top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Achieving Success and Innovation in Global Sourcing: Perspectives and Practices : 9th Global Sourcing Workshop 2015, La Thuile, Italy, February 18-21, 2015, Revised Selected Papers / / edited by Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks
Achieving Success and Innovation in Global Sourcing: Perspectives and Practices : 9th Global Sourcing Workshop 2015, La Thuile, Italy, February 18-21, 2015, Revised Selected Papers / / edited by Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (VIII, 251 p. 50 illus. in color.)
Disciplina 004
Collana Lecture Notes in Business Information Processing
Soggetto topico Electronic data processing - Management
Business information services
Computer industry
Industrial procurement
IT Operations
Enterprise Architecture
The Computer Industry
Procurement
ISBN 3-319-26739-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents -- Software Sourcing Modes and Software Sourcing Gestalts -- Towards Model-based Strategic Sourcing -- The mediating effect of formal contractual controls in the relationship between experience and contract design -- Applying a Configurational Approach for Explaining the Role of Relationship Quality for Successful Outsourcing Arrangements -- The Role of Social Capital as Antecedent in Clan Formation in Information Systems Outsourcing Project -- Information Technology Outsourcing and the Bottom Line -- Riding for a fall in outsourced ISD: Knowledge transfer challenges between the onshore vendor and the offshored unit -- How to drive innovation within outsourcing relations: The role of performance evaluation and management control systems -- Innovation Offshoring by Small and Medium-Sized Enterprises – Establishing the Research Gap -- Understanding Collaboration in Multisourcing Arrangements: A Social Exchange Theory Perspective -- Multi-Sourcing Governance: in Perception and in Practice -- Using E-markets for globally distributed work -- Building a supply chain ecosystem: how the Enterprise Connectivity Interface (ECI) will enable and support interorganisational collaboration -- The importance of IT energy efficiency in outsourcing decision making: a survey in the Dutch outsourcing infrastructure market.
Record Nr. UNINA-9910299258503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Ad Hoc Networking : Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 / / edited by Pedro Cuenca, Carlos Guerrero, Ramon Puigjaner, Bartomeu Serra
Advances in Ad Hoc Networking : Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 / / edited by Pedro Cuenca, Carlos Guerrero, Ramon Puigjaner, Bartomeu Serra
Edizione [1st ed. 2008.]
Pubbl/distr/stampa New York, NY : , : Springer US : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (246 p.)
Disciplina 004.6
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer networks
Data structures (Computer science)
Information theory
Electronic data processing - Management
Computer Communication Networks
Data Structures and Information Theory
IT Operations
ISBN 9780387094908
0387094903
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Reconfiguration and Optimization Networks -- End To End QoS Mapping Between Metroethernet and WiMAX -- A Mobility Model for Personal Networks (PN) -- Replicated Random Walks for Service Advertising in Unstructured Environments -- Sensor Networks -- ACF: An Autonomic Communication Framework for Wireless Sensor Networks -- An Autonomous Energy-Aware Routing Scheme: a Supplementary Routing Approach for Path-Preserving Wireless Sensor Networks -- FlowerNet — How to design a user friendly Sensor Network -- Distributed Policy Management Protocol for Self-Configuring Mobile Ad Hoc Networks -- Routing Algorithms and Protocols I -- Performance Evaluation of a Protocol for Fair P2P Auctions over MANETs -- A Scalable Adaptation of the OLSR Protocol for Large Clustered Mobile Ad hoc Networks -- Security and Privacy -- Securing Multihop Vehicular Message Broadcast using Trust Sensors -- Scalable Exchange of Packet Counters in OLSR -- Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms -- Security for Context-Aware ad-hoc Networking Applications -- MAC Protocols -- No Ack in IEEE 802.11e Single-Hop Ad-Hoc VoIP Networks -- Constraining the network topology in IEEE 802.15.4 -- Throughput and Delay Bounds for Cognitive Transmissions -- Wireless Broadcast with Network Coding: Dynamic Rate Selection -- Routing Algorithms and Protocols II -- A Reactive Wireless Mesh Network Architecture -- MEA-DSR: A Multipath Energy-aware Routing Protocol for Wireless Ad Hoc Networks -- A New Energy Efficient Multicast Routing Approach in MANETs.
