Listing 1 - 4 of 4 |
Sort by
|
Choose an application
"For professionals looking to fully understand and effectively implement identity-based encryption (IBE) technology, this authoritative resource is a smart choice. Until now, details on IBE could only be found scattered throughout journal articles and conference proceedings. This unique volume offers complete, easy-to-understand guidance."--Jacket.
Data encryption (Computer science) --- Public key cryptography. --- Public key infrastructure (Computer security) --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer security --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Cryptography --- Data encoding (Computer science) --- Encryption of data (Computer science)
Choose an application
This volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, Austria. The aim of the conference was to create a joint scienti?c and networking platform covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international research groups and projects in closely related ?elds. The organizers received 43 submissions from 17 countries. Each of the s- mittedpaperswasreviewedbythreereviewers.Basedonthesereviews13papers were selected as suitable for the conference and the authors were asked to p- sent their work. Further, six renowned speakers from academia, industry and the European Commission were invited for keynotes. The accepted papers are published in this volume together with one paper from Paul England, one of the invited speakers at TRUST 2008. TheconferencewassupportedbytheEuropeanCommissionviatheOpen-TC project (FP6 IST-027635), by the Austrian Research Promotion Agency (FFG) and by the city of Villach.
Computer security --- Data encryption (Computer science) --- Public key infrastructure (Computer security) --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer security. --- Computer Communication Networks. --- Software engineering. --- Data encryption (Computer science). --- Computer science. --- Systems and Data Security. --- Software Engineering. --- Cryptology. --- Information Systems Applications (incl. Internet). --- User Interfaces and Human Computer Interaction. --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer software engineering --- Engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer communication systems. --- Application software. --- User interfaces (Computer systems). --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Privacy in Digital Business, TrustBus 2008, held in Turin, Italy, in September 2008 in conjunction with DEXA 2008. The 18 revised full papers presented together with 1 invited keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on trust, authentication, authorization and access control, reputation systems, security policies and identity management, intrusion detection and applications of game theory to IT security problems, and privacy.
Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Computer security --- Security measures --- Computer networks --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Data communication systems --- Transmission of data --- Digital communications --- Electronic data processing --- Electronic systems --- Information theory --- Telecommunication systems --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer science. --- Information Systems. --- Data encryption (Computer science). --- Computer Communication Networks. --- Computer security. --- Information technology. --- Computers and Society. --- Management of Computing and Information Systems. --- Cryptology. --- Systems and Data Security. --- IT in Business. --- Informatics --- Science --- IT (Information technology) --- Technology --- Telematics --- Knowledge management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Protection --- Computers and civilization. --- Management information systems. --- Computer communication systems. --- Business—Data processing. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Distributed processing --- Communication systems
Choose an application
This book constitutes the refereed proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008, held in Trondheim, Norway, in June 2008. The 15 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 37 submissions. Ranging from theoretical and foundational topics to applications and regulatory issues in various contexts, the papers focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services.
Public key infrastructure (Computer security) --- Public key cryptography --- Data encryption (Computer science) --- Computer networks --- Infrastructure à clé publique (Sécurité informatique) --- Cryptographie à clé publique --- Chiffrement (Informatique) --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer science. --- Computer programming. --- Data encryption (Computer science). --- Algorithms. --- Information storage and retrieval. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Programming Techniques. --- Algorithm Analysis and Problem Complexity. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Informatics --- Science --- Foundations --- Programming --- Computer software. --- Information storage and retrieva. --- Cryptology. --- Software, Computer --- Computer systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Listing 1 - 4 of 4 |
Sort by
|