Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 12705 dokumen yang sesuai dengan query
cover
Sebastian Mödersheim, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrücken, Germany, in March/April 2011, in association with ETAPS 2011. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. The papers feature topics including various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application."
Berlin: Springer-Verlag, 2012
e20408103
eBooks  Universitas Indonesia Library
cover
Dirk Pattinson, editor
"his book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Coalgebraic Methods in Computer Science, CMCS 2012, colocated with ETAPS 2012, held in Tallin, Estonia, in March/April 2012. The 10 revised full papers were carefully reviewed and selected from 23 submissions. Also included are three invited talks. The papers cover a wide range of topics in the theory, logics and applications of coalgebras."
Berlin: Springer-Verlag , 2012
e20406358
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Approximation and Online Algorithms, WAOA 2011, held in Saarbrücken, Germany, in September 2011. The 21 papers presented were carefully reviewed and selected from 48 submissions. The volume also contains an extended abstract of the invited talk of Prof. Klaus Jansen. The Workshop on Approximation and Online Algorithms focuses on the design and analysis of algorithms for online and computationally hard problems. Both kinds of problems have a large number of applications in a wide variety of fields. Topics of interest for WAOA 2011 were: algorithmic game theory, approximation classes, coloring and partitioning, competitive analysis, computational finance, cuts and connectivity, geometric problems, inapproximability results, mechanism design, network design, packing and covering, paradigms for design and analysis of approximation and online algorithms, parameterized complexity, randomization techniques and scheduling problems."
Berlin: Springer-Verlag, 2012
e20410515
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies."
Berlin: Springer-Verlag, 2012
e20409034
eBooks  Universitas Indonesia Library
cover
"This book constitutes thoroughly refereed revised selected papers from the First IAPR TC3 Workshop on Partially Supervised Learning, PSL 2011, held in Ulm, Germany, in September 2011. The 14 papers presented in this volume were carefully reviewed and selected for inclusion in the book, which also includes 3 invited talks. PSL 2011 dealt with methodological issues as well as real-world applications of PSL. The main methodological issues were, combination of supervised and unsupervised learning, diffusion learning, semi-supervised classification, regression, and clustering, learning with deep architectures, active learning, PSL with vague, fuzzy, or uncertain teaching signals, learning, or statistical pattern recognition, and PSL in cognitive systems. Applications of PSL included, image and signal processing, multi-modal information processing, sensor/information fusion, human computer interaction, data mining and Web mining, forensic anthropology, and bioinformatics."
Berlin: Springer-Verlag, 2012
e20409108
eBooks  Universitas Indonesia Library
cover
Ari Juels, editor
"This book constitutes the thoroughly refereed post-worksop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2011, held in Amherst, Massachusetts, USA, in June 2011. The 12 revised full papers presented were carefully reviewed and selected from 21 initial submissions for inclusion in the book. The papers focus on minimalism in cryptography, on-tag cryptography, securing RFID with physics, and protocol-level security in RFID."
Berlin: Springer-Verlag, 2012
e20407984
eBooks  Universitas Indonesia Library
cover
"This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography, encryption, cryptanalysis and automatic verification, and formal methods in network security."
Berlin: Springer-Verlag, 2012
e20408183
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in March 2010. The 14 revised full papers presented together with an invited talk were carefully reviewed and selected during two rounds of refereeing. The papers are organized in topical sections on scheduling, adversaries, protecting resources, secure processes, and security for clouds."
Heidelberg: Springer, 2012
e20408219
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011. The 15 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 42 submissions. The papers focus on security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects of ubiquitous computing, validation/analysis tools, web service security/trust/privacy, grid security, security risk assessment, and case studies."
Berlin: Springer-Verlag, 2012
e20409541
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration."
Berlin: Springer-Verlag , 2012
e20410386
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>