Narrow your search

Library

VUB (5)

KU Leuven (4)

ULiège (3)

AP (2)

EhB (2)

KDG (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

More...

Resource type

book (9)

digital (2)


Language

English (10)


Year
From To Submit

2020 (2)

2013 (1)

2010 (2)

2008 (2)

2006 (3)

Listing 1 - 10 of 10
Sort by
Security and cooperation in wireless networks
Authors: ---
ISBN: 9780521873710 9780511815102 Year: 2008 Publisher: Cambridge Cambridge University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
Authors: ---
ISBN: 1107181291 1282001191 9786612001192 0511479530 0511815107 0511480334 0511477120 0511475683 051147864X Year: 2008 Publisher: Cambridge, U.K. ; New York : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710).


Book
Decision and game theory for security : first International Conference, Gamesec 2010, Berlin, Germany, November 22-23, 2010, proceedings
Authors: --- ---
ISBN: 3642171966 9786613568342 3642171974 1280390425 Year: 2010 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. - cision and game theory provides a rich set of analyticalmethods and approaches to address various resource allocation and decision-making problems arising in security. This edited volume contains the contributions presented at the inaugural Conference on Decision and Game Theory for Security - GameSec 2010. These 18 articles (12 full and 6 short papers) are thematically categorized into the following six sections: – “Security investments and planning” contains two articles, which present optimization methods for (security) investments when facing adversaries. – “Privacy and anonymity” has three articles discussing location privacy, - line anonymity, and economic aspects of privacy. – “Adversarial and robust control” contains three articles, which investigate security and robustness aspects of control in networks. – “Networksecurityandbotnets”hasfourarticlesfocusingondefensivestra- giesagainstbotnetsaswellasdetectionofmaliciousadversariesinnetworks. – “Authorizationandauthentication”hasanarticleonpasswordpracticesand another one presenting a game-theoretic authorization model. – “Theory and algorithms for security” contains four articles on various th- retic and algorithmic aspects of security.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer security. --- Game theory. --- Games, Theory of --- Theory of games --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Game Theory, Economics, Social and Behav. Sciences. --- Computer Communication Networks. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Mathematical models --- Mathematics --- Data protection --- Security systems --- Hacking --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Distributed processing --- Mathematics. --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Math


Book
Cryptographic Obfuscation
Authors: --- ---
ISBN: 9783319980416 Year: 2020 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Security and Privacy in Ad-hoc and Sensor Networks (vol. # 4357) : Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers
Authors: --- ---
ISBN: 9783540691730 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Multi
Cryptographic Obfuscation
Authors: --- ---
ISBN: 9783319980416 Year: 2020 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.


Book
Security and Privacy in Ad-hoc and Sensor Networks (vol. # 4357)
Authors: --- --- ---
ISBN: 9783540691730 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Theseproceedingscontainthepapersofthe3rdEuropeanWorkshoponSecurity and Privacy in Ad Hoc and Sensor Networks (ESAS 2006), which was held in Hamburg, Germany, September 20-21, 2006, in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). This year, a total of 44 full papers were submitted to ESAS. Each subm- ted paper was reviewed by at least three expert referees. After a short period of discussion and deliberation, the Program Committee selected 14 papers for presentation and subsequent publication in the workshop proceedings. This c- responds to an acceptance rate of 32% - a respectable rate by any measure. In addition to the presented papers, this year's workshop also featured two keynote speeches and seven project presentations. In the ?rst keynote, Jean-Pierre Hubaux (EPFL) gave an overview of Security and Cooperation in WirelessNetworks .ThesecondkeynotewasgivenbyPimTuyls(Philips)onthe interesting topic of Grey-Box Cryptography: Physical Unclonable Functions . The project presentations covered the following European Projects: S3MS, SeVeCom, BIONETS, CASCADAS, MOBIUS, EYES and UbiSecSens. Unf- tunately, the extended abstracts of these presentations could not be included in the proceedings. As the Chairs of ESAS 2006, we are very happy with the outcome of the workshop that clearly demonstrates the continued importance, popularity, and timeliness of the topic: Security and Privacy in Ad Hoc and Sensor Networks.


Book
Decision and Game Theory for Security
Authors: --- --- ---
ISBN: 9783642171970 9783642171963 9783642171987 Year: 2010 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. - cision and game theory provides a rich set of analyticalmethods and approaches to address various resource allocation and decision-making problems arising in security. This edited volume contains the contributions presented at the inaugural Conference on Decision and Game Theory for Security - GameSec 2010. These 18 articles (12 full and 6 short papers) are thematically categorized into the following six sections: - Security investments and planning  contains two articles, which present optimization methods for (security) investments when facing adversaries. - Privacy and anonymity  has three articles discussing location privacy, - line anonymity, and economic aspects of privacy. - Adversarial and robust control  contains three articles, which investigate security and robustness aspects of control in networks. - Networksecurityandbotnets hasfourarticlesfocusingondefensivestra- giesagainstbotnetsaswellasdetectionofmaliciousadversariesinnetworks. - Authorizationandauthentication hasanarticleonpasswordpracticesand another one presenting a game-theoretic authorization model. - Theory and algorithms for security  contains four articles on various th- retic and algorithmic aspects of security.

Security and privacy in ad-hoc and sensor networks : third European Workshop, ESAS 2006, Hamburg, Germany, Setpember 20-21, 2006 : revised selected papers
Authors: --- --- ---
ISBN: 9783540691723 3540691723 3540691731 Year: 2006 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Theseproceedingscontainthepapersofthe3rdEuropeanWorkshoponSecurity and Privacy in Ad Hoc and Sensor Networks (ESAS 2006), which was held in Hamburg, Germany, September 20–21, 2006, in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). This year, a total of 44 full papers were submitted to ESAS. Each subm- ted paper was reviewed by at least three expert referees. After a short period of discussion and deliberation, the Program Committee selected 14 papers for presentation and subsequent publication in the workshop proceedings. This c- responds to an acceptance rate of 32% – a respectable rate by any measure. In addition to the presented papers, this year’s workshop also featured two keynote speeches and seven project presentations. In the ?rst keynote, Jean-Pierre Hubaux (EPFL) gave an overview of “Security and Cooperation in WirelessNetworks”.ThesecondkeynotewasgivenbyPimTuyls(Philips)onthe interesting topic of “Grey-Box Cryptography: Physical Unclonable Functions”. The project presentations covered the following European Projects: S3MS, SeVeCom, BIONETS, CASCADAS, MOBIUS, EYES and UbiSecSens. Unf- tunately, the extended abstracts of these presentations could not be included in the proceedings. As the Chairs of ESAS 2006, we are very happy with the outcome of the workshop that clearly demonstrates the continued importance, popularity, and timeliness of the topic: Security and Privacy in Ad Hoc and Sensor Networks.

Keywords

Sensor networks --- Wireless communication systems --- Computer networks --- Computer security --- Réseaux de capteurs --- Transmission sans fil --- Réseaux d'ordinateurs --- Sécurité informatique --- Security measures --- Congresses. --- Sécurité --- Mesures --- Congrès --- Computer Science --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Networks, Sensor --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Information Systems Applications (incl. Internet). --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Distributed processing --- Telecommunication systems --- Detectors --- Context-aware computing --- Multisensor data fusion --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
WiSec'13 : proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks : April 17-19, 2013 Budapest, Hungary
Authors: --- ---
ISBN: 145031998X Year: 2013 Publisher: [Place of publication not identified] ACM

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 10
Sort by