top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology - CRYPTO 2002 [[electronic resource] ] : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung
Advances in Cryptology - CRYPTO 2002 [[electronic resource] ] : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (XIV, 630 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Computer science—Mathematics
Discrete mathematics
Algorithms
Operating systems (Computers)
Electronic data processing—Management
Cryptology
Data and Information Security
Discrete Mathematics in Computer Science
Operating Systems
IT Operations
ISBN 3-540-45708-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Block Ciphers -- Essential Algebraic Structure within the AES -- Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC -- Tweakable Block Ciphers -- Multi-user Oriented Cryptosystems -- The LSD Broadcast Encryption Scheme -- Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials -- Foundations and Methodology -- Provably Secure Steganography -- Flaws in Applying Proof Methodologies to Signature Schemes -- Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case -- Security of Practical Protocols -- On the Security of RSA Encryption in TLS -- Security Analysis of IKE’s Signature-Based Key-Exchange Protocol -- GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks -- Secure Multiparty Computation -- On 2-Round Secure Multiparty Computation -- Private Computation — k-Connected versus 1-Connected Networks -- Public-Key Encryption -- Analysis and Improvements of NTRU Encryption Paddings -- Universal Padding Schemes for RSA -- Cryptanalysis of Unbalanced RSA with Small CRT-Exponent -- Information Theory and Secret Sharing -- Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors -- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups -- Cipher Design and Analysis -- A Generalized Birthday Problem -- (Not So) Random Shuffles of RC4 -- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV -- Elliptic Curves and Abelian Varieties -- Supersingular Abelian Varieties in Cryptology -- Efficient Algorithms for Pairing-Based Cryptosystems -- Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2 -- Password-Based Authentication -- Threshold Password-Authenticated Key Exchange -- Distributed Cryptosystems -- A Threshold Pseudorandom Function Construction and Its Applications -- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products -- Pseudorandomness and Applications -- Hidden Number Problem with the Trace and Bit Security of XTR and LUC -- Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security -- Variations on Signatures and Authentication -- Threshold Ring Signatures and Applications to Ad-hoc Groups -- Deniable Ring Authentication -- SiBIR: Signer-Base Intrusion-Resilient Signatures -- Stream Ciphers and Boolean Functions -- Cryptanalysis of Stream Ciphers with Linear Masking -- The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers -- A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction -- Commitment Schemes -- Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks -- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor -- Signature Schemes -- Unique Signatures and Verifiable Random Functions from the DH-DDH Separation -- Security Proof for Partial-Domain Hash Signature Schemes.
Record Nr. UNISA-996465560903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology - CRYPTO 2002 [[electronic resource] ] : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung
Advances in Cryptology - CRYPTO 2002 [[electronic resource] ] : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (XIV, 630 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Computer science—Mathematics
Discrete mathematics
Algorithms
Operating systems (Computers)
Electronic data processing—Management
Cryptology
Data and Information Security
Discrete Mathematics in Computer Science
Operating Systems
IT Operations
ISBN 3-540-45708-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Block Ciphers -- Essential Algebraic Structure within the AES -- Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC -- Tweakable Block Ciphers -- Multi-user Oriented Cryptosystems -- The LSD Broadcast Encryption Scheme -- Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials -- Foundations and Methodology -- Provably Secure Steganography -- Flaws in Applying Proof Methodologies to Signature Schemes -- Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case -- Security of Practical Protocols -- On the Security of RSA Encryption in TLS -- Security Analysis of IKE’s Signature-Based Key-Exchange Protocol -- GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks -- Secure Multiparty Computation -- On 2-Round Secure Multiparty Computation -- Private Computation — k-Connected versus 1-Connected Networks -- Public-Key Encryption -- Analysis and Improvements of NTRU Encryption Paddings -- Universal Padding Schemes for RSA -- Cryptanalysis of Unbalanced RSA with Small CRT-Exponent -- Information Theory and Secret Sharing -- Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors -- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups -- Cipher Design and Analysis -- A Generalized Birthday Problem -- (Not So) Random Shuffles of RC4 -- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV -- Elliptic Curves and Abelian Varieties -- Supersingular Abelian Varieties in Cryptology -- Efficient Algorithms for Pairing-Based Cryptosystems -- Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2 -- Password-Based Authentication -- Threshold Password-Authenticated Key Exchange -- Distributed Cryptosystems -- A Threshold Pseudorandom Function Construction and Its Applications -- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products -- Pseudorandomness and Applications -- Hidden Number Problem with the Trace and Bit Security of XTR and LUC -- Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security -- Variations on Signatures and Authentication -- Threshold Ring Signatures and Applications to Ad-hoc Groups -- Deniable Ring Authentication -- SiBIR: Signer-Base Intrusion-Resilient Signatures -- Stream Ciphers and Boolean Functions -- Cryptanalysis of Stream Ciphers with Linear Masking -- The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers -- A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction -- Commitment Schemes -- Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks -- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor -- Signature Schemes -- Unique Signatures and Verifiable Random Functions from the DH-DDH Separation -- Security Proof for Partial-Domain Hash Signature Schemes.
