Proof, Computation and Agency


Book Description

Proof, Computation and Agency: Logic at the Crossroads provides an overview of modern logic and its relationship with other disciplines. As a highlight, several articles pursue an inspiring paradigm called 'social software', which studies patterns of social interaction using techniques from logic and computer science. The book also demonstrates how logic can join forces with game theory and social choice theory. A second main line is the logic-language-cognition connection, where the articles collected here bring several fresh perspectives. Finally, the book takes up Indian logic and its connections with epistemology and the philosophy of science, showing how these topics run naturally into each other.




Mechanizing Proof


Book Description

Most aspects of our private and social lives—our safety, the integrity of the financial system, the functioning of utilities and other services, and national security—now depend on computing. But how can we know that this computing is trustworthy? In Mechanizing Proof, Donald MacKenzie addresses this key issue by investigating the interrelations of computing, risk, and mathematical proof over the last half century from the perspectives of history and sociology. His discussion draws on the technical literature of computer science and artificial intelligence and on extensive interviews with participants. MacKenzie argues that our culture now contains two ideals of proof: proof as traditionally conducted by human mathematicians, and formal, mechanized proof. He describes the systems constructed by those committed to the latter ideal and the many questions those systems raise about the nature of proof. He looks at the primary social influence on the development of automated proof—the need to predict the behavior of the computer systems upon which human life and security depend—and explores the involvement of powerful organizations such as the National Security Agency. He concludes that in mechanizing proof, and in pursuing dependable computer systems, we do not obviate the need for trust in our collective human judgment.




Selected Areas in Cryptography


Book Description

This book constitutes the thoroughly refereed post-proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, held in Waterloo, Ontario, Canada, in August 2000. The 24 revised full papers presented were selected from 41 submissions and have gone through two rounds of reviewing and revision. The papers are organized in topical sections on cryptanalysis, block ciphers: new designs, elliptic curves and efficient implementations, security protocols and applications, block ciphers and hash functions, Boolean functions and stream ciphers, and public key systems.




Computational Logic in Multi-Agent Systems


Book Description

This book constitutes the strictly refereed post-proceedings of the 6th International Workshop on Computational Logic for Multi-Agent Systems, CLIMA VI. The book presents 14 revised full technical papers, 4 contest papers, and 7 invited papers together with 1 invited article are organized in topical sections on foundational aspects of agency, agent programming, agent interaction and normative systems, the first CLIMA contest, and on the project report of the SOCS project.




Computer Security - ESORICS 2000


Book Description

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.




Proceedings of the 18th International Conference on Computing and Information Technology (IC2IT 2022)


Book Description

This book gathers the proceedings of the 18th International Conference on Computing and Information Technology (IC2IT2022), held on May 19–20, 2022, in Kanchanaburi, Thailand. The topics covered include machine learning, natural language processing, image processing, intelligent systems and algorithms, as well as network and cloud computing. These lead to the major research directions for emerging information technology and innovation, reflecting digital trends.







Information and Communications Security


Book Description

This book constitutes the refereed proceedings of the 6th International Conference on Information and Communications Security, ICICS 2004, held in Malaga, Spain in October 2004. The 42 revised full papers presented were carefully reviewed and selected from 245 submissions. The papers address a broad range of topics in information and communication security including digital signatures, group signature schemes, e-commerce, digital payment systems, cryptographic attacks, mobile networking, authentication, channel analysis, power-analysis attacks, mobile agent security, broadcast encryption, AES, security analysis, XTR, access control, and intrusion detection.




Mobile Agents and Security


Book Description

New paradigms can popularize old technologies. A new \standalone" paradigm, the electronic desktop, popularized the personal computer. A new \connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents. Each agent or place in the electronic world has the authority of an individual or an organization in the physical world. The authority can be established, for example, cryptographically. A mobile agent can travel from one place to another subject to the des- nation place’s approval. The source and destination places can be in the same computer or in di erent computers. In either case,the agentinitiates the trip by executing a \go" instruction which takes as an argument the name or address of the destination place. The next instruction in the agent’s program is executed in the destination place, rather than in the source place. Thus, in a sense, the mobile agent paradigm reduces networking to a program instruction. A mobile agent can interact programmatically with the places it visits and, if the other agents approve, with the other agents it encounters in those places.




Distributed Computing


Book Description

DISC, the International Symposium on DIStributed Computing, is an annual forum for research presentations on all facets of distributed computing. DISC 2000 was held on4-6 October, 2000 in Toledo, Spain. This volume includes 23 contributed papers and the extended abstract of an invited lecture from last year’s DISC. It is expected that the regular papers will later be submitted in a more polished form to fully refereed scienti?c journals. The extended abstracts of this year’s invited lectures, by Jean-Claude Bermond and Sam Toueg, will appear in next year’s proceedings. We received over 100 regular submissions, a record for DISC. These s- missions were read and evaluated by the program committee, with the help of external reviewers when needed. Overall, the quality of the submissions was excellent, and we were unable to accept many deserving papers. This year’s Best Student Paper award goes to “Polynomial and Adaptive Long-Lived (2k?1)-Renaming” by Hagit Attiya and Arie Fouren. Arie Fouren is the student author.