Narrow your search

Library

ULB (15)

KU Leuven (13)

ULiège (12)

Odisee (11)

Thomas More Kempen (11)

Thomas More Mechelen (11)

UCLL (11)

VIVES (11)

AP (8)

KDG (8)

More...

Resource type

book (25)

digital (8)

dissertation (2)


Language

English (29)

German (6)


Year
From To Submit

2024 (1)

2019 (4)

2017 (3)

2016 (4)

2013 (4)

More...
Listing 1 - 10 of 35 << page
of 4
>>
Sort by
Introduction to cryptography
Author:
ISBN: 038721156X 0387207562 1441990038 9780387207568 9780387211565 Year: 2004 Publisher: Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. For this new edition, the author has updated the discussion of the security of encryption and signature schemes and recent advances in factoring and computing discrete logarithms. He has also added descriptions of time-memory trade of attacks and algebraic attacks on block ciphers, the Advanced Encryption Standard, the Secure Hash Algorithm, secret sharing schemes, and undeniable and blind signatures.Johannes A. Buchmann is a Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and the Associate Editor of the Journal of Cryptology. In 1985, he received the Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. Furthermore, he has received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation.About the first edition:It is amazing how much Buchmann is able to do in under 300 pages: self-contained explanations of the relevant mathematics (with proofs); a systematic introduction to symmetric cryptosystems, including a detailed description and discussion of DES; a good treatment of primality testing, integer factorization, and algorithms for discrete logarithms; clearly written sections describing most of the major types of cryptosystems....This book is an excellent reference, and I believe it would also be a good textbook for a course for mathematics or computer science majors..." [Neal Koblitz, The American Mathematical Monthly]


Book
Internet Privacy : Options for adequate realisation
Author:
ISBN: 3642379125 3642379133 9783642379130 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer Vieweg,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

Keywords

Data protection -- Government policy -- European Union countries. --- Internet -- Security measures -- Government policy -- European Union countries. --- Privacy, Right of -- European Union countries. --- Law, Politics & Government --- Human Rights --- Privacy, Right of. --- Internet --- Law and legislation --- Law and legislation. --- Cyberspace --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Engineering. --- Information technology. --- Business --- Computer graphics. --- Mass media. --- Law. --- Electrical engineering. --- Social sciences. --- Communications Engineering, Networks. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Social Sciences, general. --- IT in Business. --- Media Law. --- Data processing. --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Telecommunication. --- Computer vision. --- Mass media --- IT Law, Media Law, Intellectual Property. --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Behavioral sciences --- Human sciences --- Sciences, Social --- Social science --- Social studies --- Civilization --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Optical data processing. --- Business—Data processing. --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Computers --- Electric engineering --- Engineering --- Acts, Legislative --- Enactments, Legislative --- Laws (Statutes) --- Legislative acts --- Legislative enactments --- Jurisprudence --- Legislation --- Media, Mass --- Media, The --- Optical equipment


Book
Einführung in die Kryptographie
Author:
ISBN: 3642397751 Year: 2016 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer Spektrum,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Das Internet durchdringt alle Lebensbereiche: Gesundheitsversorgung, Bildung, Unterhaltung, Produktion, Logistik, Verkauf, den Finanzsektor, die öffentliche Verwaltung aber auch kritische Infrastrukturen wie Verkehr, Energieversorgung und Kommunikationsnetze. Kryptographie ist eine zentrale Technik für die Absicherung des Internets. Ohne Kryptographie gibt es im Internet keine Sicherheit. Kryptographie entwickelt sich ständig weiter und ist ein hochaktuelles Forschungsgebiet. Dieses Kryptographiebuch ist geschrieben für Studierende der Mathematik, Informatik, Physik, Elektrotechnik oder andere Leser mit mathematischer Grundbildung und wurde in vielen Vorlesungen erfolgreich eingesetzt. Es behandelt die aktuellen Techniken der modernen Kryptographie, zum Beispiel Verschlüsselung und digitale Signaturen. Das Buch vermittelt auf elementare Weise alle mathematischen Grundlagen, die zu einem präzisen Verständnis der Kryptographie nötig sind, mit vielen Beispielen und Übungen. Die Leserinnen und Leser dieses Buches erhalten ein fundiertes Verständnis der modernen Kryptographie und werden in die Lage versetzt Forschungsliteratur zur Kryptographie zu verstehen.