Record Nr. UNINA-9910143895303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Information Systems Development [[electronic resource] ] : AI for IS Development and Operations / / edited by Gheorghe Cosmin Silaghi, Robert Andrei Buchmann, Virginia Niculescu, Gabriela Czibula, Chris Barry, Michael Lang, Henry Linger, Christoph Schneider
Advances in Information Systems Development [[electronic resource] ] : AI for IS Development and Operations / / edited by Gheorghe Cosmin Silaghi, Robert Andrei Buchmann, Virginia Niculescu, Gabriela Czibula, Chris Barry, Michael Lang, Henry Linger, Christoph Schneider
Autore Silaghi Gheorghe Cosmin
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (249 pages)
Disciplina 004.21
Altri autori (Persone) BuchmannRobert Andrei
NiculescuVirginia
CzibulaGabriela
BarryChris
LangMichael
LingerHenry
SchneiderChristoph
Collana Lecture Notes in Information Systems and Organisation
Soggetto topico Business information services
Electronic data processing—Management
Application software
Database management
Business Information Systems
IT Operations
Computer and Information Systems Applications
Database Management System
ISBN 3-031-32418-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A DSR study on Iterative Tool Development to Measure IT Process Maturity in an Agile Context -- A living lab perspective on information systems development process -- Cloud-based Business Intelligence Solutions in the Management of Polish Companies -- Conceptualizing Node.js Projects: a Graph-oriented Technology-specific Modeling Method -- Employing Graph Databases for Business Process Management and Representation -- IT Alignment as a Roadmap for Digital Transformation Success.
Record Nr. UNINA-9910734835403321
Silaghi Gheorghe Cosmin  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings / / edited by Guojin Wang, Albert Zomaya, Gregorio Martinez, Kenli Li
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings / / edited by Guojin Wang, Albert Zomaya, Gregorio Martinez, Kenli Li
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (LIII, 851 p. 327 illus. in color.)
Disciplina 004.35
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Artificial intelligence
Software engineering
Application software
Computer networks
Electronic data processing—Management
Artificial Intelligence
Software Engineering
Computer and Information Systems Applications
Computer Communication Networks
IT Operations
ISBN 3-319-27161-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trust, security and privacy for Big Data -- Trust, security and privacy for emerging applications -- Network optimization and performance evaluation -- Sensor-cloud systems -- Security and privacy protection in computer and network Systems -- Dependability in sensor, cloud, and Big Data systems. .
Record Nr. UNISA-996466226303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings / / edited by Guojin Wang, Albert Zomaya, Gregorio Martinez, Kenli Li
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings / / edited by Guojin Wang, Albert Zomaya, Gregorio Martinez, Kenli Li
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (LIII, 851 p. 327 illus. in color.)
Disciplina 004.35
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Artificial intelligence
Software engineering
Application software
Computer networks
Electronic data processing—Management
Artificial Intelligence
Software Engineering
Computer and Information Systems Applications
Computer Communication Networks
IT Operations
ISBN 3-319-27161-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trust, security and privacy for Big Data -- Trust, security and privacy for emerging applications -- Network optimization and performance evaluation -- Sensor-cloud systems -- Security and privacy protection in computer and network Systems -- Dependability in sensor, cloud, and Big Data systems. .
