Narrow your search

Library

ULB (2)

AP (1)

EhB (1)

KDG (1)

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULiège (1)

More...

Resource type

book (3)

digital (1)


Language

English (3)

German (1)


Year
From To Submit

2012 (4)

Listing 1 - 4 of 4
Sort by

Book
Internet Privacy : eine multidisziplinare Bestandsaufnahme = a multidisciplinary analysis
Author:
ISBN: 129930432X 3642319432 Year: 2012 Publisher: Berlin : Acatech,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Das Internet ist eine der bedeutendsten technologischen Errungenschaften der Geschichte. Es erlaubt Menschen in aller Welt Zugang zu umfassenden Informationen, unterstützt die weltweite Kommunikation und Vernetzung und fungiert als globaler Marktplatz. Dabei bieten die vielfältigen Angebote im Internet jedoch nicht nur Chancen; sie werfen auch Fragen des Datenschutzes, der Persönlichkeitsentfaltung und der Privatsphäre auf. Dieses Phänomen wird gemeinhin als das Privatheitsparadoxon bezeichnet. Aufgrund der großen Bedeutung von Privatheit im Internet hat acatech 2011 ein Projekt initiiert, das sich mit dem Privatheitsparadoxon wissenschaftlich auseinandersetzt. Dieser Band ist der erste Teil einer acatech STUDIE zum Projekt „Internet Privacy – Eine Kultur der Privatsphäre und des Vertrauens im Internet“. Die Autoren leisten eine Bestandsaufnahme der existierenden individuellen und gesellschaftlichen Vorstellungen von Privatsphäre im Internet sowie der entsprechenden rechtlichen, technischen, ökonomischen und ethischen Rahmenbedingungen. The development of the Internet is one of the most significant technological advances in history. It allows people around the world access to comprehensive information, supports worldwide communication and interaction and functions as a global marketplace. While users appreciate the services offered by the internet, they are also worried about their privacy. This is sometimes referred to as the privacy paradox of the Internet. In 2011 acatech launched a project that is developing recommendations for the creation of a culture of privacy and trust that will be able to resolve this paradox. This multidisciplinary analysis presents the desires and fears of users and society regarding Internet privacy as well as these sentiments’ ethical, economic, technical and legal frameworks. This publication is the first of two volumes, revealing the findings of the project “Internet Privacy – A Culture of Privacy and Trust on the Internet”.


Digital
Public Key Cryptography – PKC 2012 : 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings
Authors: --- ---
ISBN: 9783642300578 Year: 2012 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Book
Public Key Cryptography - PKC 2012 : 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings
Authors: --- --- ---
ISBN: 9783642300578 Year: 2012 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the folllowing topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.


Book
Public key cryptography-- PKC 2012 : 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings
Authors: --- --- ---
ISSN: 03029743 ISBN: 3642300561 364230057X Year: 2012 Volume: 7293 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

Keywords

Public key cryptography --- Data encryption (Computer science) --- Engineering & Applied Sciences --- Computer Science --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Systems and Data Security. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Communication systems --- Mathematics --- Foundations --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Computer software. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer science—Mathematics.

Listing 1 - 4 of 4
Sort by