×

Found 121 Documents (Results 1–100)

Application of metaheuristics to large-scale transportation problems. (English) Zbl 1440.90003

Lirkov, Ivan (ed.) et al., Large-scale scientific computing. 9th international conference, LSSC 2013, Sozopol, Bulgaria, June 3–7, 2013. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 8353, 215-222 (2014).
MSC:  90B10 90C08 90C59
PDFBibTeX XMLCite
Full Text: DOI

Data delivery by energy-constrained mobile agents. (English) Zbl 1397.68006

Flocchini, Paola (ed.) et al., Algorithms for sensor systems. 9th international symposium on algorithms and experiments for sensor systems, wireless networks and distributed robotics, ALGOSENSORS 2013, Sophia Antipolis, France, September 5–6, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-45345-8/pbk; 978-3-642-45346-5/ebook). Lecture Notes in Computer Science 8243, 111-122 (2014).
PDFBibTeX XMLCite
Full Text: DOI

EAdroid: providing environment adaptive security for Android system. (English) Zbl 1348.68047

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 118-131 (2014).
MSC:  68P25 68M12
PDFBibTeX XMLCite
Full Text: DOI

Automatic detection and analysis of encrypted messages in malware. (English) Zbl 1348.68050

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 101-117 (2014).
MSC:  68P25 68M12
PDFBibTeX XMLCite
Full Text: DOI

Lightweight zero-knowledge proofs for crypto-computing protocols. (English) Zbl 1336.94061

Chow, Sherman S. M. (ed.) et al., Information security. 17th international conference, ISC 2014, Hong Kong, China, October 12–14, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-13256-3/pbk). Lecture Notes in Computer Science 8783, 140-157 (2014).
MSC:  94A60 68P25 68M12
PDFBibTeX XMLCite
Full Text: DOI

Privacy assurances in multiple data-aggregation transactions. (English) Zbl 1445.68086

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, South Korea, November 27–29, 2013. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8565, 3-19 (2014).
MSC:  68P27 68Q10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptive versus static security in the UC model. (English) Zbl 1368.94093

Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 10-28 (2014).
MSC:  94A60 68M12 68P25
PDFBibTeX XMLCite
Full Text: DOI

Beyond set disjointness: the communication complexity of finding the intersection. (English) Zbl 1321.68298

Proceedings of the 2014 ACM symposium on principles of distributed computing, PODC ’14, Paris, France, July 15–18, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2944-6). 106-113 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Secure multi-party computation for elliptic curves. (English) Zbl 1420.68021

Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 98-108 (2014).
MSC:  68M12 11G05 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cognition: a tool for reinforcing security in software defined networks. (English) Zbl 1305.68033

Tantar, Alexandru-Adrian (ed.) et al., EVOLVE – a bridge between probability, set oriented numerics, and evolutionary computation V. Selected papers based on the presentations at the international conference, Beijing, China, July 1–4, 2014. Cham: Springer (ISBN 978-3-319-07493-1/pbk; 978-3-319-07494-8/ebook). Advances in Intelligent Systems and Computing 288, 61-78 (2014).
MSC:  68M10 68P25
PDFBibTeX XMLCite
Full Text: DOI

A new theoretical framework for robust optimization under multi-band uncertainty. (English) Zbl 1305.90082

Helber, Stefan (ed.) et al., Operations research proceedings 2012. Selected papers of the international annual conference of the German Operations Research Society (GOR), Leibniz University of Hannover, Germany, September 5–7, 2012. Cham: Springer (ISBN 978-3-319-00794-6/pbk; 978-3-319-00795-3/ebook). Operations Research Proceedings, 115-121 (2014).
MSC:  90B10 90C08 90C05
PDFBibTeX XMLCite
Full Text: DOI

Discrete Bayesian network interpretation of the Cox’s proportional hazards model. (English) Zbl 1450.62127

van der Gaag, Linda C. (ed.) et al., Probabilistic graphical models. 7th European workshop, PGM 2014, Utrecht, The Netherlands, September 17–19, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8754, 238-253 (2014).
MSC:  62N02 62H22
PDFBibTeX XMLCite
Full Text: DOI

CSLMEN: a new cuckoo search Levenberg Marquardt Elman network for data classification. (English) Zbl 1298.68243

Herawan, Tutut (ed.) et al., Recent advances on soft computing and data mining. Proceedings of the first international conference on soft computing and data mining (SCDM-2014), Universiti Tun Hussein Onn Malaysia, Johor, Malaysia, June 16–18, 2014. Revised papers. Cham: Springer (ISBN 978-3-319-07691-1/pbk; 978-3-319-07692-8/ebook). Advances in Intelligent Systems and Computing 287, 173-182 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Reducing the overhead of MPC over a large population. (English) Zbl 1423.68183

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8642, 197-217 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Publicly auditable secure multi-party computation. (English) Zbl 1346.68084

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 175-196 (2014).
PDFBibTeX XMLCite
Full Text: DOI Link

Communication-efficient MPC for general adversary structures. (English) Zbl 1423.68184

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8642, 155-174 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Intelligent data analysis and its applications, Volume II. Proceeding of the first Euro-China conference on intelligent data analysis and applications, ECC 2014, Shenzhen, China, June 13–15, 2014. (English) Zbl 1297.68016

Advances in Intelligent Systems and Computing 298. Cham: Springer (ISBN 978-3-319-07772-7/pbk; 978-3-319-07773-4/ebook). xx, 603 p. (2014).
PDFBibTeX XMLCite
Full Text: DOI

How to use bitcoin to design fair protocols. (English) Zbl 1335.94032

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 421-439 (2014).
MSC:  94A60 68P25 68M12
PDFBibTeX XMLCite
Full Text: DOI

Improved periodic data retrieval in asynchronous rings with a faulty host. (English) Zbl 1333.68245

Halldórsson, Magnús M. (ed.), Structural information and communication complexity. 21st international colloquium, SIROCCO 2014, Takayama, Japan, July 23–25, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-09619-3/pbk). Lecture Notes in Computer Science 8576, 355-370 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Cochecker: detecting capability and sensitive data leaks from component chains in Android. (English) Zbl 1337.94029

Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 446-453 (2014).
MSC:  94A60 68P25 68M12
PDFBibTeX XMLCite
Full Text: DOI

Running multiple Androids on one ARM platform. (English) Zbl 1337.94089

Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 438-445 (2014).
MSC:  94A60 68P25 68M12
PDFBibTeX XMLCite
Full Text: DOI

A secure three-party computational protocol for triangle area. (English) Zbl 1337.94049

Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 82-97 (2014).
MSC:  94A60 68M12 68P25
PDFBibTeX XMLCite
Full Text: DOI

BackRef: accountability in anonymous communication networks. (English) Zbl 1407.68142

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8479, 380-400 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Improving intrusion detection systems for wireless sensor networks. (English) Zbl 1404.94115

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 343-360 (2014).
MSC:  94A60 68P25 68M12
PDFBibTeX XMLCite
Full Text: DOI

Private message transmission using disjoint paths. (English) Zbl 1353.94030

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 116-133 (2014).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 3

Main Field

all top 3

Software