Record Nr. UNINA-9910483991303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part II / / edited by Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, Albert Y. Zomaya
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part II / / edited by Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, Albert Y. Zomaya
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XXIV, 331 p. 159 illus.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Artificial intelligence
Software engineering
Application software
Computer networks
Electronic data processing—Management
Artificial Intelligence
Software Engineering
Computer and Information Systems Applications
Computer Communication Networks
IT Operations
ISBN 3-642-33065-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analytical Modeling for Multi-transaction Bus on Distributed Systems -- Leveraging the Strengths of Transactional Memory While Maintaining System Performance for a Multiplayer Gaming -- Enhancing the Performance of a Distributed Mobile Computing Environment by Topology Construction -- Frame Error Rate Testing for High Speed Optical -- Maintaining Consistency in Software Transactional Memory through Dynamic Versioning Tuning -- Solving a 2-Covered Path Problem with Variable Radii for Wireless Sensor Networks -- Design of an Application-Dependent Static-Based Shared Memory Network -- Determining Quality of S-Boxes Using Pseudo Random Sequences Generated from Stream Ciphers -- Exploring Object-Level Parallelism on Chip Multi-processors -- The Hamiltonicity of WK-Recursive Pyramid -- Towards Multi-level Adaptation for Distributed Operating Systems and Applications -- FIDs Classifier for Artificial Intelligence and Its -- On Affirmative Adaptive Failure Detection -- A New Low Latency Parallel Turbo Decoder Employing Parallel Phase Decoding Method -- A Regular Group Quorum System of Degree A Note on Developing Optimal and Scalable Parallel Two-List Algorithms -- Small Business-Oriented Index Construction of Cloud Data -- High-Performance Matrix Multiply on a Massively Multithreaded Fiteng1000 Processor -- BIDE-Based Parallel Mining of Frequent Closed Sequences with MapReduce -- Efficient Task Scheduling for Hard Real-Time Tasks in Asymmetric Multicore Processors -- An Implementation of Parallel 2-D FFT Using Intel AVX Instructions on Multi-core Processors -- A Semantic Impact in Decentralized Resource Discovery Mechanism for Grid Computing Environments -- Design of n-Gram Based Dynamic Pre-fetching for DSM -- On Construction of Cloud IaaS for VM Live Migration Using KVM and OpenNebula -- Performance Evaluation of OpenMP and CUDA on Multicore -- Complexity of the Resource Allocation/Matching Problem with Weight Based Ceilings -- Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory -- A Novel Feature Selection Scheme for Energy Efficient Wireless Sensor Networks -- A Comprehensive Survey of the Feature Extraction Methods in the EEG Research -- Development of a Smart e-Health Portal for Chronic Disease Management -- A Novel Approach to Protein Structure Prediction Using PCA Based Extreme Learning Machines and Multiple Kernels -- A Novel Approach to Guarantee Causal Message Ordering in Pre-planned Wireless Sensor Networks -- People Identification with RMS-Based Spatial Pattern of EEG Signal -- Gait Based Human Identity Recognition from Multi-view Surveillance Videos.
Record Nr. UNISA-996465477003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part I / / edited by Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, Albert Y. Zomaya
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part I / / edited by Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, Albert Y. Zomaya
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XXI, 563 p. 241 illus.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Artificial intelligence
Software engineering
Application software
Computer networks
Electronic data processing—Management
Artificial Intelligence
Software Engineering
Computer and Information Systems Applications
Computer Communication Networks
IT Operations
ISBN 3-642-33078-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Accelerating the Dynamic Programming for the Optimal Polygon Triangulation on the -- Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor -- Parallel Algorithm for Nonlinear Network Optimization Problems and Real-Time -- Optimization of a Short-Range Proximity Effect Correction Algorithm in E-Beam Lithography Using GPGPUs -- Exploiting Multi-grain Parallelism for Efficient Selective Sweep -- Vectorized Algorithms for Quadtree Construction and -- A Multi-level Monitoring Framework for Stream-Based Coordination Programs -- An Optimal Parallel Prefix-Sums Algorithm on the Memory Machine Models for -- A Multi-GPU Programming Library for Real-Time -- Optimal Linear Programming Solutions for Multiprocessor Scheduling with Communication Delays -- A Bitstream Relocation Technique to Improve Flexibility of Partial -- A Hybrid Heuristic-Genetic Algorithm for Task Scheduling in Heterogeneous Multi-core -- Efficient Task Assignment on Heterogeneous Multicore Systems Considering Communication -- Budget Constrained Resource Allocation for Non-deterministic Workflows on an IaaS Cloud -- On a Wideband Fast Fourier Transform Using Piecewise Linear Approximations: Application to a Radio Telescope -- A Verified Library of Algorithmic Skeletons on Evenly Distributed -- Performance Measurement of Parallel Vlasov Code for Space Plasma on Various Scalar-Type Supercomputer -- Ultrasound Simulation on the Cell Broadband Engine Using the Westervelt -- Study on the Data Flow Balance in NFS Server with -- Performance, Scalability, and Semantics of Concurrent FIFO Queues -- Scalable Distributed Architecture for Media Transcoding -- GPU-Accelerated Restricted Boltzmann Machine for Collaborative Filtering -- STM Systems: Enforcing Strong Isolation between Transactions and Non-transactional -- A Dependency Aware Task Partitioning and Scheduling Algorithm for Hardware-Software Codesign on -- Power Efficiency Evaluation of Block Ciphers on GPU-Integrated Multicore Processor -- Experiments in Parallel Matrix Multiplication on Multi-core -- Fault Tolerance Logical Network Properties of Irregular -- Fault Recovery Technique for TMR Softcore Processor System Using Partial -- Non-Blocking Atomic Commitment in Asynchronous Distributed Systems with Faulty Processes -- On Modelling and Prediction of Total CPU Usage for Applications in MapReduce -- The Impact of Global Communication Latency at Extreme Scales on Krylov Methods -- Fast Parallel Algorithms for Blocked Dense Matrix Multiplication on Shared Memory Architectures -- Kernel Support for Fine-Grained Load Balancing in a Web Cluster Providing Streaming Service -- Overcoming the Scalability Limitations of Parallel Star Schema Data Warehouses -- Enhancing Service-Oriented Computing with Software -- An Insightful Program Performance Tuning Chain for GPU Computing.- Multi-core Fixed Priority DVS -- Comparing Checkpoint and Rollback Recovery Schemes in a Cluster System -- Causal Order Multicast Protocol Using Minimal Message History Information.