Record Nr. UNINA-9910483112703321
New York, NY : , : Springer US : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology - CRYPTO '99 : 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings / / edited by Michael Wiener
Advances in Cryptology - CRYPTO '99 : 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings / / edited by Michael Wiener
Edizione [1st ed. 1999.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1999
Descrizione fisica 1 online resource (XII, 648 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Coding theory
Information theory
Cryptography
Data encryption (Computer science)
Algorithms
Electronic data processing - Management
Computer networks
Data and Information Security
Coding and Information Theory
Cryptology
IT Operations
Computer Communication Networks
ISBN 3-540-48405-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public-Key Cryptanalysis I -- On the Security of RSA Padding -- Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization -- The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications -- Invited Lecture -- Information-Theoretic Cryptography -- Secure Communication and Computation -- Information Theoretically Secure Communication in the Limited Storage Space Model -- The All-or-Nothing Nature of Two-Party Secure Computation -- Distributed Cryptography -- Adaptive Security for Threshold Cryptosystems -- Two Party RSA Key Generation -- Robust Distributed Multiplication without Interaction -- A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting -- Secret-Key Cryptography -- Truncated Differentials and Skipjack -- Fast Correlation Attacks Based on Turbo Code Techniques -- Highly Nonlinear Resilient Functions Optimizing Siegenthaler’s Inequality -- Message Authentication Codes -- UMAC: Fast and Secure Message Authentication -- Square Hash: Fast Message Authentication via Optimized Universal Hash Functions -- Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions -- Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier -- Public-Key Cryptanalysis II -- Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto ’97 -- Weakness in Quaternion Signatures -- Cryptanalysis of “2R” Schemes -- Factoring N = p r q for Large r -- Traitor Tracing -- An Efficient Public Key Traitor Tracing Scheme -- Dynamic Traitor Tracing -- Efficient Methods for Integrating Traceability and Broadcast Encryption -- Differential Power Analysis -- Differential Power Analysis -- Towards Sound Approaches to Counteract Power-Analysis Attacks -- Signature Schemes -- Separability andEfficiency for Generic Group Signature Schemes -- A Forward-Secure Digital Signature Scheme -- Abuse-Free Optimistic Contract Signing -- Zero Knowledge -- Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK -- On Concurrent Zero-Knowledge with Pre-processing -- Asymmetric Encryption -- On the Security Properties of OAEP as an All-or-Nothing Transform -- Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization -- Secure Integration of Asymmetric and Symmetric Encryption Schemes -- Electronic Cash -- Auditable, Anonymous Electronic Cash -- Protocols and Broadcasting -- Oblivious Transfer with Adaptive Queries -- Compressing Cryptographic Resources -- Coding Constructions for Blacklisting Problems without Computational Assumptions -- An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes.
Record Nr. UNINA-9910143649403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1999
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology - CRYPTO 2002 [[electronic resource] ] : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung
Advances in Cryptology - CRYPTO 2002 [[electronic resource] ] : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (XIV, 630 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Computer science—Mathematics
Discrete mathematics
Algorithms
Operating systems (Computers)
Electronic data processing—Management
Cryptology
Data and Information Security
Discrete Mathematics in Computer Science
Operating Systems
IT Operations
ISBN 3-540-45708-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Block Ciphers -- Essential Algebraic Structure within the AES -- Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC -- Tweakable Block Ciphers -- Multi-user Oriented Cryptosystems -- The LSD Broadcast Encryption Scheme -- Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials -- Foundations and Methodology -- Provably Secure Steganography -- Flaws in Applying Proof Methodologies to Signature Schemes -- Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case -- Security of Practical Protocols -- On the Security of RSA Encryption in TLS -- Security Analysis of IKE’s Signature-Based Key-Exchange Protocol -- GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks -- Secure Multiparty Computation -- On 2-Round Secure Multiparty Computation -- Private Computation — k-Connected versus 1-Connected Networks -- Public-Key Encryption -- Analysis and Improvements of NTRU Encryption Paddings -- Universal Padding Schemes for RSA -- Cryptanalysis of Unbalanced RSA with Small CRT-Exponent -- Information Theory and Secret Sharing -- Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors -- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups -- Cipher Design and Analysis -- A Generalized Birthday Problem -- (Not So) Random Shuffles of RC4 -- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV -- Elliptic Curves and Abelian Varieties -- Supersingular Abelian Varieties in Cryptology -- Efficient Algorithms for Pairing-Based Cryptosystems -- Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2 -- Password-Based Authentication -- Threshold Password-Authenticated Key Exchange -- Distributed Cryptosystems -- A Threshold Pseudorandom Function Construction and Its Applications -- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products -- Pseudorandomness and Applications -- Hidden Number Problem with the Trace and Bit Security of XTR and LUC -- Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security -- Variations on Signatures and Authentication -- Threshold Ring Signatures and Applications to Ad-hoc Groups -- Deniable Ring Authentication -- SiBIR: Signer-Base Intrusion-Resilient Signatures -- Stream Ciphers and Boolean Functions -- Cryptanalysis of Stream Ciphers with Linear Masking -- The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers -- A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction -- Commitment Schemes -- Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks -- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor -- Signature Schemes -- Unique Signatures and Verifiable Random Functions from the DH-DDH Separation -- Security Proof for Partial-Domain Hash Signature Schemes.
Record Nr. UNISA-996465560903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology - CRYPTO 2002 : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung
Advances in Cryptology - CRYPTO 2002 : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (XIV, 630 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Computer science—Mathematics
Discrete mathematics
Algorithms
Operating systems (Computers)
Electronic data processing—Management
Cryptology
Data and Information Security
Discrete Mathematics in Computer Science
Operating Systems
IT Operations
ISBN 3-540-45708-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Block Ciphers -- Essential Algebraic Structure within the AES -- Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC -- Tweakable Block Ciphers -- Multi-user Oriented Cryptosystems -- The LSD Broadcast Encryption Scheme -- Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials -- Foundations and Methodology -- Provably Secure Steganography -- Flaws in Applying Proof Methodologies to Signature Schemes -- Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case -- Security of Practical Protocols -- On the Security of RSA Encryption in TLS -- Security Analysis of IKE’s Signature-Based Key-Exchange Protocol -- GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks -- Secure Multiparty Computation -- On 2-Round Secure Multiparty Computation -- Private Computation — k-Connected versus 1-Connected Networks -- Public-Key Encryption -- Analysis and Improvements of NTRU Encryption Paddings -- Universal Padding Schemes for RSA -- Cryptanalysis of Unbalanced RSA with Small CRT-Exponent -- Information Theory and Secret Sharing -- Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors -- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups -- Cipher Design and Analysis -- A Generalized Birthday Problem -- (Not So) Random Shuffles of RC4 -- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV -- Elliptic Curves and Abelian Varieties -- Supersingular Abelian Varieties in Cryptology -- Efficient Algorithms for Pairing-Based Cryptosystems -- Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2 -- Password-Based Authentication -- Threshold Password-Authenticated Key Exchange -- Distributed Cryptosystems -- A Threshold Pseudorandom Function Construction and Its Applications -- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products -- Pseudorandomness and Applications -- Hidden Number Problem with the Trace and Bit Security of XTR and LUC -- Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security -- Variations on Signatures and Authentication -- Threshold Ring Signatures and Applications to Ad-hoc Groups -- Deniable Ring Authentication -- SiBIR: Signer-Base Intrusion-Resilient Signatures -- Stream Ciphers and Boolean Functions -- Cryptanalysis of Stream Ciphers with Linear Masking -- The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers -- A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction -- Commitment Schemes -- Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks -- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor -- Signature Schemes -- Unique Signatures and Verifiable Random Functions from the DH-DDH Separation -- Security Proof for Partial-Domain Hash Signature Schemes.
Record Nr. UNINA-9910143895303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings / / edited by Christian Cachin, Jan Camenisch
Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings / / edited by Christian Cachin, Jan Camenisch
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 630 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Algorithms
Computer science - Mathematics
Discrete mathematics
Electronic data processing - Management
Cryptology
Computer Communication Networks
Operating Systems
Discrete Mathematics in Computer Science
IT Operations
ISBN 1-280-30737-4
9786610307371
3-540-24676-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Private Computation -- Efficient Private Matching and Set Intersection -- Positive Results and Techniques for Obfuscation -- Secure Computation of the k th -Ranked Element -- Signatures I -- Short Signatures Without Random Oracles -- Sequential Aggregate Signatures from Trapdoor Permutations -- Unconditional Security -- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission -- The Exact Price for Unconditionally Secure Asymmetric Cryptography -- On Generating the Initial Key in the Bounded-Storage Model -- Distributed Cryptography -- Practical Large-Scale Distributed Key Generation -- Optimal Communication Complexity of Generic Multicast Key Distribution -- Foundations I -- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem -- Black-Box Composition Does Not Imply Adaptive Security -- Identity-Based Encryption -- Chosen-Ciphertext Security from Identity-Based Encryption -- Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles -- Elliptic Curves -- Construction of Secure Random Curves of Genus 2 over Prime Fields -- Projective Coordinates Leak -- Signatures II -- Security Proofs for Identity-Based Identification and Signature Schemes -- Concurrent Signatures -- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures -- Public-Key Cryptography -- Public-Key Steganography -- Immunizing Encryption Schemes from Decryption Errors -- Secure Hashed Diffie-Hellman over Non-DDH Groups -- Foundations II -- On Simulation-Sound Trapdoor Commitments -- Hash Function Balance and Its Impact on Birthday Attacks -- Multiparty Computation -- Multi-party Computation with Hybrid Security -- On the Hardness of Information-Theoretic Multiparty Computation -- Dining Cryptographers Revisited -- Cryptanalysis -- Algebraic Attacks and Decomposition of Boolean Functions -- Finding Small Roots of Bivariate Integer Polynomial Equations Revisited -- New Applications -- Public Key Encryption with Keyword Search -- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data -- Algorithms and Implementation -- Merkle Tree Traversal in Log Space and Time -- Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3 -- Anonymity -- Traceable Signatures -- Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme -- Anonymous Identification in Ad Hoc Groups.
Record Nr. UNINA-9910144186503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Global Sourcing. Models, Governance, and Relationships : 7th Global Sourcing Workshop 2013, Val d’Isère, France, March 11-14, 2013, Revised Selected Papers / / edited by Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks
Advances in Global Sourcing. Models, Governance, and Relationships : 7th Global Sourcing Workshop 2013, Val d’Isère, France, March 11-14, 2013, Revised Selected Papers / / edited by Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 223 p. 23 illus.)
Disciplina 658.054
Collana Lecture Notes in Business Information Processing
Soggetto topico Electronic data processing - Management
Software engineering
Industrial organization
Industrial procurement
IT Operations
Software Engineering
Organization
Procurement
ISBN 3-642-40951-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto IT Global Delivery Model Efficiency: An Exploratory Case Study to Identify Input and Output Factors -- Relative and Joint Dependence in IS Outsourcing Relationships – A Model of Effects on Relational Facets and Exchange Performance -- The Role of Organizational Standards in IT Outsourcing Relations -- Vendor Capabilities in ITO Research: A Systematization and Critical Review -- The Middle Management of Offshoring: Understanding Offshoring Strategy Implementation at a Meso Level -- Offshore BPO Decisions and Institutional Influence on Senior Managers -- Cloud Computing as Innovation: Studying Diffusion -- Towards Improvement of Information Systems Governance: Reorganization of Software Applications Hosting -- Coordinating Tensions in Orchestrating Blended Modes of Sharing and Outsourcing of Services -- Can Agile Software Tools Bring the Benefits of a Task Board to Globally Distributed Teams? -- KAIWA: Towards a Method for Knowledge Transfer in the Transition Phase of Offshore Outsourced Projects -- Opaque Indifference and Corporate Social Responsibility: A Moral License for Offshore BPO? -- Business Process Outsourcing in Suriname: Call Center Services.
Record Nr. UNINA-9910437958303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Information and Computer Security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings / / edited by Kanta Matsuura, Eiichiro Fujisaki
Advances in Information and Computer Security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings / / edited by Kanta Matsuura, Eiichiro Fujisaki
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XII, 299 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Operating systems (Computers)
Electronic data processing - Management
Computers and civilization
Computer networks
Algorithms
Data and Information Security
Operating Systems
IT Operations
Computers and Society
Computer Communication Networks
ISBN 3-540-89598-1
Classificazione 54.30
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography -- On Generating Elements of Orders Dividing p 2k ±p k ?+?1 -- Chosen Ciphertext Secure Public Key Encryption with a Simple Structure -- Remarks on the Attack of Fouque et al. against the ?IC Scheme -- Signature and Signcryption -- Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles -- Signcryption Scheme in Multi-user Setting without Random Oracles -- Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices -- Software Security -- The Superdiversifier: Peephole Individualization for Software Protection -- Detecting Java Theft Based on Static API Trace Birthmark -- Online Network Forensics for Automatic Repair Validation -- Return Value Predictability Profiles for Self–healing -- Privacy Protection and Contents Protection -- Involuntary Information Leakage in Social Network Services -- Privacy Preserving Computations without Public Key Cryptographic Operation -- A Novel Framework for Watermarking: The Data-Abstracted Approach -- Invited Talk -- The Elliptic Curve Discrete Logarithm Problem: State of the Art -- Authentication and Access Control -- An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication -- Analysis of a Biometric Authentication Protocol for Signature Creation Application -- Efficient Secure Labeling Method under Dynamic XML Data Streams -- Implementation -- Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems -- The Long-Short-Key Primitive and Its Applications to Key Security.
