Narrow your search

Library

ULiège (12)

KU Leuven (10)

ULB (9)

Odisee (8)

Thomas More Kempen (8)

Thomas More Mechelen (8)

UCLL (8)

VIVES (8)

AP (7)

KDG (7)

More...

Resource type

book (17)

digital (7)


Language

English (23)


Year
From To Submit

2019 (2)

2018 (2)

2017 (2)

2016 (4)

2015 (2)

More...
Listing 1 - 10 of 23 << page
of 3
>>
Sort by

Book
Applications and Techniques in Information Security : 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings
Authors: ---
ISBN: 9811027404 9811027412 Year: 2016 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016. The 10 revised full papers and three short papers presented together with two invited talks were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on invited speeches; attacks on data security systems; detection of attacks on data security systems; data security; data privacy.

Combinatorics of finite geometries
Author:
ISBN: 0521318572 0521267641 Year: 1986 Publisher: Cambridge Cambridge University press

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Public key cryptography : applications and attacks
Author:
ISBN: 1283960524 111848231X 9781118482261 9781118317129 9781118482315 1118482263 Year: 2013 Publisher: Piscataway, NJ: Hoboken, N.J.: IEEE Press. Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur


Digital
Applications and Techniques in Information Security : 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings
Authors: ---
ISBN: 9789811027413 Year: 2016 Publisher: Singapore Springer Singapore, Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016. The 10 revised full papers and three short papers presented together with two invited talks were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on invited speeches; attacks on data security systems; detection of attacks on data security systems; data security; data privacy.


Book
Combinatorics of finite geometries
Author:
ISBN: 0511665601 Year: 1997 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is an introductory text on the combinatorial theory of finite geometry. It assumes only a basic knowledge of set theory and analysis, but soon leads the student to results at the frontiers of research. It begins with an elementary combinatorial approach to finite geometries based on finite sets of points and lines, and moves into the classical work on affine and projective planes. The next part deals with polar spaces, partial geometries, and generalised quadrangles. The revised edition contains an entirely new chapter on blocking sets in linear spaces, which highlights some of the most important applications of blocking sets from the initial game-theoretic setting to their recent use in cryptography. Extensive exercises at the end of each chapter ensure the usefulness of this book for senior undergraduate and beginning graduate students.

The theory of finite linear spaces : combinatorics of points and lines
Authors: ---
ISBN: 0521333172 Year: 1993 Publisher: Cambridge : Cambridge university press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Vector spaces.


Multi
Information Security and Privacy (vol. # 4058) : 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings
Authors: ---
ISBN: 9783540354598 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3-5 July, 2006. The conference was sponsored by Deakin University, the Research Network for a Secure Australia, and was organized in cooperation with the University of Wollongong. The conference brought together researchers,practitioners and a wide range of other users from academia, industries and government organizations. The program included 35 papers covering important aspects of information security technologies. The papers were selected from 133 submissions through a two-stage anonymous review process. Each paper received at least three reviews by members of the Program Committee, and was then scrutinized by the whole committee during a two-week discussion. There were 19 papers eligible for the best student paper  award. The award was given to Yang Cui from the U- versity of Tokyo for the paper Tag-KEM from Set Partial Domain One-Way Permutations.  In addition to the regular papers the program also included three invited talks. Bart Preneel gave an invited talk entitled Electronic Identity Cards: Threats and Opportunities.  Mike Burmester's talk was Towards Provable - curity for Ubiquitous Applications.  The details of the third talk had not been ?nalized at the time of publication of these proceedings. We wish to thank all the authors of submitted papers for providing the c- tent for the conference;their high-quality submissions madethe task of selecting a program very di?cult.


Book
The theory of finite linear spaces : combinatorics of points and lines
Authors: ---
ISBN: 0511666918 Year: 1993 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This 1994 text covers finite linear spaces. It contains all the important results that had been published up to the time of publication, and is designed to be used not only as a resource for researchers in this and related areas, but also as a graduate-level text. In eight chapters the authors introduce and review fundamental results, and go on to cover the major areas of interest in linear spaces. A combinatorial approach is used for the greater part of the book, but in the final chapter recent advances in group theory relating to finite linear spaces are presented. At the end of each chapter there is a set of exercises which are designed to test comprehension of the material, and there is also a section of problems for researchers. It will be an invaluable book for researchers in geometry and combinatorics as well as forming an excellent text for graduate students.

Keywords

Vector spaces.

Information Security and Privacy : 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings
Authors: --- ---
ISSN: 03029743 ISBN: 3540438610 9783540438618 3540454500 Year: 2002 Volume: 2384 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3–5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society. The aims of the annual ACISP conferences have been to bring together people working in di?erent areas of computer, communication, and information security from universities, industry, and government institutions. The conferences give the participants the opportunity to discuss the latest developments in the rapidly growing area of information security and privacy. The reviewing process took six weeks and we heartily thank all the m- bers of the program committee and the external referees for the many hours of valuable time given to the conference. The program committee accepted 36 papers from the 94 submitted. From those papers accepted 10 papers were from Australia, 5each from Korea and USA, 4 each from Singapore and Germany, 2 from Japan, and 1 each from The Netherlands, UK, Spain, Bulgaria, and India. The authors of every paper, whether accepted or not, made a valued contribution to the conference. In addition to the contributed papers, we were delighted to have presen- tions from the Victorian Privacy Commissioner, Paul Chadwick, and eminent researchers Professor Hugh Williams, Calgary, Canada, Professor Bimal Roy, ISI, Kolkota, India (whose invited talk was formally referred and accepted by the program committee), and Dr Hank Wolfe from Otago, New Zealand.

Keywords

Computer security --- Data protection --- Privacy, Right of --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Operating Systems. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Information Systems. --- Computer software. --- Cryptology. --- Informatics --- Science --- Software, Computer --- Computer systems --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Operating systems --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Foundations --- Distributed processing --- Communication systems --- Computer security - Congresses --- Data protection - Congresses --- Privacy, Right of - Congresses --- Data encryption (Computer science) --- Operating systems (Computers) --- Computer networks.


Book
Applications and Techniques in Information Security : International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings
Authors: --- --- ---
ISBN: 3662456702 3662456699 Year: 2014 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.

Listing 1 - 10 of 23 << page
of 3
>>
Sort by