feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Brandenburg  (6)
  • HU Berlin  (6)
  • SB Herzberg
  • SB Freyenstein
  • 2000-2004  (6)
  • Computer Science  (6)
Type of Medium
Language
Region
Years
Year
Access
  • 1
    UID:
    almahu_BV019643323
    Format: XVI, 546 S. : , Ill., graph. Darst.
    ISBN: 3-540-23975-8
    Series Statement: Lecture Notes in Computer Science 3329
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Kryptosystem ; Konferenzschrift ; Kongress ; Konferenzschrift ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9947920428502882
    Format: XV, 376 p. , online resource.
    ISBN: 9783540246756
    Series Statement: Lecture Notes in Computer Science, 3026
    Content: It was our great pleasure to extend a welcome to all who participated in SERA 2003, the ?rst world-classs International Conference on Software Engineering Research and Applications, which was held at Crowne Plaza Union Square Hotel, San Francisco, California, USA. The conference was sponsored by the International Association for Computer and Information Science (ACIS), in cooperation with the Software Engine- ing and Information Technology Institute at Central Michigan University. This conference was aimed at discussing the wide range of problems encountered in present and future high technologies. In this conference, we had keynote speeches by Dr. Barry Boehm and Dr. C.V. Ramamoorthy and invited talks by Dr. RaymondYeh, Dr. Raymond Paul, Dr. Mehmet S ¸ahinoglu, which were fruitful to all who participated in SERA 2003. We would like to thank the publicity chairs and the members of our program c- mittees for their work on this conference. We hope that SERA 2003 was enjoyable for all participants.
    Note: Keynote Addresses -- Balancing Agility and Discipline: A Guide for the Perplexed -- A Study of Feedback in Software Supported Networked Systems -- Invited Talks -- Why Great Organizations Are Great? The Art of Business -- Future of Computer Software Systems: Commodity or Service? -- An Exact Reliability Block Diagram Calculation Tool to Design Very Complex Systems -- Formal Methods -- Computer-Aided Refinement of Data Structures on Higher-Order Algebraic Specifications -- Analyzing Relationships to the Quality Level between CMM and Six Sigma -- Deterministic End-to-End Guarantees for Real-Time Applications in a DiffServ-MPLS Domain -- Component-Based Software Engineering -- Measuring and Communicating Component Reliability -- Toward Component-Based System: Using Static Metrics and Relationships in Object-Oriented System -- Communication Style Driven Connector Configurations -- A Study on the Specification for e-Business Agent Oriented Component Based Development -- Software Process Models -- Towards Efficient Management of Changes in XML-Based Software Documents -- Model-Based Project Process Analysis Using Project Tracking Data -- Software Testing and Quality Issues -- A COM-Based Customization Testing Technique -- Design Defect Trigger for Software Process Improvement -- Certification of Software Packages Using Hierarchical Classification -- An Automatic Test Data Generation System Based on the Integrated Classification-Tree Methodology -- Requirements Engineering, Reengineering, and Performance Analysis -- Normalizing Class Hierarchies Based on the Formal Concept Analysis -- QoS-Guaranteed DiffServ-Aware-MPLS Traffic Engineering with Controlled Bandwidth Borrowing -- Architecture Based Software Reengineering Approach for Transforming from Legacy System to Component Based System through Applying Design Patterns -- Knowledge Discovery and Artificial Intelligence -- Increasing the Efficiency of Cooperation among Agents by Sharing Actions -- Applying Model Checking Techniques to Game Solving -- A Fuzzy Logic-Based Location Management Method for Mobile Networks -- A Next Generation Intelligent Mobile Commerce System -- Database Retrieval and Human Computer Interaction -- Indexing XML Data for Path Expression Queries -- Improving Software Engineering Practice with HCI Aspects -- Software Security -- Reliability Assurance in Development Process for TOE on the Common Criteria.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540219750
    Language: English
    Subjects: Computer Science
    RVK:
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9947920567502882
    Format: XXIV, 932 p. , online resource.