Book
Einführung in die Kryptographie
Author:
ISBN: 3540744525 Year: 2008 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Das Internet durchdringt alle Lebensbereiche: Gesundheitsversorgung, Bildung, Unterhaltung, Produktion, Logistik, Verkauf, den Finanzsektor, die öffentliche Verwaltung aber auch kritische Infrastrukturen wie Verkehr, Energieversorgung und Kommunikationsnetze. Kryptographie ist eine zentrale Technik für die Absicherung des Internets. Ohne Kryptographie gibt es im Internet keine Sicherheit. Kryptographie entwickelt sich ständig weiter und ist ein hochaktuelles Forschungsgebiet. Dieses Kryptographiebuch ist geschrieben für Studierende der Mathematik, Informatik, Physik, Elektrotechnik oder andere Leser mit mathematischer Grundbildung und wurde in vielen Vorlesungen erfolgreich eingesetzt. Es behandelt die aktuellen Techniken der modernen Kryptographie, zum Beispiel Verschlüsselung und digitale Signaturen. Das Buch vermittelt auf elementare Weise alle mathematischen Grundlagen, die zu einem präzisen Verständnis der Kryptographie nötig sind, mit vielen Beispielen und Übungen. Die Leserinnen und Leser dieses Buches erhalten ein fundiertes Verständnis der modernen Kryptographie und werden in die Lage versetzt Forschungsliteratur zur Kryptographie zu verstehen. Aus den Rezensionen zur 2. Auflage: „Diese von einem Mathematiker geschriebene „Einführung in die Kryptographie" fällt sofort durch ihren präzisen und logisch einwandfreien Stil auf. Die verwendeten Begriffe (Verschlüsselungsverfahren, perfekte Sicherheit, Hashfunktion,...) werden mathematisch sauber und kurz definiert, und es wird sehr wohl unterschieden, was „bewiesen" ist [...] und was „allgemeiner Glaube der Experten" ist. Trotz dieser mathematischen Genauigkeit ist dieses Buch insbesondere für Anfänger und speziell auch für Nicht-Mathematiker sehr verständlich gehalten. Das nötige mathematische Werkzeug (Restklassenringe, Matrizen und lineare Abbildungen, Wahrscheinlichkeit, Erzeugung von Primzahlen, Faktorisierungsverfahren, Ausblick auf elliptische Kurven) wird vor der jeweiligen Anwendung vorgestellt. Dann wird der Themenkreis prägnant, sehr verständlich und mit Beispielen illustriert, besprochen, wobei der Geübte die dahinterliegende mathematische Idee schnell erkennen kann. Dabei werden im Wesentlichen alle Basistechniken der modernen Kryptographie erfasst. Soweit möglich bzw. üblich, wird das englische Fachvokabular der Kryptographie in die deutsche Sprache übersetzt. Ich hoffe, dass die Freude des Rezensenten beim Lesen dieses Buches auch von vielen anderen Lesern ebenfalls empfunden werden kann." (Int. Math. Nachrichten 2002, Vol 56, Issue 189). „[...] „Klein, aber fein" ist das Charakteristikum des Buches: Jeder Abschnitt ist mit (für Mathematiker) sehr anschaulichen Beispielen und kleinen Übungsaufgaben versehen. Entwickler finden hier eine reiche Quelle der Hintergründe, die sie für eine Implementation wissen müssen." (Amazon.de-Redaktion) .


Book
Internet Privacy : eine multidisziplinare Bestandsaufnahme = a multidisciplinary analysis
Author:
ISBN: 129930432X 3642319432 Year: 2012 Publisher: Berlin : Acatech,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Das Internet ist eine der bedeutendsten technologischen Errungenschaften der Geschichte. Es erlaubt Menschen in aller Welt Zugang zu umfassenden Informationen, unterstützt die weltweite Kommunikation und Vernetzung und fungiert als globaler Marktplatz. Dabei bieten die vielfältigen Angebote im Internet jedoch nicht nur Chancen; sie werfen auch Fragen des Datenschutzes, der Persönlichkeitsentfaltung und der Privatsphäre auf. Dieses Phänomen wird gemeinhin als das Privatheitsparadoxon bezeichnet. Aufgrund der großen Bedeutung von Privatheit im Internet hat acatech 2011 ein Projekt initiiert, das sich mit dem Privatheitsparadoxon wissenschaftlich auseinandersetzt. Dieser Band ist der erste Teil einer acatech STUDIE zum Projekt „Internet Privacy – Eine Kultur der Privatsphäre und des Vertrauens im Internet“. Die Autoren leisten eine Bestandsaufnahme der existierenden individuellen und gesellschaftlichen Vorstellungen von Privatsphäre im Internet sowie der entsprechenden rechtlichen, technischen, ökonomischen und ethischen Rahmenbedingungen. The development of the Internet is one of the most significant technological advances in history. It allows people around the world access to comprehensive information, supports worldwide communication and interaction and functions as a global marketplace. While users appreciate the services offered by the internet, they are also worried about their privacy. This is sometimes referred to as the privacy paradox of the Internet. In 2011 acatech launched a project that is developing recommendations for the creation of a culture of privacy and trust that will be able to resolve this paradox. This multidisciplinary analysis presents the desires and fears of users and society regarding Internet privacy as well as these sentiments’ ethical, economic, technical and legal frameworks. This publication is the first of two volumes, revealing the findings of the project “Internet Privacy – A Culture of Privacy and Trust on the Internet”.


Book
Introduction to quantum algorithms
Author:
ISBN: 1470476525 9781470476526 Year: 2024 Publisher: Providence, Rhode Island : American Mathematical Society,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Quantum algorithms are among the most important, interesting, and promising innovations in information and communication technology. They pose a major threat to today’s cybersecurity and at the same time promise great benefits by potentially solving previously intractable computational problems with reasonable effort. The theory of quantum algorithms is based on advanced concepts from computer science, mathematics, and physics. Introduction to Quantum Algorithms offers a mathematically precise exploration of these concepts, accessible to those with a basic mathematical university education, while also catering to more experienced readers. This comprehensive book is suitable for self-study or as a textbook for one or two-semester introductory courses on quantum computing algorithms. Instructors can tailor their approach to emphasize theoretical understanding and proofs or practical applications of quantum algorithms, depending on the course’s goals and timeframe. "--Provided by publisher.

Binary quadratic forms : an algorithmic approach
Authors: ---
ISBN: 1280949252 9786610949250 3540463682 3540463674 3642079717 Year: 2007 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book deals with algorithmic problems concerning binary quadratic forms 2 2 f(X,Y)= aX +bXY +cY with integer coe?cients a, b, c, the mathem- ical theories that permit the solution of these problems, and applications to cryptography. A considerable part of the theory is developed for forms with real coe?cients and it is shown that forms with integer coe?cients appear in a natural way. Much of the progress of number theory has been stimulated by the study of concrete computational problems. Deep theories were developed from the classic time of Euler and Gauss onwards to this day that made the solutions ofmanyof theseproblemspossible.Algorithmicsolutionsandtheirproperties became an object of study in their own right. Thisbookintertwinestheexpositionofoneveryclassicalstrandofnumber theory with the presentation and analysis of algorithms both classical and modern which solve its motivating problems. This algorithmic approach will lead the reader, we hope, not only to an understanding of theory and solution methods, but also to an appreciation of the e?ciency with which solutions can be reached. The computer age has led to a marked advancement of algorithmic - search. On the one hand, computers make it feasible to solve very hard pr- lems such as the solution of Pell equations with large coe?cients. On the other, the application of number theory in public-key cryptography increased the urgency for establishing the complexity of several computational pr- lems: many a computer system stays only secure as long as these problems remain intractable.

Introduction to cryptography
Author:
ISBN: 0387950346 1468404989 1468404962 9780387950341 Year: 2001 Publisher: New York (N.Y.): Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. For this new edition, the author has updated the discussion of the security of encryption and signature schemes and recent advances in factoring and computing discrete logarithms. He has also added descriptions of time-memory trade of attacks and algebraic attacks on block ciphers, the Advanced Encryption Standard, the Secure Hash Algorithm, secret sharing schemes, and undeniable and blind signatures. Johannes A. Buchmann is a Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and the Associate Editor of the Journal of Cryptology. In 1985, he received the Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. Furthermore, he has received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation. About the first edition: It is amazing how much Buchmann is able to do in under 300 pages: self-contained explanations of the relevant mathematics (with proofs); a systematic introduction to symmetric cryptosystems, including a detailed description and discussion of DES; a good treatment of primality testing, integer factorization, and algorithms for discrete logarithms; clearly written sections describing most of the major types of cryptosystems....This book is an excellent reference, and I believe it would also be a good textbook for a course for mathematics or computer science majors..." -Neal Koblitz, The American Mathematical Monthly.


Digital
Binary Quadratic Forms : An Algorithmic Approach
Authors: ---
ISBN: 9783540463689 Year: 2007 Publisher: Berlin Heidelberg Springer-Verlag GmbH

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Internet Privacy : Options for adequate realisation
Author:
ISBN: 9783642379130 Year: 2013 Publisher: Berlin, Heidelberg Springer, Imprint: Springer Vieweg

Loading...
Export citation

Choose an application

Bookmark

Abstract

A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

Listing 1 - 10 of 35 << page
of 4
>>
Sort by