Record Nr. UNISA-996465501503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing, Part I [[electronic resource] ] : 11th International Conference, ICA3PP 2011, Melbourne, Australia,October 24-26, 2011, Proceedings, Part I / / edited by Yang Xiang, Alfredo Cuzzocrea, Michael Hobbs, Wanlei Zhou
Algorithms and Architectures for Parallel Processing, Part I [[electronic resource] ] : 11th International Conference, ICA3PP 2011, Melbourne, Australia,October 24-26, 2011, Proceedings, Part I / / edited by Yang Xiang, Alfredo Cuzzocrea, Michael Hobbs, Wanlei Zhou
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XVIII, 497 p. 161 illus., 87 illus. in color.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Artificial intelligence
Software engineering
Application software
Computer networks
Electronic data processing—Management
Artificial Intelligence
Software Engineering
Computer and Information Systems Applications
Computer Communication Networks
IT Operations
ISBN 3-642-24650-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466015903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing, Part II [[electronic resource] ] : 11th International Conference, ICA3PP 2011, Workshops, Melbourne, Australia, October 24-26, 2011, Proceedings, Part II / / edited by Yang Xiang, Alfredo Cuzzocrea, Michael Hobbs, Wanlei Zhou
Algorithms and Architectures for Parallel Processing, Part II [[electronic resource] ] : 11th International Conference, ICA3PP 2011, Workshops, Melbourne, Australia, October 24-26, 2011, Proceedings, Part II / / edited by Yang Xiang, Alfredo Cuzzocrea, Michael Hobbs, Wanlei Zhou
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XVIII, 411 p. 191 illus., 99 illus. in color.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Artificial intelligence
Software engineering
Application software
Computer networks
Electronic data processing—Management
Artificial Intelligence
Software Engineering
Computer and Information Systems Applications
Computer Communication Networks
IT Operations
ISBN 3-642-24669-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465970103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings / / edited by Jianying Zhou, Moti Yung
Applied Cryptography and Network Security [[electronic resource] ] : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings / / edited by Jianying Zhou, Moti Yung
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 564 p. 83 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Computer science—Mathematics
Discrete mathematics
Electronic data processing—Management
Algorithms
Data protection
Computer Communication Networks
Cryptology
Discrete Mathematics in Computer Science
IT Operations
Data and Information Security
ISBN 1-280-38725-4
9786613565174
3-642-13708-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Encryption -- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption -- How to Construct Interval Encryption from Binary Tree Encryption -- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions -- Digital Signature -- Trapdoor Sanitizable Signatures Made Easy -- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs -- Redactable Signatures for Tree-Structured Data: Definitions and Constructions -- Block Ciphers and Hash Functions -- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions -- Multi-trail Statistical Saturation Attacks -- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G??? -- High Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES against First and Second-Order Differential Power Analysis -- Adaptive Chosen-Message Side-Channel Attacks -- Secure Multiplicative Masking of Power Functions -- Zero Knowledge and Multi-party Protocols -- Batch Groth–Sahai -- Efficient and Secure Evaluation of Multivariate Polynomials and Applications -- Efficient Implementation of the Orlandi Protocol -- Improving the Round Complexity of Traitor Tracing Schemes -- Key Management -- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters -- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead -- Deniable Internet Key Exchange -- Authentication and Identification -- A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm -- Secure Sketch for Multiple Secrets -- A Message Recognition Protocol Based on Standard Assumptions -- Privacy and Anonymity -- Affiliation-Hiding Key Exchange with Untrusted Group Authorities -- Privacy-Preserving Group Discovery with Linear Complexity -- Two New Efficient PIR-Writing Protocols -- Regulatory Compliant Oblivious RAM -- RFID Security and Privacy -- Revisiting Unpredictability-Based RFID Privacy Models -- On RFID Privacy with Mutual Authentication and Tag Corruption -- Internet Security -- Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures -- COP: A Step toward Children Online Privacy -- A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising.
Record Nr. UNISA-996465668703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui