top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied Cryptography and Network Security [[electronic resource] ] : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings / / edited by Feng Bao, Pierangela Samarati, Jianying Zhou
Applied Cryptography and Network Security [[electronic resource] ] : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings / / edited by Feng Bao, Pierangela Samarati, Jianying Zhou
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XIV, 580 p. 107 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Coding theory
Information theory
Data structures (Computer science)
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
Coding and Information Theory
Data Structures
ISBN 3-642-31284-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465750103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2004 [[electronic resource] ] : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
Computer Security - ESORICS 2004 [[electronic resource] ] : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (X, 457 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Database management
Computers and civilization
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Database Management
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-30108-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Incorporating Dynamic Constraints in the Flexible Authorization Framework -- Access-Condition-Table-Driven Access Control for XML Databases -- An Algebra for Composing Enterprise Privacy Policies -- Deriving, Attacking and Defending the GDOI Protocol -- Better Privacy for Trusted Computing Platforms -- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol -- A Formalization of Anonymity and Onion Routing -- Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics -- Comparison Between Two Practical Mix Designs -- Signature Bouquets: Immutability for Aggregated/Condensed Signatures -- Towards a Theory of Data Entanglement -- Portable and Flexible Document Access Control Mechanisms -- Possibilistic Information Flow Control in the Presence of Encrypted Communication -- Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage -- Security Property Based Administrative Controls -- A Vector Model of Trust for Developing Trustworthy Systems -- Parameterized Authentication -- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks -- Hindering Eavesdropping via IPv6 Opportunistic Encryption -- On the Role of Key Schedules in Attacks on Iterated Ciphers -- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts -- A Host Intrusion Prevention System for Windows Operating Systems -- Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table -- ARCHERR: Runtime Environment Driven Program Safety -- Sets, Bags, and Rock and Roll -- Redundancy and Diversity in Security -- Discovering Novel Attack Strategies from INFOSEC Alerts.
Record Nr. UNISA-996465392303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2004 : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
Computer Security - ESORICS 2004 : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (X, 457 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Database management
Computers and civilization
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Database Management
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-30108-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Incorporating Dynamic Constraints in the Flexible Authorization Framework -- Access-Condition-Table-Driven Access Control for XML Databases -- An Algebra for Composing Enterprise Privacy Policies -- Deriving, Attacking and Defending the GDOI Protocol -- Better Privacy for Trusted Computing Platforms -- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol -- A Formalization of Anonymity and Onion Routing -- Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics -- Comparison Between Two Practical Mix Designs -- Signature Bouquets: Immutability for Aggregated/Condensed Signatures -- Towards a Theory of Data Entanglement -- Portable and Flexible Document Access Control Mechanisms -- Possibilistic Information Flow Control in the Presence of Encrypted Communication -- Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage -- Security Property Based Administrative Controls -- A Vector Model of Trust for Developing Trustworthy Systems -- Parameterized Authentication -- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks -- Hindering Eavesdropping via IPv6 Opportunistic Encryption -- On the Role of Key Schedules in Attacks on Iterated Ciphers -- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts -- A Host Intrusion Prevention System for Windows Operating Systems -- Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table -- ARCHERR: Runtime Environment Driven Program Safety -- Sets, Bags, and Rock and Roll -- Redundancy and Diversity in Security -- Discovering Novel Attack Strategies from INFOSEC Alerts.
Record Nr. UNINA-9910768178503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data and Applications Security and Privacy XXIX [[electronic resource] ] : 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings / / edited by Pierangela Samarati
Data and Applications Security and Privacy XXIX [[electronic resource] ] : 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings / / edited by Pierangela Samarati
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XI, 364 p. 60 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer security
Database management
Management information systems
Computer science
Application software
Computer communication systems
Systems and Data Security
Database Management
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Computer Communication Networks
ISBN 3-319-20810-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce -- Towards Collaborative Query Planning in Multi-party Database Networks -- Privacy-Preserving Range Queries from Keyword Queries -- An Administrative Model for Relationship-Based Access Control -- Migrating from DAC to RBAC -- Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios -- Privacy Preserving Record Matching Using Automated Semi-trusted Broker -- Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid -- Privacy-Preserving Public Transport Ticketing System -- Expiration and Revocation of Keys for Attribute-Based Signatures -- Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis -- Constructing Inference-Proof Belief Mediators -- Personalized Composition of Trustful Reputation Systems -- FamilyID: A Hybrid Approach to Identify Family Information from Microblogs -- Sanitization of Call Detail Records via Differentially-Private Bloom Filters -- Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System -- Integrating Attributes into Role-Based Access Control -- Automated Translation of End User Policies for Usage Control Enforcement -- Defensive Resource Allocations with Security Chokepoints in IPv6 Networks -- A Topology Based Flow Model for Computing Domain Reputation -- FPGuard: Detection and Prevention of Browser Fingerprinting -- Stream Processing with Secure Information Flow Constraints -- Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies -- Inference Leakage Detection for Authorization Policies over RDF Data.
Record Nr. UNISA-996198513803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data and Applications Security and Privacy XXIX : 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings / / edited by Pierangela Samarati
Data and Applications Security and Privacy XXIX : 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings / / edited by Pierangela Samarati
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XI, 364 p. 60 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer security
Database management
Management information systems
Computer science
Application software
Computer communication systems
Systems and Data Security
Database Management
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Computer Communication Networks
ISBN 3-319-20810-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce -- Towards Collaborative Query Planning in Multi-party Database Networks -- Privacy-Preserving Range Queries from Keyword Queries -- An Administrative Model for Relationship-Based Access Control -- Migrating from DAC to RBAC -- Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios -- Privacy Preserving Record Matching Using Automated Semi-trusted Broker -- Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid -- Privacy-Preserving Public Transport Ticketing System -- Expiration and Revocation of Keys for Attribute-Based Signatures -- Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis -- Constructing Inference-Proof Belief Mediators -- Personalized Composition of Trustful Reputation Systems -- FamilyID: A Hybrid Approach to Identify Family Information from Microblogs -- Sanitization of Call Detail Records via Differentially-Private Bloom Filters -- Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System -- Integrating Attributes into Role-Based Access Control -- Automated Translation of End User Policies for Usage Control Enforcement -- Defensive Resource Allocations with Security Chokepoints in IPv6 Networks -- A Topology Based Flow Model for Computing Domain Reputation -- FPGuard: Detection and Prevention of Browser Fingerprinting -- Stream Processing with Secure Information Flow Constraints -- Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies -- Inference Leakage Detection for Authorization Policies over RDF Data.
Record Nr. UNINA-9910483928503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Business and Telecommunications [[electronic resource] ] : 19th International Conference, ICSBT 2022, Lisbon, Portugal, July 14–16, 2022, and 19th International Conference, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers / / edited by Marten Van Sinderen, Fons Wijnhoven, Slimane Hammoudi, Pierangela Samarati, Sabrina De Capitani di Vimercati
E-Business and Telecommunications [[electronic resource] ] : 19th International Conference, ICSBT 2022, Lisbon, Portugal, July 14–16, 2022, and 19th International Conference, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers / / edited by Marten Van Sinderen, Fons Wijnhoven, Slimane Hammoudi, Pierangela Samarati, Sabrina De Capitani di Vimercati
Autore Van Sinderen Marten
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (189 pages)
Disciplina 004.6
Altri autori (Persone) WijnhovenFons
HammoudiSlimane
SamaratiPierangela
VimercatiSabrina De Capitani di
Collana Communications in Computer and Information Science
Soggetto topico Computer networks
Application software
Computer networks - Security measures
Cryptography
Data encryption (Computer science)
Computer systems
Computer Communication Networks
Computer and Information Systems Applications
Mobile and Network Security
Cryptology
Computer System Implementation
ISBN 3-031-45137-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information -- Blind side channel on the Elephant LFSR Extended version -- Stacked Ensemble Models Evaluation on DL Based SCA -- Explaining the Use of Cryptographic API in Android Malware -- Explaining the Use of Cryptographic API in Android Malware -- Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and their Mitigation -- Compressing Big OLAP Data Cubes in Big Data Analytics Systems: New Paradigms, a Reference Architecture, and Future Research Perspectives.
