Listing 1 - 10 of 17 | << page >> |
Sort by
|
Choose an application
Mathematical statistics --- Production management --- Computer science --- Information systems --- patroonherkenning --- betrouwbaarheid --- ICT (informatie- en communicatietechnieken) --- factoranalyse --- DES (data encryption standard) --- cryptologie --- informatica --- informatiesystemen --- programmatielogica
Choose an application
Complex analysis --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- MIS (management informatie systeem) --- cryptografie --- complexe analyse (wiskunde) --- computers --- informatica --- maatschappij --- algoritmen --- informatica management --- computernetwerken --- computerkunde --- interfaces
Choose an application
Choose an application
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.
Applied marketing --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- e-business --- e-commerce --- software engineering --- computerbeveiliging --- informatica management
Choose an application
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.
Mathematical control systems --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- toegepaste informatica --- DES (data encryption standard) --- cloud computing --- computers --- informatica --- informatiesystemen --- computerbeveiliging --- informatica management --- computerkunde --- informatietheorie
Choose an application
This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks.
Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- cryptografie --- computers --- informatica --- maatschappij --- informatiesystemen --- computerbeveiliging --- computercriminaliteit --- computerkunde
Choose an application
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information. Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need and opportunity to develop a coherent set of techniques to cope with the changing nature of the upcoming cyber-security challenges. These include evolving threats and new technological means to exploit vulnerabilities of cyber-physical systems that have direct socio-technical, societal and economic consequences for Europe and the world. We witness cyber-attacks on large scale infrastructures for energy, transport, healthcare systems and smart systems. The interplay between security and safety issues is now paramount and will be even more relevant in the future. The book collects contributions from a number of scientists in Europe and presents the results of several European Projects, as NeCS, SPARTA, E-CORRIDOR and C3ISP. It will be of value to industrial researchers, practitioners and engineers developing cyber-physical solutions, as well as academics and students in cyber-security, ICT, and smart technologies in general. .
Criminal law. Criminal procedure --- Business policy --- Production management --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- bedrijfseconomie --- veiligheid (mensen) --- computerbeveiliging --- informatica management --- computercriminaliteit
Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- IR (information retrieval) --- DES (data encryption standard) --- informatica --- maatschappij --- informatica management --- OS (operating system) --- computernetwerken
Choose an application
Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- IR (information retrieval) --- DES (data encryption standard) --- informatica --- maatschappij --- informatica management --- OS (operating system) --- computernetwerken
Listing 1 - 10 of 17 | << page >> |
Sort by
|