Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20–23. The call for papers went out with the challenging motto of “Security & Privacy Silver Linings in the Cloud” building a bridge between the long standing issues of security and privacy and the most recent developments in information and commu- cation technology. It attracted 102 submissions. All of them were evaluated on the basis of their significance, novelty, and technical quality by at least five member of the Program Committee. The Program Committee meeting was held electronically over a period of a week. Of the papers submitted, 25 were selected for presentation at the conference; the acceptance rate was therefore as low as 24. 5% making SEC 2010 a highly competitive forum. One of those 25 submissions could unfortunately not be included in the proceedings, as none of its authors registered in time to present the paper at the conference.
Information technology --- Database security --- Computers --- Computer security --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer Science --- Telecommunications --- Security measures --- Access control --- Information Technology --- Computer Science (Hardware & Networks) --- Computer networks --- Data encryption (Computer science) --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Data Encryption. --- Computers and Society. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Foundations --- Distributed processing --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Data protection. --- Computer networks. --- Cryptography. --- Data and Information Security. --- IT Operations. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data
Choose an application
Impedance Spectroscopy is a powerful measurement method used in many application fields such as electrochemistry, material science, biology and medicine, semiconductor industry and sensors.This book covers new advances in the field of impedance spectroscopy including fundamentals, methods and applications by contributions from international scientists. This book reports about new advances and different approaches in dealing with impedance spectroscopy including theory, methods and applications. Impedance spectroscopy is a widely used and interesting measurement method applied in many fields of science and technology such as electro chemistry, material science, biology and medicine. In spite of the apparently different scientific and application background in these fields, they share the same measurement method in a system identification approach and profit from the possibility to use complex impedance over a wide frequency range and giving interesting opportunities for separating effects, for accurate measurements and for simultaneous measurements of different and even non-accessible quantities. For Electrochemical Impedance Spectroscopy (EIS) competency from several fields of science and technology is indispensable. Understanding electro chemical and physical phenomena is necessary for developing suitable models. Suitable measurement procedures should be developed taking specific requirements of the considered application into account. Signal processing methods are very important for extracting target information by suitable mathematical methods and algorithms. New trends are emerging rapidly involving special techniques for realizing fully automatic embedded solutions at low costs and requiring a deep overview of modern information technology.
Listing 1 - 8 of 8 |
Sort by
|