Narrow your search

Library

KU Leuven (20)

LUCA School of Arts (20)

Odisee (20)

Thomas More Kempen (20)

Thomas More Mechelen (20)

UCLL (20)

VIVES (20)

Vlaams Parlement (20)

FARO (16)

ULB (7)

More...

Resource type

book (16)

periodical (4)


Language

English (19)

German (1)


Year
From To Submit

2022 (6)

2021 (3)

2020 (5)

2019 (1)

2018 (1)

More...
Listing 1 - 10 of 20 << page
of 2
>>
Sort by

Periodical
High-Confidence Computing
ISSN: 26672952 Publisher: Netherlands Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Building-blocks of a data protection revolution : the uneasy case for blockchain technology to secure privacy and identity
Author:
ISBN: 3845294027 3848752220 Year: 2018 Publisher: Nomos Verlagsgesellschaft mbH & Co. KG

Loading...
Export citation

Choose an application

Bookmark

Abstract

The General Data Protection Regulation (GDPR) replaced the old and battered Data Protection Directive on 25 May 2018 after a long-drawn reform. The rapidly evolving technological landscape will test the ability of the GDPR to effectively achieve the goals of protecting personal data and the free movement of data. This book proposes a technological supplement to achieve the goal of data protection as enshrined in the GDPR. The proposal comes in the form of digital identity management platforms built on blockchain technology. However, the very structure of blockchain poses some significant challenges in terms of compatibility with the GDPR. Accordingly, the claim of GDPR being a technologically neutral legislation is examined. The compatibility of a blockchain-based solution is scrutinised on the parameters of data protection principles like accountability, data minimisation, control and data protection by design in conjunction with the right to be forgotten and right to data portability.


Book
Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields
Authors: --- ---
ISBN: 9811536546 9811536538 Year: 2020 Publisher: Singapore Springer Nature

Loading...
Export citation

Choose an application

Bookmark

Abstract

This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.


Book
Symmetry in Graph Theory
Author:
Year: 2019 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book contains the successful invited submissions to a Special Issue of Symmetry on the subject of ""Graph Theory"". Although symmetry has always played an important role in Graph Theory, in recent years, this role has increased significantly in several branches of this field, including but not limited to Gromov hyperbolic graphs, the metric dimension of graphs, domination theory, and topological indices. This Special Issue includes contributions addressing new results on these topics, both from a theoretical and an applied point of view.


Periodical
IET biometrics.
Author:
ISSN: 20474938 20474946 Year: 2012 Publisher: Stevenage, UK : [Hoboken N.J.] : Institution of Engineering and Technology, John Wiley & Sons Inc. [on behalf of The Institution of Engineering and Technology]


Book
Cyber Security and Critical Infrastructures
Authors: --- ---
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues.


Book
Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods
Author:
ISBN: 3036553940 3036553932 Year: 2022 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Special Issue is a book composed by collecting documents published through peer review on the research of various advanced technologies related to applications and theories of signal processing for multimedia systems using ML or advanced methods. Multimedia signals include image, video, audio, character recognition and optimization of communication channels for networks. The specific contents included in this book are data hiding, encryption, object detection, image classification, and character recognition. Academics and colleagues who are interested in these topics will find it interesting to read.


Book
Distances and Domination in Graphs
Author:
Year: 2020 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents a compendium of the 10 articles published in the recent Special Issue “Distance and Domination in Graphs”. The works appearing herein deal with several topics on graph theory that relate to the metric and dominating properties of graphs. The topics of the gathered publications deal with some new open lines of investigations that cover not only graphs, but also digraphs. Different variations in dominating sets or resolving sets are appearing, and a review on some networks’ curvatures is also present.


Book
Trustworthiness in Mobile Cyber Physical Systems
Authors: --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.

Listing 1 - 10 of 20 << page
of 2
>>
Sort by