top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Combinatorial mathematics : proceedings of the International Conference on Combinatorial Theory, Canberra, August 16-27, 1977 / / edited by D. A. Holton, J. Seberry
Combinatorial mathematics : proceedings of the International Conference on Combinatorial Theory, Canberra, August 16-27, 1977 / / edited by D. A. Holton, J. Seberry
Edizione [1st ed. 1978.]
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [1978]
Descrizione fisica 1 online resource (IX, 353 p.)
Disciplina 511.6
Collana Lecture Notes in Mathematics
Soggetto topico Combinatorial analysis
ISBN 3-540-35702-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Reflections on the legitimate deck problem -- Some extremal problems on families of graphs and related problems -- Integral properties of combinatorial matrices -- A class of three-designs -- Isomorphic factorisations III: Complete multipartite graphs -- Biplanes and semi-biplanes -- Near-self-complementary designs and a method of mixed sums -- Recent progress and unsolved problems in dominance theory -- On the linear independence of sets of 2q columns of certain (1, ?1) matrices with a group structure, and its connection with finite geometries -- The doehlert-klee problem: Part I, statistical background -- On the cayley index of a group -- A survey of extremal (r,?)-systems and certain applications -- On the enumeration of certain graceful graphs -- Fixing subgraphs of Km,n -- Hadamard equivalence -- A note on equidistant permutation arrays -- The combinatorics of algebraic graph theory in theoretical physics -- Graphs, groups and polytopes -- Decompositions of complete symmetric digraphs into the four oriented quadrilaterals -- Brick packing -- Colour symmetry in crystallographic space groups -- Generation of a frequency square orthogonal to a 10×10 latin square -- Factorization in the monoid of languages -- On graphs as unions of eulerian graphs -- The analysis of colour symmetry -- Computing automorphisms and canonical labellings of graphs -- On a result of bose and shrikhande -- Further results on a problem in the design of electrical circuits -- Transversals and finite topologies -- Asymptotic number of self-converse oriented graphs -- Some correspondences involving the schröder numbers and relations -- A computer listing of hadamard matrices -- A class of codes generated by circulant weighing matrices -- An application of maximum-minimum distance circuits on hypercubes -- Decompositions of graphs and hypergraphs -- Some extremal problems in combinatorial geometry -- Distance-regular graphs -- A note on baxter's generalization of the temperley-lieb operators -- Autocorrelation of (+1,?1) sequences -- Triangles in labelled cubic graphs -- Problems.
Record Nr. UNISA-996466762903316
Berlin, Germany : , : Springer, , [1978]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information security and privacy : 12th australasian conference, acisp 2007, townsville, australia, july 2-4, 2007 : proceedings / / edited by Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
Information security and privacy : 12th australasian conference, acisp 2007, townsville, australia, july 2-4, 2007 : proceedings / / edited by Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
Edizione [1st ed. 1999.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [1999]
Descrizione fisica 1 online resource (336 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Privacy, Right of
Data protection
Computer security
ISBN 1-280-80455-6
9786610804559
3-540-48970-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Boolean Functions -- Boolean Function Design Using Hill Climbing Methods -- Enumeration of Correlation Immune Boolean Functions -- On the Symmetric Property of Homogeneous Boolean Functions -- Key Management -- Publicly Verifiable Key Escrow with Limited Time Span -- Accelerating Key Establishment Protocols for Mobile Communication -- Conference Key Agreement from Secret Sharing -- Cryptanalysis -- On m-Permutation Protection Scheme against Modification Attack -- Inversion Attack and Branching -- Signatures -- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves -- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature -- Repudiation of Cheating and Non-repudiation of Zhang’s Proxy Signature Schemes -- RSA Cryptosystems -- On the Security of an RSA Based Encryption Scheme -- Generalised Cycling Attacks on RSA and Strong RSA Primes -- RSA Acceleration with Field Programmable Gate Arrays -- Group Cryptography -- Changing Thresholds in the Absence of Secure Channels -- A Self-Certified Group-Oriented Cryptosystem without a Combiner -- Network Security -- Companion Viruses and the Macintosh: Threats and Countermeasures -- An Implementation of a Secure Version of NFS Including RBAC -- Electronic Commerce -- Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems -- Effient Electronic Cash Using Batch Signatures -- Evolution of Fair Non-repudiation with TTP -- Access Control -- Authorization in Object Oriented Databases -- An Analysis of Access Control Models -- Odds and Ends -- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems -- Characterization of Optimal Authentication Codes with Arbitration -- A Functional Cryptosystem Using a Group Action.
Record Nr. UNINA-9910143452003321
Berlin, Germany ; ; New York, New York : , : Springer, , [1999]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security and privacy : 12th australasian conference, acisp 2007, townsville, australia, july 2-4, 2007 : proceedings / / edited by Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
Information security and privacy : 12th australasian conference, acisp 2007, townsville, australia, july 2-4, 2007 : proceedings / / edited by Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
Edizione [1st ed. 1999.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [1999]
Descrizione fisica 1 online resource (336 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Privacy, Right of
Data protection
Computer security
ISBN 1-280-80455-6
9786610804559
3-540-48970-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Boolean Functions -- Boolean Function Design Using Hill Climbing Methods -- Enumeration of Correlation Immune Boolean Functions -- On the Symmetric Property of Homogeneous Boolean Functions -- Key Management -- Publicly Verifiable Key Escrow with Limited Time Span -- Accelerating Key Establishment Protocols for Mobile Communication -- Conference Key Agreement from Secret Sharing -- Cryptanalysis -- On m-Permutation Protection Scheme against Modification Attack -- Inversion Attack and Branching -- Signatures -- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves -- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature -- Repudiation of Cheating and Non-repudiation of Zhang’s Proxy Signature Schemes -- RSA Cryptosystems -- On the Security of an RSA Based Encryption Scheme -- Generalised Cycling Attacks on RSA and Strong RSA Primes -- RSA Acceleration with Field Programmable Gate Arrays -- Group Cryptography -- Changing Thresholds in the Absence of Secure Channels -- A Self-Certified Group-Oriented Cryptosystem without a Combiner -- Network Security -- Companion Viruses and the Macintosh: Threats and Countermeasures -- An Implementation of a Secure Version of NFS Including RBAC -- Electronic Commerce -- Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems -- Effient Electronic Cash Using Batch Signatures -- Evolution of Fair Non-repudiation with TTP -- Access Control -- Authorization in Object Oriented Databases -- An Analysis of Access Control Models -- Odds and Ends -- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems -- Characterization of Optimal Authentication Codes with Arbitration -- A Functional Cryptosystem Using a Group Action.
Record Nr. UNISA-996465625503316
Berlin, Germany ; ; New York, New York : , : Springer, , [1999]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui