Advances in computing science - ASIAN '99 : 5th Asian Computing Science Conference, Phuket, Thailand, December 10-12, 1999 : proceedings / / P. S. Thiagarajan, Roland Yap, editors |
Edizione | [1st ed. 1999.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer Verlag, , [1999] |
Descrizione fisica | 1 online resource (XII, 408 p.) |
Disciplina | 004.071 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Electronic data processing - Ability testing
Computer science - Research |
ISBN | 3-540-46674-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- Validation of Synchronous Reactive Systems: From Formal Verification to Automatic Testing -- Emerging Application Domains and the Computing Fabric -- Regular Papers -- The Game of the Name in Cryptographic Tables -- A Parallel Approximation Algorithm for the Max Cut Problem on Cubic Graphs -- Rapid Prototyping Techniques for Fuzzy Controllers -- Transactional Cache Management with A periodic Invalidation Scheme in Mobile Environments -- Observable Sharing for Functional Circuit Description -- Relating May and Must Testing Semantics for Discrete Timed Process Algebras -- A Framework for Formal Reasoning about Open Distributed Systems -- Structural Sharing and Efficient Proof-Search in Propositional Intuitionistic Logic -- Verifying Probabilistic Programs Using a Hoare like Logic -- An Expressive Extension of TLC -- Completeness and Decidability of a Fragment of Duration Calculus with Iteration -- Logical Relations in Circuit Verification -- Lemma Generalization and Non-unit Lemma Matching for Model Elimination -- On Automating Inductive and Non-inductive Termination Methods -- Asynchronous Links in the PBC and M-Nets -- Demand-Driven Model Checking for Context-Free Processes -- Programming the Mobility Behaviour of Agents by Composing Itineraries -- Faster Model Checking for Open Systems -- An Argumentation Approach to Semantics of Declarative Programs with Defeasible Inheritance -- Entailment of Non-structural Subtype Constraints -- A CPS-Transform of Constructive Classical Logic -- Formal Verification of the MCS List-Based Queuing Lock -- BDD-Nodes Can Be More Expressive -- Formal Verification of Descriptions with Distinct Order of Memory Operations -- Beyond Tamaki-Sato Style Unfold/Fold Transformations for Normal Logic Programs -- On L k (Q) Types and Boundedness of IFP(Q) on Finite Structures -- Separators Are as Simple as Cutsets -- Ant Colony Optimization for the Ship Berthing Problem -- Poster Session Abstracts -- Security Modeling and Evaluation for the Mobile Code Paradigm -- CASA - Structured Design of a Specification Language for Intelligent Agents -- An Efficient Location Management by Optimal Location Area Partitioning in PCS Networks -- Programming with Explicit Regions -- A Verification Technique Based on Syntactic Action Refinement in a TCSP-like Process Algebra and the Hennessy-Milner-Logic -- Formal Verification of Secret Sharing Protocol Using Coq -- On Feasibility, Boundedness and Redundancy of Systems of Linear Constraints over R 2-Plane -- Deduction in Logic of Association Rules -- Asynchronous Migration in Parallel Genetic Programming -- Verification Results for a Multimedia Protocol -- Multipoint-to-Point ABR Service with Fair Intelligent Congestion Control in ATM Networks. |
Record Nr. | UNISA-996466368803316 |
Berlin ; ; Heidelberg : , : Springer Verlag, , [1999] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in cryptology : CRYPTO '85 : proceedings / edited by Hugh C. Williams |
Autore | CRYPTO '85 <Santa Barbara, Calif.; 1985> |
Pubbl/distr/stampa | Berlin : Springer Verlag, c1986 |
Descrizione fisica | X, 548 p. ; 24 cm |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990000351590203316 |
CRYPTO '85 <Santa Barbara, Calif.; 1985> | ||
Berlin : Springer Verlag, c1986 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in cryptology : CRYPTO '86 : proceedings / A.M. Odlyzko (ed.) |
Autore | CRYPTO '86 <1986; Santa Barbara Calif.> |
Pubbl/distr/stampa | Berlin : Springer Verlag, c1987 |
Descrizione fisica | XI, 487 p. : ill. ; 25 cm |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Soggetto non controllato |
Elaboratori elettronici
Criptologia |
ISBN | 3-540-18047-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990000352140203316 |
CRYPTO '86 <1986; Santa Barbara Calif.> | ||
Berlin : Springer Verlag, c1987 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in cryptology : proceedings of Eurocrypt 84 : a workshop on the theory and application of cryptographic techniques, Paris, France, april 9-11 1984 / edited by T. Beth, N. Cot and I. Ingemarsson |
Autore | Eurocrupt 84 <Parigi ; 1984> |
Pubbl/distr/stampa | Berlin : Springer Verlag, c1985 |
Descrizione fisica | VII, 489 p. : ill. ; 24 cm |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990000351510203316 |
Eurocrupt 84 <Parigi ; 1984> | ||
Berlin : Springer Verlag, c1985 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in cryptology : Eurocrypt '85 : proceedings of a workshop on the theory and application of cryptographic techniques, Linz, Austria, april 1985 / edited by Franz Pichler |
Pubbl/distr/stampa | Berlin : Springer Verlag, c1986 |
Descrizione fisica | IX, 280 p. : ill. ; 24 cm |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990000351600203316 |
Berlin : Springer Verlag, c1986 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in cryptology-crypto '87 : proceedings of a Conference held at the Univerity of California, Santa Barbara, August 16-20, 1987 / Ed. Carl Pomerance |
Pubbl/distr/stampa | Berlin : Springer Verlag, 1988 |
Descrizione fisica | IX, 460 p. , 25 cm |
Collana | Lecture notes in computer science |
ISBN |
3-540-18796-0
0-387-18796-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-990001207650403321 |
Berlin : Springer Verlag, 1988 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in cryptology-EUROCRYPT '97 : International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997 : proceedings / / Walter Fumy, editor |
Edizione | [1st ed. 1997.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer Verlag, , [1997] |
Descrizione fisica | 1 online resource (XI, 509 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers - Access control
Cryptography |
ISBN | 3-540-69053-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Block Ciphers -- Two Attacks on Reduced IDEA -- Combinatorial Properties of Basic Encryption Operations -- Public Key Systems -- A New Public-Key Cryptosystem -- On the Importance of Checking Cryptographic Protocols for Faults -- Lattice Attacks on NTRU -- Protocols -- Kleptography: Using Cryptography Against Cryptography -- Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation -- Anonymous Fingerprinting -- A Secure and Optimally Efficient Multi-Authority Election Scheme -- Key Escrow -- Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals -- The GCHQ Protocol and Its Problems -- Hash-Functions -- Bucket Hashing with a Small Key Size -- A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost -- Information Theory -- Smooth Entropy and Rényi Entropy -- Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion -- Stream Ciphers -- Linear Statistical Weakness of Alleged RC4 Keystream Generator -- Cryptanalysis of Alleged A5 Stream Cipher -- Complexity Theory -- Lower Bounds for Discrete Logarithms and Related Problems -- Stronger Security Proofs for RSA and Rabin Bits -- Round-Optimal Zero-Knowledge Arguments Based on Any One-Way Function -- Efficient Cryptographic Protocols Based on Noisy Channels -- Rapid Demonstration of Linear Relations Connected by Boolean Operators -- Oblivious Transfers and Privacy Amplification -- Implementation -- SHA: A Design for Parallel Architectures? -- Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2n)m) -- Finding Good Random Elliptic Curves for Cryptosystems Defined over -- Authentication -- Incremental Cryptography and Memory Checkers -- Almost k-wise Independent Sample Spaces and Their Cryptologic Applications -- Boolean Functions -- More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings -- Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria -- Signatures -- Distributed “Magic Ink” Signatures -- Efficient and Generalized Group Signatures -- Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees -- Selective Forgery of RSA Signatures Using Redundancy. |
Record Nr. | UNINA-9910143458203321 |
Berlin ; ; Heidelberg : , : Springer Verlag, , [1997] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in cryptology-EUROCRYPT '97 : International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997 : proceedings / / Walter Fumy, editor |
Edizione | [1st ed. 1997.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer Verlag, , [1997] |
Descrizione fisica | 1 online resource (XI, 509 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers - Access control
Cryptography |
ISBN | 3-540-69053-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Block Ciphers -- Two Attacks on Reduced IDEA -- Combinatorial Properties of Basic Encryption Operations -- Public Key Systems -- A New Public-Key Cryptosystem -- On the Importance of Checking Cryptographic Protocols for Faults -- Lattice Attacks on NTRU -- Protocols -- Kleptography: Using Cryptography Against Cryptography -- Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation -- Anonymous Fingerprinting -- A Secure and Optimally Efficient Multi-Authority Election Scheme -- Key Escrow -- Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals -- The GCHQ Protocol and Its Problems -- Hash-Functions -- Bucket Hashing with a Small Key Size -- A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost -- Information Theory -- Smooth Entropy and Rényi Entropy -- Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion -- Stream Ciphers -- Linear Statistical Weakness of Alleged RC4 Keystream Generator -- Cryptanalysis of Alleged A5 Stream Cipher -- Complexity Theory -- Lower Bounds for Discrete Logarithms and Related Problems -- Stronger Security Proofs for RSA and Rabin Bits -- Round-Optimal Zero-Knowledge Arguments Based on Any One-Way Function -- Efficient Cryptographic Protocols Based on Noisy Channels -- Rapid Demonstration of Linear Relations Connected by Boolean Operators -- Oblivious Transfers and Privacy Amplification -- Implementation -- SHA: A Design for Parallel Architectures? -- Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2n)m) -- Finding Good Random Elliptic Curves for Cryptosystems Defined over -- Authentication -- Incremental Cryptography and Memory Checkers -- Almost k-wise Independent Sample Spaces and Their Cryptologic Applications -- Boolean Functions -- More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings -- Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria -- Signatures -- Distributed “Magic Ink” Signatures -- Efficient and Generalized Group Signatures -- Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees -- Selective Forgery of RSA Signatures Using Redundancy. |
Record Nr. | UNISA-996465826503316 |
Berlin ; ; Heidelberg : , : Springer Verlag, , [1997] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in data science and classification : proceeding of the 6th conference of the International Federation of Classification Societies (IFCS-98). UniversitÓ "La Sapienza", Rome, 21 - 24 July, 1998/ Alfredo Rizzi, Maurizio Vichi, Hans Herman Bock(eds.) |
Autore | Intenational Federation of Classification Conference (6th : 1998 : Rome, I taly) |
Pubbl/distr/stampa | Berlin : Springer Verlag, 1998 |
Descrizione fisica | 677 p. : with 141 figures and 75 tables ; 25 cm. |
Disciplina | 519.53(Statistica descrittiva, analisi multivariata) |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990005479250203316 |
Intenational Federation of Classification Conference (6th : 1998 : Rome, I taly) | ||
Berlin : Springer Verlag, 1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in data science and classification : proceedings of the 6th Conference of the International Federation of Classification Societies (IFCS-98), Università "La Sapienza", Rome, 21-24 july 1998 / edited by Alfredo Rizzi...[et al.] |
Pubbl/distr/stampa | Berlin : Springer Verlag, c1998 |
Descrizione fisica | xv, 677 p. ; 24 cm |
Disciplina | 001.4 |
Collana | Studies in classification, data analysis, and knowledge organization |
Soggetto non controllato |
Analisi multivariata e multidimensionale dei dati
Classificazione Analisi dei dati - Convegni |
ISBN | 3-540-64641-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-990002890800403321 |
Berlin : Springer Verlag, c1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|