Narrow your search

Library

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

UCLL (5)

ULB (5)

VIVES (5)

KU Leuven (4)

ULiège (4)

LUCA School of Arts (2)

UGent (2)

More...

Resource type

book (5)


Language

English (5)


Year
From To Submit

2021 (1)

2016 (2)

2011 (1)

2010 (1)

Listing 1 - 5 of 5
Sort by

Book
Firewall design and analysis
Author:
ISBN: 1283143658 9786613143655 9814261661 9789814261661 9789814261654 9814261653 Year: 2011 Publisher: Singapore Hackensack, NJ World Scientific

Loading...
Export citation

Choose an application

Bookmark

Abstract

This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as


Book
Algorithms for data and computation privacy
Authors: ---
ISBN: 3030588963 3030588955 Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook–Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.


Book
Cloud Computing and Security : Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II
Authors: --- --- ---
ISBN: 331948673X 3319486748 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.


Book
Hardware based packet classification for high speed Internet routers
Authors: --- ---
ISBN: 148999954X 1441966994 9786612981845 1282981846 1441967001 Year: 2010 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Packet classification is the core component of routers, firewalls and other networking devices that enables many networking services such as packet filtering and traffic accounting. Using Ternary Content Addressable Memories (TCAMs) to perform high-speed packet classification has become the standard in industry today. While we can expect some gain in TCAM performance from improved hardware, the demands on TCAM performance (measured by the number of rules in packet classifiers) increase far more rapidly due to the explosive growth of internet services and threats. Hardware Based Packet Classification for High Speed Internet Routers presents the most recent developments in hardware based packet classification algorithms and architectures. This book describes five methods which reduce the space that classifiers occupy within TCAMs; TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. These methods demonstrate that in most cases a substantial reduction of space is achieved. Case studies and examples are provided throughout this book. About this book: • Presents the only book in the market that exclusively covers hardware based packet classification algorithms and architectures. • Describes five methods which reduce the space that classifiers occupy within TCAMs: TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. • Provides case studies and examples throughout. Hardware Based Packet Classification for High Speed Internet Routers is designed for professionals and researchers who work within the related field of router design. Advanced-level students concentrating on computer science and electrical engineering will also find this book valuable as a text or reference book.

Keywords

Computer network protocols. --- Computer networks. --- Packet switching (Data transmission). --- Routers (Computer networks) --- Packet switching (Data transmission) --- Computer network protocols --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Electrical Engineering --- Network routers --- Engineering. --- Computer hardware. --- Computer memory systems. --- Computer communication systems. --- Special purpose computers. --- Electrical engineering. --- Communications Engineering, Networks. --- Computer Communication Networks. --- Signal, Image and Speech Processing. --- Computer Hardware. --- Memory Structures. --- Special Purpose and Application-Based Systems. --- Routing (Computer network management) --- Equipment and supplies --- Telecommunication. --- Memory management (Computer scie. --- Software engineering. --- Computer software engineering --- Engineering --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- Signal processing. --- Image processing. --- Speech processing systems. --- Special purpose computers --- Computers --- Computer memory systems --- Electronic digital computers --- Storage devices, Computer --- Computer input-output equipment --- Memory management (Computer science) --- Computational linguistics --- Electronic systems --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Information networks --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Electric engineering --- Memory systems --- Storage devices --- Distributed processing


Book
Cloud Computing and Security : Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I
Authors: --- --- ---
ISBN: 3319486705 3319486713 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.

Keywords

Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Data Encryption. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Civilization and computers --- Algorism --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Sociotechnical systems --- Information resources management --- Management --- Civilization --- Algebra --- Arithmetic --- Computer security --- Cryptography --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems --- Cloud computing --- Computer networks. --- Security measures --- Web services --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Listing 1 - 5 of 5
Sort by