Narrow your search

Library

KU Leuven (20)

ULiège (16)

Odisee (14)

Thomas More Kempen (14)

Thomas More Mechelen (14)

UCLL (14)

VIVES (14)

VUB (13)

ULB (12)

UGent (10)

More...

Resource type

book (35)

digital (4)


Language

English (35)


Year
From To Submit

2021 (3)

2020 (2)

2019 (6)

2018 (4)

2017 (1)

More...
Listing 1 - 10 of 35 << page
of 4
>>
Sort by

Book
Information Security Practice and Experience : 16th International Conference, ISPEC 2021, Nanjing, China, December 17–19, 2021, Proceedings
Author:
ISBN: 3030932060 3030932052 Year: 2021 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 16th International Conference on Information Security Practice and Experience, ISPEC 2021, held in Nanjing, China, in December 2021. The 23 full papers presented in this volume were carefully reviewed and selected from 94 submissions. The conference focus on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.


Book
Information security practice and experience : first International Conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
Authors: ---
Year: 2005 Publisher: Berlin : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.


Book
Information security practice and experience : first International Conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
Authors: ---
Year: 2005 Publisher: Berlin : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.


Book
Information security practice and experience : first International Conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
Authors: ---
Year: 2005 Publisher: Berlin : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.


Book
Information Security Practice and Experience : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings
Authors: ---
ISBN: 3642380328 3642380336 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks.


Book
Handbook of blockchain, digital finance, and inclusion.
Authors: ---
ISBN: 9780128104422 0128104422 0128104414 9780128104415 1787850234 9780128123003 0128123001 9780128122839 0128122838 Year: 2018 Publisher: London, England : Academic Press,


Book
Handbook of blockchain, digital finance, and inclusion.
Authors: ---
ISBN: 0128122994 012812282X 1787850242 9780128122990 9780128122822 Year: 2018 Publisher: London, England : Academic Press,


Multi
Handbook of blockchain, digital finance, and inclusion.
Authors: ---
ISBN: 9780128122990 0128122994 9780128122822 012812282X 1787850242 Year: 2018 Publisher: London, England : Academic Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Handbook of blockchain, digital finance, and inclusion.
Authors: ---
ISBN: 9780128104422 0128104422 9780128123003 0128123001 9780128104415 0128104414 9780128122839 0128122838 1787850234 Year: 2018 Publisher: London, England : Academic Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Handbook of Blockchain, Digital Finance, and Inclusion, Volume 1: Cryptocurrency, FinTech, InsurTech, and Regulation explores recent advances in digital banking and cryptocurrency, emphasizing mobile technology and evolving uses of cryptocurrencies as financial assets. Contributors go beyond summaries of standard models to describe new banking business models that will be sustainable and will likely dictate the future of finance. The volume not only emphasizes the financial opportunities made possible by digital banking, such as financial inclusion and impact investing, but it also looks at engineering theories and developments that encourage innovation. Its ability to illuminate present potential and future possibilities make it a unique contribution to the literature. Explores recent advances in digital banking and cryptocurrency, emphasizing mobile technology and evolving uses of cryptocurrencies as financial assets Explains the practical consequences of both technologies and economics to readers who want to learn about subjects related to their specialties Encompasses alternative finance, financial inclusion, impact investing, decentralized consensus ledger and applied cryptography Provides the only advanced methodical summary of these subjects available today.


Book
Leakage Resilient Password Systems
Authors: --- ---
ISBN: 9783319175034 3319175025 9783319175027 3319175033 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP systems. Quantitative analysis proves that a secure LRP system in practical settings imposes a considerable amount of cognitive workload unless certain secure channels are involved. The book introduces a secure and practical LRP system, named Cover Pad, for password entry on touch-screen mobile devices. Cover Pad leverages a temporary secure channel between a user and a touch screen which can be easily realized by placing a hand shielding gesture on the touch screen. The temporary secure channel is used to deliver a hidden message to the user for transforming each password symbol before entering it on the touch screen. A user study shows the impact of these testing conditions on the users' performance in practice. Finally, this book introduces a new LRP system named ShadowKey. Shadow Key is designed to achieve better usability for leakage resilient password entry. It leverages either a permanent secure channel, which naturally exists between a user and the display unit of certain mobile devices, or a temporary secure channel, which can be easily realized between a user and a touch screen with a hand-shielding gesture. The secure channel protects the mappings between original password symbols and associated random symbols. Unlike previous LRP system users, Shadow Key users do not need to remember anything except their passwords. Leakage Resilient Password Systems is designed for professionals working in the security industry. Advanced-level students studying computer science and electrical engineering will find this brief full of useful material.

Keywords

Computer Science. --- Systems and Data Security. --- Information Systems and Communication Service. --- Communications Engineering, Networks. --- Data Encryption. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Information systems. --- Telecommunication. --- Informatique --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Télécommunications --- Data encryption (Computer scienc. --- Engineering & Applied Sciences --- Computer Science --- Information storage and retrieval systems --- Systèmes d'information --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computers. --- Electrical engineering. --- Data protection --- Security systems --- Hacking --- Electric engineering --- Engineering --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Informatics --- Science --- Cryptology. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Data encryption (Computer science)

Listing 1 - 10 of 35 << page
of 4
>>
Sort by