘State of the Union’: Evaluating Open Source Zero Trust Components -- Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things -- Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems -- Decentralized Global Trust Registry Platform for trust discovery and verification of e-Health credentials using TRAIN: COVID-19 Certificate use case -- Privacy-Preserving NN for IDS: A Study on the impact of TFHE restrictions -- Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System -- Consent as mechanism to preserve information privacy: Its origin, evolution, and current relevance.
Record Nr. UNISA-996558464603316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart Card Research and Advanced Applications [[electronic resource] ] : 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling
Smart Card Research and Advanced Applications [[electronic resource] ] : 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 360 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computers and civilization
Computer communication systems
Operating systems (Computers)
Cryptology
Management of Computing and Information Systems
Computers and Society
Computer Communication Networks
Operating Systems
ISBN 3-540-33312-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Smart Card Applications -- Design, Installation and Execution of a Security Agent for Mobile Stations -- Towards a Secure and Practical Multifunctional Smart Card -- Implementing Cryptography on TFT Technology for Secure Display Applications -- A Smart Card-Based Mental Poker System -- A Smart Card Solution for Access Control and Trust Management for Nomadic Users -- Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards -- Zero Footprint Secure Internet Authentication Using Network Smart Card -- An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items -- Side Channel Attacks -- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations -- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis -- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring -- Smart Card Networking -- Designing Smartcards for Emerging Wireless Networks -- Smartcard Firewalls Revisited -- Multi-stage Packet Filtering in Network Smart Cards -- Cryptographic Protocols -- Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability -- SEA: A Scalable Encryption Algorithm for Small Embedded Applications -- Low-Cost Cryptography for Privacy in RFID Systems -- Optimal Use of Montgomery Multiplication on Smart Cards -- Off-Line Group Signatures with Smart Cards -- RFID Security -- Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags -- Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags -- MARP: Mobile Agent for RFID Privacy Protection -- Formal Methods -- Certifying Native Java Card API by Formal Refinement -- A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods -- Automatic Test Generation on a (U)SIM Smart Card.
Record Nr. UNISA-996466113903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart Card Research and Advanced Applications [[electronic resource] ] : 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling
Smart Card Research and Advanced Applications [[electronic resource] ] : 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 360 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computers and civilization
Computer communication systems
Operating systems (Computers)
Cryptology
Management of Computing and Information Systems
Computers and Society
Computer Communication Networks
Operating Systems
ISBN 3-540-33312-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Smart Card Applications -- Design, Installation and Execution of a Security Agent for Mobile Stations -- Towards a Secure and Practical Multifunctional Smart Card -- Implementing Cryptography on TFT Technology for Secure Display Applications -- A Smart Card-Based Mental Poker System -- A Smart Card Solution for Access Control and Trust Management for Nomadic Users -- Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards -- Zero Footprint Secure Internet Authentication Using Network Smart Card -- An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items -- Side Channel Attacks -- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations -- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis -- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring -- Smart Card Networking -- Designing Smartcards for Emerging Wireless Networks -- Smartcard Firewalls Revisited -- Multi-stage Packet Filtering in Network Smart Cards -- Cryptographic Protocols -- Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability -- SEA: A Scalable Encryption Algorithm for Small Embedded Applications -- Low-Cost Cryptography for Privacy in RFID Systems -- Optimal Use of Montgomery Multiplication on Smart Cards -- Off-Line Group Signatures with Smart Cards -- RFID Security -- Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags -- Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags -- MARP: Mobile Agent for RFID Privacy Protection -- Formal Methods -- Certifying Native Java Card API by Formal Refinement -- A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods -- Automatic Test Generation on a (U)SIM Smart Card.
Record Nr. UNINA-9910483040603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Theorem Proving with Analytic Tableaux and Related Methods [[electronic resource] ] : 4th International Workshop, TABLEAUX-95, Schloß Rheinfels, St. Goar, Germany, May 7 - 10, 1995. Proceedings / / edited by Peter Baumgartner, Reiner Hähnle, Joachim Posegga
Theorem Proving with Analytic Tableaux and Related Methods [[electronic resource] ] : 4th International Workshop, TABLEAUX-95, Schloß Rheinfels, St. Goar, Germany, May 7 - 10, 1995. Proceedings / / edited by Peter Baumgartner, Reiner Hähnle, Joachim Posegga
Edizione [1st ed. 1995.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1995
Descrizione fisica 1 online resource (XI, 361 p.)
Disciplina 005.1/1
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
Mathematical logic
Computers
Artificial Intelligence
Mathematical Logic and Foundations
Theory of Computation
Mathematical Logic and Formal Languages
ISBN 3-540-49235-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Issues in theorem proving based on the connection method -- Rigid E-unification simplified -- Generating finite counter examples with semantic tableaux -- Semantic tableaus for inheritance nets -- Using connection method in modal logics: Some advantages -- Labelled tableaux for multi-modal logics -- Refutation systems for prepositional modal logics -- On transforming intuitionistic matrix proofs into standard-sequent proofs -- A connection based proof method for intuitionistic logic -- Tableau for intuitionistic predicate logic as metatheory -- Model building and interactive theory discovery -- Link deletion in model elimination -- Specifications of inference rules and their automatic translation -- Constraint model elimination and a PTTP-implementation -- Non-elementary speedups between different versions of tableaux -- Syntactic reduction of predicate tableaux to propositional tableaux -- Classical Lambek logic -- Linear logic with isabelle: Pruning the proof search tree -- Linear analytic tableaux -- Higher-order tableaux -- Propositional logics on the computer -- MacKE: Yet another proof assistant & automated pedagogic tool -- Using the theorem prover SETHEO for verifying the development of a communication protocol in FOCUS -A Case Study-.
Record Nr. UNISA-996466129903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1995
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui