|
|
|
|
LEADER |
03776nam a22006015i 4500 |
001 |
978-3-319-23021-4 |
003 |
DE-He213 |
005 |
20151204160210.0 |
007 |
cr nn 008mamaa |
008 |
150908s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319230214
|9 978-3-319-23021-4
|
024 |
7 |
|
|a 10.1007/978-3-319-23021-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.L63
|
050 |
|
4 |
|a QA76.5913
|
050 |
|
4 |
|a QA76.63
|
072 |
|
7 |
|a UM
|2 bicssc
|
072 |
|
7 |
|a UYF
|2 bicssc
|
072 |
|
7 |
|a COM051000
|2 bisacsh
|
072 |
|
7 |
|a COM036000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.1015113
|2 23
|
245 |
1 |
0 |
|a Algebraic Informatics
|h [electronic resource] :
|b 6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015. Proceedings /
|c edited by Andreas Maletti.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a VIII, 223 p. 21 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 9270
|
505 |
0 |
|
|a Learning Weighted Automata -- More Than 1700 Years of Word Equations -- An Algebraic Geometric Approach to Multidimensional Words -- Why We Need Semirings in Automata Theory -- Unbordered Pictures: Properties and Construction -- Effective Invariant Theory of Permutation Groups using Representation Theory -- On differential uniformity of maps that may hide an algebraic trapdoor -- On the Lower Block Triangular Nature of the Incidence Matrices to Compute the Algebraic Immunity of Boolean Functions -- Weighted Unranked Tree Automata over Tree Valuation Monoids and Their Characterization by Weighted Logics -- A New Partial Key Exposure Attack on Multi-power RSA -- A Chomsky-Schutzenberger Theorem for Weighted Automata with Storage -- EF+EX Forest Algebras -- On near prime-order elliptic curves with small embedding degrees -- Key-Policy Multi-Authority Attribute-Based Encryption -- Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree -- Complexity of Uniform Membership of Context-Free Tree Grammars -- Attacking BEAR and LION schemes in a realistic scenario -- Weighted Restarting Automata and Pushdown Relations -- Equivalence checking problem for finite state transducers over semigroups.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 6th International Conference on Algebraic Informatics, CAI 2015, held in Stuttgart, Germany, in September 2015. The 15 revised full papers presented were carefully reviewed and selected from 25 submissions. The papers cover topics such as data models and coding theory; fundamental aspects of cryptography and security; algebraic and stochastic models of computing; logic and program modelling.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer logic.
|
650 |
|
0 |
|a Mathematical logic.
|
650 |
|
0 |
|a Computer science
|x Mathematics.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Logics and Meanings of Programs.
|
650 |
2 |
4 |
|a Mathematical Logic and Formal Languages.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
650 |
2 |
4 |
|a Software Engineering.
|
700 |
1 |
|
|a Maletti, Andreas.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319230207
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 9270
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-23021-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|