Narrow your search

Library

KU Leuven (9)

ULB (9)

ULiège (9)

Odisee (7)

Thomas More Kempen (7)

Thomas More Mechelen (7)

UCLL (7)

VIVES (7)

UGent (2)

KBC (1)

More...

Resource type

book (9)


Language

English (9)


Year
From To Submit

2018 (1)

2016 (1)

2015 (2)

2014 (1)

2012 (1)

More...
Listing 1 - 9 of 9
Sort by

Book
Cryptography and security : from theory to applications ; essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday
Author:
ISSN: 03029743 ISBN: 3642283675 3642283683 Year: 2012 Volume: 6805 Publisher: Berlin ; Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jacques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jacques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests".

Keywords

Data encryption (Computer science) --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Systems and Data Security. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Data protection --- Security systems --- Hacking --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Communication systems --- Mathematics --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer science—Mathematics.


Book
Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings
Authors: ---
ISBN: 3319268228 3319268236 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs.

Keywords

Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Cryptology. --- Data encryption (Computer science)


Book
Information Security Theory and Practice. Securing the Internet of Things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings
Authors: ---
ISBN: 3662438259 3662438267 Year: 2014 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy.


Book
Towards hardware-intrinsic security : foundations and practice
Authors: --- ---
ISBN: 3642144519 9786613003515 3642144527 1283003511 Year: 2010 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security for RFID systems and the necessary accompanying system architectures. This book brings together contributions from researchers and practitioners in academia and industry, an interdisciplinary group with backgrounds in physics, mathematics, cryptography, coding theory and processor theory. It will serve as important background material for students and practitioners, and will stimulate much further research and development.

Keywords

Computer input-output equipment. --- Computer security. --- Cryptography. --- Computer input-output equipment --- Computer security --- Cryptography --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer Science --- Electrical Engineering --- Computer hardware --- Computer I/O equipment --- Computers --- Electronic analog computers --- Electronic digital computers --- Hardware, Computer --- I/O equipment (Computers) --- Input equipment (Computers) --- Input-output equipment (Computers) --- Output equipment (Computers) --- Input-output equipment --- Engineering. --- Computer hardware. --- Data structures (Computer science). --- Electrical engineering. --- Electronics. --- Microelectronics. --- Electronics and Microelectronics, Instrumentation. --- Data Structures, Cryptology and Information Theory. --- Computer Hardware. --- Electrical Engineering. --- Computer systems --- Data structures (Computer scienc. --- Computer engineering. --- Data Structures and Information Theory. --- Electrical engineering --- Physical sciences --- Design and construction --- Electric engineering --- Engineering --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Electronics --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Automatic computers --- Automatic data processors --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Cybernetics --- Machine theory --- Calculators --- Cyberspace


Book
Innovative Security Solutions for Information Technology and Communications : 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers
Authors: --- ---
ISBN: 3319271784 3319271792 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algorithms and Protocols, Security Technologies for IT&C, Information Security Management, Cyber Defense, and Digital Forensics. .

Keywords

Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Information storage and retrieval. --- Computer Science. --- Systems and Data Security. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Data Encryption. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Informatics --- Science --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Protection --- Security measures --- Distributed processing --- Information storage and retrieva. --- Computer software. --- Cryptology. --- Software, Computer --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Telecommunication systems --- Information technology --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Topics in Cryptology - CT-RSA 2001 : The Cryptographer's Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
Authors: ---
ISBN: 3540418989 9783540418986 3540453539 Year: 2001 Volume: 2020 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

You are holding the rst in a hopefully long and successful series of RSA Cr- tographers’ Track proceedings. The Cryptographers’ Track (CT-RSA) is one of the many parallel tracks of the yearly RSA Conference. Other sessions deal with government projects, law and policy issues, freedom and privacy news, analysts’ opinions, standards, ASPs, biotech and healthcare, nance, telecom and wireless security, developers, new products, implementers, threats, RSA products, VPNs, as well as cryp- graphy and enterprise tutorials. RSA Conference 2001 is expected to continue the tradition and remain the largest computer security event ever staged: 250 vendors, 10,000 visitors and 3,000 class-going attendees are expected in San Francisco next year. I am very grateful to the 22 members of the program committee for their hard work. The program committee received 65 submissions (one of which was later withdrawn) for which review was conducted electronically; almost all papers had at least two reviews although most had three or more. Eventually, we accepted the 33 papers that appear in these proceedings. Revisions were not checked on their scienti c aspects and some authors will write nal versions of their papers for publication in refereed journals. As is usual, authors bear full scienti c and paternity responsibilities for the contents of their papers.

Keywords

Computer security --- Cryptography --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Mathematics of Computing. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Mathematics. --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Operating systems --- Computer science—Mathematics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Communication systems --- Distributed processing --- Foundations --- Computer security - Congresses --- Cryptography - Congresses --- Data encryption (Computer science) --- Operating systems (Computers) --- Computer networks.


Book
The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday
Authors: --- ---
ISBN: 3662493004 3662493012 Year: 2016 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn’s 80th birthday. The title of this books leans on the title of a serious history of cryptology named “The Codebreakers”, written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology – past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols. .

Public Key Cryptography : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12–14, 2002 Proceedings
Authors: --- ---
ISBN: 3540431683 3540456643 Year: 2002 Volume: 2274 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Cryptographie à clé publique --- Congresses --- Access control --- Congresses. --- Congrès --- Accès --- Contrôle --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Cryptographie à clé publique --- Congrès --- Accès --- Contrôle --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Cryptography --- Computer software. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Software, Computer --- Computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Distributed processing --- Foundations --- Computer networks.


Book
Information and Communications Security : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 3030019500 3030019497 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

Listing 1 - 9 of 9
Sort by