    ISBN: 9783540245711
    Series Statement: Lecture Notes in Computer Science, 2973
    Note: Invited Papers -- Access Methods -- Query Processing in XML -- Security and Integrity -- Query Processing in Temporal and Spatial Databases -- Semi-structured Databases -- Knowledge Discovery in Temporal and Spatial Databases -- XML and Multimedia Data Storage -- Temporal and Spatial Databases and Query Processing -- Web Computing -- Data Mining and Knowledge Discovery in Web I -- Query Processing and Optimization -- Classification and Clustering I -- Web Search I -- Classification and Clustering II -- Web Search II -- Mobile Databases I -- Parallel and Distributed Databases -- Multimedia Databases I -- Mobile Databases II -- Data Mining and Knowledge Discovery in Web II -- Multimedia Databases II -- Mobile Databases III.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540210474
    Language: English
    Subjects: Computer Science
    RVK:
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    San Francisco, Calif. :Morgan Kaufmann,
    UID:
    almahu_BV013044666
    Format: XXI, 856 S. : graph. Darst.
    ISBN: 1-55860-442-1 , 1-55860-578-9
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Programmiersprache ; Lehrbuch
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9947920712202882
    Format: XVI, 548 p. , online resource.
    ISBN: 9783540305392
    Series Statement: Lecture Notes in Computer Science, 3329
    Content: The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5–9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Research center for Information Security) at ICU (Information and Communi- tionsUniversity),andwas?nanciallysupportedbyMIC(MinistryofInformation and Communication) in Korea. The conference received, from 30 countries, 208 submissions that represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. Each paper, without the authors’ information, was reviewed by at least three members of the program committee, and the papers (co-)authored by members of the program committee were reviewed by at least six members. We also blinded the reviewers’ names among the reviewers until the ?nal decision, by using pseudonyms. The reviews were then followed by deep discussions on the papers, which greatly contributed to the quality of the ?nal selection. In most cases, extensive comments were sent to the authors. Among 208 submissions, the program committee selected 36 papers. Two submissions were merged into a single paper, yielding the total of 35 papers acceptedforpresentationinthetechnicalprogramoftheconference.Manyhi- quality works could not be accepted because of the competitive nature of the conference and the challenging task of selecting a program. These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers.
    Note: Block Ciphers -- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds -- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC -- Eliminating Random Permutation Oracles in the Even-Mansour Cipher -- Public Key Encryption -- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles -- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding -- Invited Talk I -- Stream Ciphers: Dead or Alive? -- Number Theory and Algebra -- On the Generalized Linear Equivalence of Functions Over Finite Fields -- Sieving Using Bucket Sort -- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups -- Secure Computation -- Practical Two-Party Computation Based on the Conditional Gate -- Privacy in Non-private Environments -- Asynchronous Proactive Cryptosystems Without Agreement -- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes -- Hash Functions -- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions -- Higher Order Universal One-Way Hash Functions -- The MD2 Hash Function Is Not One-Way -- Key Management -- New Approaches to Password Authenticated Key Exchange Based on RSA -- Constant-Round Authenticated Group Key Exchange for Dynamic Groups -- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates -- Identification -- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices -- Secret Handshakes from CA-Oblivious Encryption -- k-Times Anonymous Authentication (Extended Abstract) -- XL-Algorithms -- The XL-Algorithm and a Conjecture from Commutative Algebra -- Comparison Between XL and Gröbner Basis Algorithms -- Digital Signatures -- Generic Homomorphic Undeniable Signatures -- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings -- Public Key Cryptanalysis -- On the Security of MOR Public Key Cryptosystem -- Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice -- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes -- Invited Talk II -- Information Security in Korea IT839 Strategy -- Symmetric Key Cryptanalysis -- How Far Can We Go Beyond Linear Cryptanalysis? -- The Davies-Murphy Power Attack -- Time-Memory Trade-Off Attacks on Multiplications and T-Functions -- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0 -- Protocols -- On Provably Secure Time-Stamping Schemes -- Strong Conditional Oblivious Transfer and Computing on Intervals -- Improved Setup Assumptions for 3-Round Resettable Zero Knowledge.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540239758
    Language: English
    Subjects: Computer Science
    RVK:
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_BV013178795
    Format: XXVII, 570 S. : Ill., graph. Darst. , CD-ROM (12 cm)
    ISBN: 3-86063-620-0
    Series Statement: Fachbibliothek
    Uniform Title: Microsoft Windows 2000 TCP-IP protocols and services technical reference
    Language: German
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: TCP/IP ; Windows 2000 ; TCP/IP ; Windows 2000 ; CD-ROM
    Author information: Davies, Joseph
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages