Narrow your search

Library

KU Leuven (7)

AP (4)

KDG (4)

ULB (4)

ULiège (4)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

VIVES (3)

VUB (3)

More...

Resource type

book (11)

digital (4)


Language

English (13)


Year
From To Submit

2024 (4)

2020 (1)

2013 (1)

2011 (5)

2007 (1)

More...
Listing 1 - 10 of 13 << page
of 2
>>
Sort by

Book
Proceedings of the 39th Symposium on Principles of Distributed Computing
Authors: ---
Year: 2020 Publisher: New York, NY : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

PODC is one of the premier international forums on the theory, design, analysis, implementation and application of distributed systems and networks. It spans all areas of distributed computing and aims at improving the understanding of the principles underlying distributed computing.


Book
Financial Cryptography and Data Security : 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023, Revised Selected Papers, Part II
Authors: ---
ISBN: 3031477510 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which was held from May 1-5, 2023, in Bol, Croatia. The 39 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 182 submissions. They were organized in topical sections as follows: Part I: Consensus; cryptographic protocols; decentralized finance; Part II: Proof of X; Layer 2; attack techniques, defenses, and attack case studies; empirical studies and more decentralized finance; game theory and protocols.


Book
Financial Cryptography and Data Security : 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023, Revised Selected Papers, Part I
Authors: ---
ISBN: 3031477545 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which was held from May 1-5, 2023, in Bol, Croatia. The 39 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 182 submissions. They were organized in topical sections as follows: Part I: Consensus; cryptographic protocols; decentralized finance; Part II: Proof of X; Layer 2; attack techniques, defenses, and attack case studies; empirical studies and more decentralized finance; game theory and protocols.

Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings
Authors: --- ---
ISBN: 1280307374 9786610307371 3540246762 3540219358 Year: 2004 Volume: 3027 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

These are the proceedings of Eurocrypt 2004, the 23rd Annual Eurocrypt C- ference. The conference was organized by members of the IBM Zurich Research Laboratory in cooperation with IACR, the International Association for Cr- tologic Research. Theconferencereceivedarecordnumberof206submissions,outofwhichthe program committee selected 36 for presentation at the conference (three papers were withdrawn by the authors shortly after submission). These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program also featured two invited talks. The ?rst one was the 2004 IACR Distinguished Lecture given by Whit?eld Di?e. The second invited talk was by Ivan Damg? ard who presented “Paradigms for Multiparty Computation. ” The traditional rump session with short informal talks on recent results was chaired by Arjen Lenstra. The reviewing process was a challenging task, and many good submissions had to be rejected. Each paper was reviewed independently by at least three members of the program committee, and papers co-authored by a member of the program committee were reviewed by at least six (other) members. The individual reviewing phase was followed by profound and sometimes lively d- cussions about the papers, which contributed a lot to the quality of the ?nal selection. Extensive comments were sent to the authors in most cases.

Keywords

Computer science. --- Computer Communication Networks. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computer software. --- Computational complexity. --- Information Systems. --- Computer Science. --- Data Encryption. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Management of Computing and Information Systems. --- Computers --- Cryptography --- Data transmission systems --- Engineering & Applied Sciences --- Computer Science --- Access control --- Security measures --- Data encryption (Computer science) --- Cryptographie --- Chiffrement (Informatique) --- Congresses --- Congresses. --- Congrès --- EPUB-LIV-FT SPRINGER-B --- Data communication systems --- Transmission of data --- Computer communication systems. --- Algorithms. --- Computer science --- Management information systems. --- Mathematics. --- Digital communications --- Electronic data processing --- Electronic systems --- Information theory --- Telecommunication systems --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer systems --- Computer operating systems --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Operating systems --- Computer science—Mathematics. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Communication systems --- Foundations --- Distributed processing --- Cryptography. --- Computer networks. --- Discrete mathematics. --- IT Operations. --- Management. --- Discrete mathematical structures --- Mathematical structures, Discrete --- Structures, Discrete mathematical --- Numerical analysis --- Computer mathematics --- Mathematics --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Operating systems (Computers)


Book
Introduction to reliable and secure distributed programming
Authors: --- ---
ISBN: 3642152597 3642152600 3642423272 9783642423277 9783642152597 Year: 2011 Publisher: Heidelberg: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes. Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of "Introduction to Reliable Distributed Programming". Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name "Byzantine fault-tolerance".

Keywords

Computer programming. --- Computer software -- Reliability. --- Electronic data processing -- Distributed processing. --- Engineering & Applied Sciences --- Computer Science --- Electronic data processing --- Computer networks. --- Computer security. --- Distributed processing. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Algorithms. --- Computer Science. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Operating Systems. --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Computer networks --- Distributed processing --- Computer software. --- Computer operating systems --- Disk operating systems --- Systems software --- Software, Computer --- Operating systems --- Computer software --- Reliability. --- Algorism --- Algebra --- Arithmetic --- Foundations --- Operating systems (Computers)


Digital
Introduction to Reliable and Secure Distributed Programming
Authors: --- ---
ISBN: 9783642152603 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Financial Cryptography and Data Security
Authors: --- ---
ISBN: 9783031477515 9783031477508 9783031477522 Year: 2024 Publisher: Cham Springer Nature Switzerland :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Financial Cryptography and Data Security
Authors: --- ---
ISBN: 9783031477546 9783031477539 9783031477553 Year: 2024 Publisher: Cham Springer Nature Switzerland :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Introduction to Reliable and Secure Distributed Programming
Authors: --- --- ---
ISBN: 9783642152603 Year: 2011 Publisher: Berlin Heidelberg Springer Berlin Heidelberg Imprint Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes. Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of "Introduction to Reliable Distributed Programming". Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name "Byzantine fault-tolerance".


Book
Proceedings of the 3rd ACM workshop on Cloud computing security workshop
Authors: ---
ISBN: 1450310044 Year: 2011 Publisher: Chicago, IL, USA ACM

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 13 << page
of 2
>>
Sort by