Invited Papers -- A Survey of Some Recent Results on Bent Functions -- A Survey of the Merit Factor Problem for Binary Sequences -- A Survey of Feedback with Carry Shift Registers -- Univariate and Multivariate Merit Factors -- Complexity of Sequences I -- Discrete Fourier Transform, Joint Linear Complexity and Generalized Joint Linear Complexity of Multisequences -- Expected Value of the Linea…
Data Models for Semistructured Data -- ORA-SS -- Schema Extraction -- Normalization -- Views -- Physical Database Design -- Conclusion.Semistructured Database Design provides an essential reference for anyone interested in the effective management of semsistructured data. Since many new and advanced web applications consume a huge amount of such data, there is a growing need to properly design …
Quick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention.Security in E-Learning is organized in three parts. First, the author raises awareness that se…
Regular Papers -- Accountable Anonymous E-Mail -- Protecting Consumer Data in Composite Web Services -- A Decision Matrix Approach -- Assignment of Security Clearances in an Organization -- Tool Supported Management of Information Security Culture -- ERPSEC - A Reference Framework to Enhance Security in ERP Systems -- A New Architecture for User Authentication and Key Exchange Using Password fo…
Typical Group Key Management Schemes -- Tree Based Key Management Schemes -- Dynamic Conferencing Schemes -- Secure Group Communications with Hierarchical Access Control -- SGC Challenges and SGC for Wireless Networks -- Concluding Remarks.This book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over data networks. It offers an over…
Inductive Inference -- Information -- Strict Minimum Message Length (SMML) -- Approximations to SMML -- MML: Quadratic Approximations to SMML -- MML Details in Some Interesting Cases -- Structural Models -- The Feathers on the Arrow of Time -- MML as a Descriptive Theory -- Related Work.The Minimum Message Length (MML) Principle is an information-theoretic approach to induction, hypothesis test…
Parte 1 -- Un cifrario del XVIII secolo -- La prima macchina cifrante al mondo -- Damm, Hagelin e Gyldén -- Intercettazione di segnali radio e analisi crittografica prima del 1939 -- Guerra -- Entra in scena Arne Beurling -- La flotta russa del Baltico -- Segnali misteriosi -- Telescriventi -- L’analisi di Beurling -- La G-Schreiber e gli “app” -- Crittoanalisi sistematica -- Esce di sce…
Privacy/Anonymity -- Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocols -- Personal Attributes and Privacy -- Mobile Security 1 -- Local Management of Credits and Debits in Mobile Ad Hoc Networks -- How Secure are Current Mobile Operating Systems? -- An Overview of Security Issues and Techniques in Mobile Agents -- Mobile Security 2 -- A Secure Channel Protocol for …
(Semi-) Plenary Presentations -- Classification and Data Analysis: Classification; Data Analysis -- Applications -- Archaeology; Astronomy; Bio-Sciences; Electronic Data and Web; Finance and Insurance; Library Science and Linguistics; Macro-Economics; Marketing; Music Science; Quality Assurance -- Contest: Social Milieus in Dortmund.
Authentication, Encryption, Certification and Traceability in E-Services -- Safeguards, Interception, Tracking and Firewall Technology -- Administration, Management, Risk Analysis and Organizational Issues -- Mobile Access, Network Protocol and Multilateral Security -- Certification Authorities -- Public Key Infrastructures.International Federation for Information Processing The IFIP series pub…