Narrow your search

Library

KU Leuven (7)

Odisee (7)

Thomas More Kempen (7)

Thomas More Mechelen (7)

UCLL (7)

ULB (7)

ULiège (7)

VIVES (7)


Resource type

book (7)


Language

English (7)


Year
From To Submit

2008 (2)

2007 (2)

2006 (2)

2005 (1)

Listing 1 - 7 of 7
Sort by
Public key cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings
Authors: ---
ISBN: 9783540224547 3540244549 3540305807 Year: 2005 Volume: 3386 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Cryptographie à clé publique --- Congresses --- Access control --- Congrès --- Accès --- Contrôle --- Engineering & Applied Sciences --- Computer Science --- Sécurité informatique --- Cryptographie à clé publique --- Congrès --- Accès --- Contrôle --- EPUB-LIV-FT SPRINGER-B --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems

Public key cryptography - pkc 2007 : 10th international conference on practice and theory in public-key cryptography, beijing, china, april 16-20, 2007, proceedings
Authors: --- --- ---
ISBN: 9783540716761 3540716769 9786610949151 1280949155 3540716777 Year: 2007 Volume: 4450 Publisher: Berlin, Germany : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Cryptographie à clé publique --- Congresses --- Access control --- Congresses. --- Congrès --- Accès --- Contrôle --- Computer security -- Congresses. --- Computers -- Access control -- Congresses. --- Data encryption (Computer science) -- Congresses. --- Electronic books. -- local. --- Public key cryptography -- Congresses. --- Public-key cryptography --- Engineering & Applied Sciences --- Computer Science --- Sécurité informatique --- Cryptographie à clé publique --- Congrès --- Accès --- Contrôle --- EPUB-LIV-FT SPRINGER-B --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer engineering. --- Computer Science. --- Data Encryption. --- Computer Engineering. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Design and construction --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems

Public key cryptography, PKC 2006 : 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006 : proceedings
Authors: ---
ISBN: 9783540338512 3540338519 3540338527 Year: 2006 Volume: 3958 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 9th International Conference on Theory and Practice of Public-Key Cr- tography(PKC 2006) took place in New York City. PKC is the premier inter- tional conference dedicated to cryptology focusing on all aspects of public-key cryptography. The event is sponsored by the International Association of Cr- tologic Research (IACR), and this year it was also sponsored by the Columbia University Computer Science Department as well as a number of sponsors from industry, among them: EADS and Morgan Stanley, which were golden sponsors, as well as Gemplus, NTT DoCoMo, Google, Microsoft and RSA Security, which were silver sponsors. We acknowledge the generous support of our industrial sponsors; their support was a major contributing factor to the success of this year’s PKC. PKC 2006 followed a series of very successful conferences that started in 1998in Yokohama,Japan.Further meetingswereheld successivelyinKamakura (Japan), Melbourne (Australia), Jeju Island (Korea), Paris (France), Miami (USA), Singapore and Les Diablerets (Switzerland). The conference became an IACR sponsored event (o?cially designated as an IACR workshop) in 2003 and has been sponsored by IACR continuously since then. The year 2006 found us all in New York City where the undertone of the conference was hummed in the relentless rhythm of the city that never sleeps.

Keywords

Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Cryptographie à clé publique --- Congresses --- Access control --- Congrès --- Accès --- Contrôle --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Cryptographie à clé publique --- Congrès --- Accès --- Contrôle --- EPUB-LIV-FT SPRINGER-B --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems --- Cryptography. --- Computer networks. --- Electronic data processing—Management. --- IT Operations. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers

Public key infrastructure : third European PKI workshop : theory and practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006 : proceedings
Authors: --- ---
ISBN: 9783540351511 3540351515 3540351523 Year: 2006 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Today, PKIs have come of age and they support the security of several large networked systems, such as company-wide document management systems,- governmentapplicationsandsecureVPN.However,despitethissuccess,the?eld has not yet reachedits full scienti?c maturity and there is still room for research in this area. For example, open issues exist in the e?cient management of large PKI (especially with respect to certi?cate validation), better performance could be attained by improved cryptographic techniques and innovative applications are continuously proposed. To discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives in Asia and the USA. The ?rst two events of this series took place on the Island of Samos, Greece (EuroPKI 2004), and in Canterbury, UK (EuroPKI 2005). This book contains the proceedings of the Third European PKI Workshop (EuroPKI 2006), held at the Politecnico di Torino, Italy, on June 19-20, 2006. In response to the Call for Papers, about 50 submissions were received. All submissions werereviewed by at least two reviewers(external or members of the Program Committee) and most of them got three reviews. At the end of this process, 22 papers were selected, 18 in their full form and 4 as short papers. These papers led to a lively workshop, with a good mixture between theory and application, continuing the success of the previous workshops in the series.

Keywords

Public key cryptography --- Data encryption (Computer science) --- Computer security --- Computer networks --- Cryptographie à clé publique --- Chiffrement (Informatique) --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Public key infrastructure (Computer security) --- Computer Science --- Engineering & Applied Sciences --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Information storage and retrieval. --- Computers and civilization. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Distributed processing --- Computer software. --- Information storage and retrieva. --- Cryptology. --- Software, Computer --- Computer systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Public key infrastructure : 4th European PKI Workshop : theory and practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, proceedings
Authors: --- --- ---
ISBN: 9783540734079 3540734074 9786610970131 1280970138 3540734082 Year: 2007 Publisher: Berlin ; Heidelberg ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held in Palma de Mallorca, Spain, during June 28–30, and hosted by the Computer Science Department of the University of Balearic Islands (UIB) with the support of the Balearic Islands Government and the Private Law Department at UIB. This year’s event was the fourth event in the EuroPKI Workshops series. Previous events of the series were held in: Samos, Greece (2004); Kent, UK (2005); and Turin, Italy, (2006). In response to the call for papers, 77 papers were submitted to this year’s workshop, setting a record of the highest number of papers submitted to an EuroPKI event so far and confirming an increased interest in PKI research and in the EuroPKI event. Each paper was reviewed by three members of the Program Committee, and evaluated on the basis of its significance, novelty, technical quality and relevance to the workshop. The paper selection process was very competitive: of the papers submitted, only 21 full papers and 8 short papers were selected for presentation at the workshop and inclusion in this volume.

Keywords

Public key infrastructure (Computer security) --- Public key cryptography --- Data encryption (Computer science) --- Computer networks --- Infrastructure à clé publique (Sécurité informatique) --- Cryptographie à clé publique --- Chiffrement (Informatique) --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer science. --- Data encryption (Computer science). --- Algorithms. --- Information storage and retrieval. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Informatics --- Science --- Communication systems --- Foundations --- Computer software. --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Public key infrastructure : 5th European PKI workshop : theory and practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008 : proceedings
Authors: --- --- ---
ISBN: 9783540694847 3540694846 3540694854 Year: 2008 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008, held in Trondheim, Norway, in June 2008. The 15 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 37 submissions. Ranging from theoretical and foundational topics to applications and regulatory issues in various contexts, the papers focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services.

Keywords

Public key infrastructure (Computer security) --- Public key cryptography --- Data encryption (Computer science) --- Computer networks --- Infrastructure à clé publique (Sécurité informatique) --- Cryptographie à clé publique --- Chiffrement (Informatique) --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer science. --- Computer programming. --- Data encryption (Computer science). --- Algorithms. --- Information storage and retrieval. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Programming Techniques. --- Algorithm Analysis and Problem Complexity. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Informatics --- Science --- Foundations --- Programming --- Computer software. --- Information storage and retrieva. --- Cryptology. --- Software, Computer --- Computer systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Public key cryptography - PKC 2008 : 11th International Workshop on Practice and Theory in Public Key Cryptography, Barcelona, Spain, March 9-12, 2008 : proceedings
Authors: ---
ISBN: 9783540784395 354078439X 3540784403 Year: 2008 Publisher: Berlin, Heidelberg : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 11th International Workshop on Practice and Theory in Public-Key Cryptography, PKC 2008, held in Barcelona, Spain, in March 2008. The 21 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, digital signatures, identification, broadcast and key agreement, implementation of fast arithmetic, and public key encryption.

Keywords

Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Cryptographie à clé publique --- Congresses. --- Access control --- Congrès --- Accès --- Contrôle --- Computer Science --- Engineering & Applied Sciences --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer

Listing 1 - 7 of 7
Sort by