Record Nr. UNINA-9910484474203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Information Systems Development : AI for IS Development and Operations / / edited by Gheorghe Cosmin Silaghi, Robert Andrei Buchmann, Virginia Niculescu, Gabriela Czibula, Chris Barry, Michael Lang, Henry Linger, Christoph Schneider
Advances in Information Systems Development : AI for IS Development and Operations / / edited by Gheorghe Cosmin Silaghi, Robert Andrei Buchmann, Virginia Niculescu, Gabriela Czibula, Chris Barry, Michael Lang, Henry Linger, Christoph Schneider
Autore Silaghi Gheorghe Cosmin
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (249 pages)
Disciplina 004.21
Altri autori (Persone) BuchmannRobert Andrei
NiculescuVirginia
CzibulaGabriela
BarryChris
LangMichael
LingerHenry
SchneiderChristoph
Collana Lecture Notes in Information Systems and Organisation
Soggetto topico Business information services
Electronic data processing—Management
Application software
Database management
Business Information Systems
IT Operations
Computer and Information Systems Applications
Database Management System
ISBN 9783031324185
3031324188
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A DSR study on Iterative Tool Development to Measure IT Process Maturity in an Agile Context -- A living lab perspective on information systems development process -- Cloud-based Business Intelligence Solutions in the Management of Polish Companies -- Conceptualizing Node.js Projects: a Graph-oriented Technology-specific Modeling Method -- Employing Graph Databases for Business Process Management and Representation -- IT Alignment as a Roadmap for Digital Transformation Success.
Record Nr. UNINA-9910734835403321
Silaghi Gheorghe Cosmin  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Information Systems Development : Exploring New Horizons and Opportunities / / edited by Bartosz Marcinkowski, Adam Przybyłek, Aleksander Jarzębowicz, Netta Iivari, Emilio Insfran, Michael Lang, Henry Linger, Christoph Schneider
Advances in Information Systems Development : Exploring New Horizons and Opportunities / / edited by Bartosz Marcinkowski, Adam Przybyłek, Aleksander Jarzębowicz, Netta Iivari, Emilio Insfran, Michael Lang, Henry Linger, Christoph Schneider
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XXIX, 294 p. 54 illus., 42 illus. in color.)
Disciplina 658.4038
Collana Lecture Notes in Information Systems and Organisation
Soggetto topico Business information services
Software engineering - Management
Electronic data processing - Management
Application software
Business Information Systems
Software Management
IT Operations
Computer and Information Systems Applications
ISBN 3-031-87880-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Scaling Product Acceptance Analysis Using Annotation Systems Based on Large Language Models -- Chapter 2. Strategies for Effective Remote Retrospectives: Exploring Retrospective Games, Anonymity, and Continuous Reflection -- Chapter 3. Self-Sovereign Identities: Brief History and Survey of the Field -- Chapter 4. A Framework for Rigorous Execution and Presentation of Expert Interviews in IS and Digital Transformation Research -- Chapter 5. Growing Pains of Digital Transformation: Navigating the Challenges in Non-Profits -- Chapter 6. Digital Innovation, Strategic and Lean Management as Success Factors in IT -- Chapter 7. A Solution for Developing Corpora for Polish Speech Enhancement in Complex Acoustic Environments -- Chapter 8. Data-Driven Assessment of Practical Skills in Cybersecurity Challenges -- Chapter 9. A Circular Digital Twin for Climate-Smart Soils through Community Composting -- Chapter 10. Design Principles for Food Heritage Digital Twins -- Chapter 11. Beyond Agile Methodologies: Exploring the Business Analyst’s Role in Agile Software Development -- Chapter 12. Assessing Operational Business-IT Alignment for Architecture Improvement -- Chapter 13. An EBNF-Based Grammar for Use Case Specification -- Chapter 14. Changes in Node.js Server-Side Application Performance Characteristics Over Time Under Load.
Record Nr. UNINA-9911007485803321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui