The 2nd edition of LNM 523 is based on the two first authors' mathematical approach of this theory presented in its 1st edition in 1976. An entire new chapter on the current forefront of research has been added. Except for this new chapter and the correction of a few misprints, the basic material and presentation of the first edition has been maintained. At the end of each chapter the reader will also find notes with further bibliographical information.
The 2nd edition of LNM 523 is based on the two first authors' mathematical approach of this theory presented in its 1st edition in 1976. An entire ...
The RPC-memory specification problem was proposed by Broy and Lamport as a case study in the formal design of distributed and concurrent systems. As a realistic example typical for operating systems and hardware design, the RPC-memory problem was used as the basis for comparing various approaches to formal specification, refinement, and verification. Preliminary solutions were discussed during a workshop at Schloss Dagstuhl, Germany, in September 1994. Then an extensive discussion took place between the referees and authors. Finally 15 thoroughly revised papers were accepted for inclusion...
The RPC-memory specification problem was proposed by Broy and Lamport as a case study in the formal design of distributed and concurrent systems. As a...
This work constitutes the refereed proceedings of the First International Conference on Information and Communications Security, ICICS '97, held in Beijing, China, in November 1997. The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided into sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key...
This work constitutes the refereed proceedings of the First International Conference on Information and Communications Security, ICICS '97, held in Be...
This is Volume 3 of the Proceedings of the Interna- tional Summer School on "Modular functions of one variable and arithmetical applications" which took place at RUCA, Antwerp University, from July 17 to August 3, 1972. It contains papers by P.Cartier- .Roy, B.Dwork, N.Katz, J-P.Serre and H.P.F.Swinnerton-Dyer on congruence proper- ties of modular forms, l-adic representations, p-adic modular forms and p-adic zeta functions. W.Kuyk J-P.Serre CONTENTS H.P.F. SWINNERTON-DYER On l-adic representations and congruences for coefficients 1 of modular forms B. DWORK The Up operator of Atkin on...
This is Volume 3 of the Proceedings of the Interna- tional Summer School on "Modular functions of one variable and arithmetical applications" which to...