Record Nr. UNISA-996552462203316
Van Sinderen Marten  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
E-Business and Telecommunications : 19th International Conference, ICSBT 2022, Lisbon, Portugal, July 14–16, 2022, and 19th International Conference, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers / / edited by Marten Van Sinderen, Fons Wijnhoven, Slimane Hammoudi, Pierangela Samarati, Sabrina De Capitani di Vimercati
E-Business and Telecommunications : 19th International Conference, ICSBT 2022, Lisbon, Portugal, July 14–16, 2022, and 19th International Conference, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers / / edited by Marten Van Sinderen, Fons Wijnhoven, Slimane Hammoudi, Pierangela Samarati, Sabrina De Capitani di Vimercati
Autore Van Sinderen Marten
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (189 pages)
Disciplina 004.6
Altri autori (Persone) WijnhovenFons
HammoudiSlimane
SamaratiPierangela
VimercatiSabrina De Capitani di
Collana Communications in Computer and Information Science
Soggetto topico Computer networks
Application software
Computer networks - Security measures
Cryptography
Data encryption (Computer science)
Computer systems
Computer Communication Networks
Computer and Information Systems Applications
Mobile and Network Security
Cryptology
Computer System Implementation
ISBN 3-031-45137-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information -- Blind side channel on the Elephant LFSR Extended version -- Stacked Ensemble Models Evaluation on DL Based SCA -- Explaining the Use of Cryptographic API in Android Malware -- Explaining the Use of Cryptographic API in Android Malware -- Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and their Mitigation -- Compressing Big OLAP Data Cubes in Big Data Analytics Systems: New Paradigms, a Reference Architecture, and Future Research Perspectives.
Record Nr. UNINA-9910746957403321
Van Sinderen Marten  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Business and Telecommunications [[electronic resource] ] : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers / / edited by Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, Fons Wijnhoven
E-Business and Telecommunications [[electronic resource] ] : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers / / edited by Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, Fons Wijnhoven
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (422 pages)
Disciplina 658.872
Collana Communications in Computer and Information Science
Soggetto topico Computer networks
Application software
Data protection
Computer networks - Security measures
Cryptography
Data encryption (Computer science)
Computer systems
Computer Communication Networks
Computer and Information Systems Applications
Data and Information Security
Mobile and Network Security
Cryptology
Computer System Implementation
ISBN 3-031-36840-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto e-Business -- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions -- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective -- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices -- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password -- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment -- Digital Transformation and Management of Transfer in University Platforms -- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques -- Security and Cryptography -- A Classification of Software-architectural Uncertainty regarding Confidentiality -- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications -- Improving Time Complexity and Utility of k-anonymous Microaggregation -- Extended Formal Analysis of the EDHOC Protocol in Tamarin -- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies -- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction -- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics -- On Applying Boolean Masking to Exponents -- Trusted Implementation and Enforcement of Application-specific Security Policies -- Selective Encryption for Owners' Control in Digital Data Markets.
Record Nr. UNISA-996546843903316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers / / edited by Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, Fons Wijnhoven
E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers / / edited by Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, Fons Wijnhoven
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (422 pages)
Disciplina 658.872
Collana Communications in Computer and Information Science
Soggetto topico Computer networks
Application software
Data protection
Computer networks - Security measures
Cryptography
Data encryption (Computer science)
Computer systems
Computer Communication Networks
Computer and Information Systems Applications
Data and Information Security
Mobile and Network Security
Cryptology
Computer System Implementation
ISBN 3-031-36840-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto e-Business -- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions -- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective -- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices -- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password -- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment -- Digital Transformation and Management of Transfer in University Platforms -- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques -- Security and Cryptography -- A Classification of Software-architectural Uncertainty regarding Confidentiality -- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications -- Improving Time Complexity and Utility of k-anonymous Microaggregation -- Extended Formal Analysis of the EDHOC Protocol in Tamarin -- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies -- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction -- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics -- On Applying Boolean Masking to Exponents -- Trusted Implementation and Enforcement of Application-specific Security Policies -- Selective Encryption for Owners' Control in Digital Data Markets.
Record Nr. UNINA-9910735789503321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Encyclopedia of Cryptography, Security and Privacy [[electronic resource] /] / edited by Sushil Jajodia, Pierangela Samarati, Moti Yung
Encyclopedia of Cryptography, Security and Privacy [[electronic resource] /] / edited by Sushil Jajodia, Pierangela Samarati, Moti Yung
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 2000 p.)
Disciplina 005.73
Soggetto topico Data structures (Computer science)
Data encryption (Computer science)
Coding theory
Information theory
Applied mathematics
Engineering mathematics
Computational complexity
Data Structures and Information Theory
Cryptology
Coding and Information Theory
Mathematical and Computational Engineering
Applications of Mathematics
Complexity
ISBN 3-642-27739-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910767514603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui