Listing 1 - 7 of 7 |
Sort by
|
Choose an application
This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn’s 80th birthday. The title of this books leans on the title of a serious history of cryptology named “The Codebreakers”, written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology – past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols. .
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019. The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in topical sections named as follows: Part I: machine learning; information leakage; signatures and re-encryption; side channels; formal modelling and verification; attacks; secure protocols; useful tools; blockchain and smart contracts. Part II: software security; cryptographic protocols; security models; searchable encryption; privacy; key exchange protocols; and web security.
Computer security. --- Computer network architectures. --- Computer science. --- Artificial intelligence. --- Software engineering. --- Systems and Data Security. --- Computer Systems Organization and Communication Networks. --- Computing Milieux. --- Artificial Intelligence. --- Information Systems Applications (incl. Internet). --- Software Engineering. --- Computer software engineering --- Engineering --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Informatics --- Science --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer security --- Computer organization. --- Computers. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Calculators --- Cyberspace --- Organization, Computer
Choose an application
The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019. The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in topical sections named as follows: Part I: machine learning; information leakage; signatures and re-encryption; side channels; formal modelling and verification; attacks; secure protocols; useful tools; blockchain and smart contracts. Part II: software security; cryptographic protocols; security models; searchable encryption; privacy; key exchange protocols; and web security.
Computer security. --- Computer network architectures. --- Computer science. --- Artificial intelligence. --- Software engineering. --- Systems and Data Security. --- Computer Systems Organization and Communication Networks. --- Computing Milieux. --- Artificial Intelligence. --- Information Systems Applications (incl. Internet). --- Software Engineering/Programming and Operating Systems. --- Computer software engineering --- Engineering --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Informatics --- Science --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer organization. --- Computers. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Calculators --- Cyberspace --- Organization, Computer
Choose an application
This book constitutes the refereed proceedings of three workshops held at the 20th International Conference on Financial Cryptography and Data Security, FC 2016, in Christ Church, Barbados, in February 2016. The 22 full papers presented were carefully reviewed and selected from 49 submissions. They feature the outcome of the Second Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, the First Workshop on Secure Voting Systems, VOTING 2016, and the 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Application software. --- Computers and civilization. --- Management information systems. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- e-Commerce/e-business. --- Computer Appl. in Administrative Data Processing. --- Computers and Society. --- Management of Computing and Information Systems. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Civilization and computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Commerce --- Information superhighway --- Sociotechnical systems --- Information resources management --- Management --- Civilization --- Computer software --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Communication systems --- Information systems. --- Information Systems. --- Cryptology. --- Data encryption (Computer science)
Choose an application
This book constitutes the thoroughly refereed conference proceedings of the First International Joint Conference on Electronic Voting, E-Vote-ID 2016, held in Bregenz, Austria, in October 2016. The 14 full papers presented were carefully reviewed and selected from 57 submissions. They represent a wide range of technological proposals for different voting settings (be it in polling stations, remote voting or even mobile voting) and case studies from different countries already using electronic voting or having conducted first trial elections.
Computer science. --- Computer communication systems. --- Special purpose computers. --- Computer security. --- Data encryption (Computer science). --- Application software. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Computer Appl. in Administrative Data Processing. --- Computers and Society. --- Civilization and computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Civilization --- Computer software --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Distributed processing --- Software engineering. --- Information systems. --- Cryptology. --- Computer software engineering --- Engineering --- Electronic voting --- E-voting --- eVoting --- Voting
Choose an application
This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017. The 39 full papers presented were carefully reviewed and selected from 96 submissions. They feature the outcome of the 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, the 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, the Second Workshop on Secure Voting Systems, VOTING 2017, the First Workshop on Trusted Smart Contracts, WTSC 2017, and the First Workshop on Targeted Attacks, TA 2017. The papers are grouped in topical sections named: encrypted computing and applied homomorphic cryptography; bitcoin and blockchain research; advances in secure electronic voting schemes; trusted smart contracts; targeted attacks.
Computer science. --- Computer organization. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Information Systems and Communication Service. --- Computing Milieux. --- Computer Systems Organization and Communication Networks. --- Computing Methodologies. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Organization, Computer --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Information systems. --- Computer network architectures. --- Artificial intelligence. --- Cryptology. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data encryption (Computer science)
Choose an application
This open access book constitutes the proceedings of the 8th International Joint Conference on Electronic Voting held in Luxemburg in October 2023. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others. The 9 full papers presented were carefully reviewed and selected from 38 submissions. The selected papers cover a wide range of topics connected with electronic voting, including experiences and revisions of the actual uses of E-voting systems and corresponding processes in elections.
Cryptography. --- Data encryption (Computer science). --- Application software. --- Artificial intelligence. --- Computer networks --- Data protection. --- Computer networks. --- Cryptology. --- Computer and Information Systems Applications. --- Artificial Intelligence. --- Mobile and Network Security. --- Data and Information Security. --- Computer Communication Networks. --- Security measures.
Listing 1 - 7 of 7 |
Sort by
|