Narrow your search

Library

AP (3)

EhB (3)

KDG (3)

KU Leuven (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

ULB (3)

ULiège (3)

More...

Resource type

book (6)

digital (3)


Language

English (9)


Year
From To Submit

2009 (3)

2007 (3)

2006 (3)

Listing 1 - 9 of 9
Sort by

Digital
Privacy Enhancing Technologies (vol. # 4258) : 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers
Authors: ---
ISBN: 9783540687931 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Digital
Privacy Enhancing Technologies : 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers
Authors: ---
ISBN: 9783540755517 Year: 2007 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg


Digital
Financial Cryptography and Data Security : 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers
Authors: ---
ISBN: 9783642035494 Year: 2009 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Privacy enhancing technologies : 6th international workshop, PET 2006, Cambridge, UK, June 28-30, 2006 : revised selected papers
Authors: --- ---
ISBN: 9783540687900 3540687904 3540687939 Year: 2006 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Computer networks --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Information storage and retrieval. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- Information Storage and Retrieval. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval

Privacy enhancing technologies : 7th international symposium, PET 2007, Ottawa, Canada, June 20-22, 2007 : revised selected papers
Authors: --- ---
ISBN: 9783540755500 3540755500 3540755519 Year: 2007 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Computer networks --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Cryptography --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Information storage and retrieval. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- Information Storage and Retrieval. --- Computers and Society. --- Management of Computing and Information Systems. --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Informatics --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Protection --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing


Book
Financial cryptography and data security : 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009 : revised selected papers
Authors: --- ---
ISBN: 3642035485 9786612331879 1282331876 3642035493 Year: 2009 Publisher: Berlin, Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Financial Cryptography and Data Security, FC 2009, held in Accra Beach, Barbados, in February 2009. The 20 revised full papers and 1 revised short papers presented together with 1 panel report and 1 keynote address were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on economics of information security, anonymity and privacy, private computation, authentication and identification, fraud detection and auctions.

Keywords

Computer security -- Congresses. --- Data encryption (Computer science) -- Congresses. --- Electronic commerce -- Security measures -- Congresses. --- Electronic funds transfers -- Security measures -- Congresses. --- Internet -- Security measures -- Congresses. --- Computer Science --- Banking --- Finance --- Engineering & Applied Sciences --- Business & Economics --- Data encryption (Computer science) --- Electronic commerce --- Electronic funds transfers --- Security measures --- Digital cash --- Digital currency --- Digital money --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Virtual money --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Distributed processing --- Commerce --- Information superhighway --- Electronic data interchange --- Electronic benefits transfers --- Home banking services --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data


Book
Financial Cryptography and Data Security : 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers
Authors: --- ---
ISBN: 9783642035494 Year: 2009 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Financial Cryptography and Data Security, FC 2009, held in Accra Beach, Barbados, in February 2009. The 20 revised full papers and 1 revised short papers presented together with 1 panel report and 1 keynote address were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on economics of information security, anonymity and privacy, private computation, authentication and identification, fraud detection and auctions.


Book
Privacy Enhancing Technologies : 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers
Authors: --- ---
ISBN: 9783540755517 Year: 2007 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

ThePETcommunityhasgrowninsizeconsiderablysincethe?rstPETworkshop was held in 2000. With this growth came an increase in the number and quality ofsubmissions.PEThasbecomeapremiervenueforpublishing originalresearch on privacy enhancing technologies, and the current acceptance ratio puts PET in the same league as other highly selective security and privacy venues. To appropriately re?ect this evolution, the PET workshop is changing its name to the Privacy Enhancing Technologies Symposium. PET2007washeldattheUniversityofOttawa,Canada,onJune20-22,2007. Wereceived84full-paper submissions,ofwhich16wereselectedforpresentation at the symposium. PET also included a keynote address and two panel disc- sions.PETwasonceagaincollocatedwiththeIAVoSSWorkshoponTrustworthy Elections(WOTE2007),withafulldayofplenarysessions.Allparticipantswere free to attend sessions from both events. The program chairs would like to thank, ?rst of all, the authors, speakers, and panelists for their contribution to the content of the workshop. We would also like to thank the program committee for their hard work of a month of reviews and two more weeks of intense discussions, helping to ensure a program of high scienti?c quality. As well, we would like to acknowledge the contribution of the external reviewers,who assisted the programcommittee with the reviews. A special thanks is due to the designers of the Websubmission and Webreview software at K.U. Leuven for allowing us to use their software to help with the selection process, and to Thomas Herlea for his help in getting the software up and running.


Book
Privacy Enhancing Technologies : 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers
Authors: --- ---
ISBN: 9783540687931 Year: 2006 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was held at Robinson College, Cambridge (UK), on June 28-30, 2006. The workshop received91full papersubmissionsoutofwhich24wereselectedfor presentation. As a rule, papers were reviewed by 3 independent members of the Program Committee, and often alsoby externalreviewers.A further two-weeklong online discussion took place amongst the PC to reach consensus on all submissions. The ultimate responsibility for the ?nal selection of papers rests on the program chairs. The ratio of acceptance puts PET in league with other premiere computer security venues, and guarantees a high quality scienti?c program. Yet PET also retains its character as a workshop, by providing a venue where promising new ideas canbe presentedanddiscussedbythe privacy community.Identifying high quality, as well as high potential, submissions was a di?cult balancing act. The program chairs would like to thank the Program Committee of PET 2006 for their invaluable work in helping select the best submissions: - Alessandro Acquisti, Heinz School, Carnegie Mellon University, USA - Mikhail Atallah, Purdue University, USA - Michael Backes, Saarland University, Germany - Alastair Beresford, University of Cambridge, UK - Nikita Borisov, University of Illinois at Urbana-Champaign, USA - Jan Camenisch, IBM Zurich Research Laboratory, Switzerland - Kim Cameron, Microsoft, USA - Fred Cate, Indiana University at Bloomington, USA - Roger Dingledine, The Free Haven Project, USA - Hannes Federrath, University of Regensburg, Germany - Simone Fischer-Hubner ¨ , Karlstad University, Sweden - Ian Goldberg, Zero Knowledge Systems, Canada - Markus Jakobsson, Indiana University at Bloomington, USA

Listing 1 - 9 of 9
Sort by