000 | 03777nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-319-23021-4 | ||
003 | DE-He213 | ||
005 | 20200421112041.0 | ||
007 | cr nn 008mamaa | ||
008 | 150908s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319230214 _9978-3-319-23021-4 |
||
024 | 7 |
_a10.1007/978-3-319-23021-4 _2doi |
|
050 | 4 | _aQA76.9.L63 | |
050 | 4 | _aQA76.5913 | |
050 | 4 | _aQA76.63 | |
072 | 7 |
_aUM _2bicssc |
|
072 | 7 |
_aUYF _2bicssc |
|
072 | 7 |
_aCOM051000 _2bisacsh |
|
072 | 7 |
_aCOM036000 _2bisacsh |
|
082 | 0 | 4 |
_a005.1015113 _223 |
245 | 1 | 0 |
_aAlgebraic Informatics _h[electronic resource] : _b6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015. Proceedings / _cedited by Andreas Maletti. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aVIII, 223 p. 21 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v9270 |
|
505 | 0 | _aLearning Weighted Automata -- More Than 1700 Years of Word Equations -- An Algebraic Geometric Approach to Multidimensional Words -- Why We Need Semirings in Automata Theory -- Unbordered Pictures: Properties and Construction -- Effective Invariant Theory of Permutation Groups using Representation Theory -- On differential uniformity of maps that may hide an algebraic trapdoor -- On the Lower Block Triangular Nature of the Incidence Matrices to Compute the Algebraic Immunity of Boolean Functions -- Weighted Unranked Tree Automata over Tree Valuation Monoids and Their Characterization by Weighted Logics -- A New Partial Key Exposure Attack on Multi-power RSA -- A Chomsky-Schutzenberger Theorem for Weighted Automata with Storage -- EF+EX Forest Algebras -- On near prime-order elliptic curves with small embedding degrees -- Key-Policy Multi-Authority Attribute-Based Encryption -- Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree -- Complexity of Uniform Membership of Context-Free Tree Grammars -- Attacking BEAR and LION schemes in a realistic scenario -- Weighted Restarting Automata and Pushdown Relations -- Equivalence checking problem for finite state transducers over semigroups. | |
520 | _aThis book constitutes the refereed proceedings of the 6th International Conference on Algebraic Informatics, CAI 2015, held in Stuttgart, Germany, in September 2015. The 15 revised full papers presented were carefully reviewed and selected from 25 submissions. The papers cover topics such as data models and coding theory; fundamental aspects of cryptography and security; algebraic and stochastic models of computing; logic and program modelling. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer logic. | |
650 | 0 | _aMathematical logic. | |
650 | 0 |
_aComputer science _xMathematics. |
|
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aLogics and Meanings of Programs. |
650 | 2 | 4 | _aMathematical Logic and Formal Languages. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aDiscrete Mathematics in Computer Science. |
650 | 2 | 4 | _aSoftware Engineering. |
700 | 1 |
_aMaletti, Andreas. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319230207 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v9270 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-23021-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c56629 _d56629 |