Narrow your search

Library

KU Leuven (20)

Odisee (18)

Thomas More Kempen (18)

Thomas More Mechelen (18)

UCLL (18)

ULB (18)

ULiège (18)

VIVES (18)

AP (14)

KDG (14)

More...

Resource type

book (30)

digital (14)


Language

English (44)


Year
From To Submit

2022 (1)

2020 (7)

2019 (1)

2018 (2)

2016 (2)

More...
Listing 1 - 10 of 44 << page
of 5
>>
Sort by

Book
Cryptography and Coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings
Author:
ISBN: 3642255159 3642255167 Year: 2011 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC 2011, held in Oxford, UK in December 2011. The 27 revised full papers presented together with one invited contribution were carefully reviewed and selected from 57 submissions. The papers cover a wide range of topics in the field of mathematics and computer science, including coding theory, homomorphic encryption, symmetric and public key cryptosystems, cryptographic functions and protocols, efficient pairing and scalar multiplication implementation, knowledge proof, and security analysis.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Mathematics --- Foundations --- Protection --- Security measures --- Computer software. --- Data structures (Computer scienc. --- Computational complexity. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Complexity, Computational --- Software, Computer --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics


Book
Computer security - ESORICS 2020 : 25th european symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14-18, 2020, proceedings, part I
Author:
ISBN: 303058951X 3030589501 Year: 2020 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain. .

Keywords

Computer security. --- Computer networks --- Computer communication systems. --- Application software. --- Special purpose computers. --- Software engineering. --- Systems and Data Security. --- Mobile and Network Security. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Special Purpose and Application-Based Systems. --- Software Engineering. --- Security measures. --- Computer software engineering --- Engineering --- Special purpose computers --- Computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection --- Security measures


Book
Computer security - ESORICS 2020 : 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings. Part II
Author:
ISBN: 3030590135 3030590127 Year: 2020 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain. .

Keywords

Computer security. --- Computer networks --- Computer communication systems. --- Application software. --- Special purpose computers. --- Software engineering. --- Systems and Data Security. --- Mobile and Network Security. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Special Purpose and Application-Based Systems. --- Software Engineering. --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Special purpose computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Protection --- Security measures --- Distributed processing


Digital
Cryptography and Coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings
Author:
ISBN: 9783642255168 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Book
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race
Author:
Year: 2019 Publisher: New York, NY : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Proceedings of the 2nd Workshop on Cyber-Security Arms Race
Author:
Year: 2020 Publisher: New York, New York : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It is our great pleasure to welcome you to the 2nd Workshop on Cyber-Security Arms Race (CYSARM)! This year we are thrilled to continue chairing this workshop at a prestigious venue as the ACM Conference on Computer and Communications Security (CCS). Although CYSARM is at the early phases (this year marks the second edition of this workshop), the workshop is already fostering collaboration among researchers and practitioners to discuss the various facets and tradeoffs of cyber-security. Being the first workshop of its kind, CYSARM benefits the cyber-security community by addressing novel (and often controversial) topics in cyber-security, such as tradeoffs and double-edged sword techniques. Beyond the study of cyber-security, privacy and trust as standalone components, it is also important to look at how to balance their trade-offs especially when it comes to several contradicting requirements, such as security vs privacy, security vs trust, and security vs usability. CYSARM considers all complex facets and double-edged sword aspects of the cyber-security ecosystem, in particular, how new technologies and algorithms might impact the cyber-security of existing or future models and systems.


Book
Chaos in attitude dynamics of spacecraft
Authors: ---
ISBN: 3642300790 3642300804 Year: 2013 Publisher: Beijing : Berlin ; New York : Tsinghua University Press ; Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Attitude dynamics is the theoretical basis of attitude control of spacecrafts in aerospace engineering. With the development of nonlinear dynamics, chaos in spacecraft attitude dynamics has drawn great attention since the 1990's. The problem of the predictability and controllability of the chaotic attitude motion of a spacecraft has a practical significance in astronautic science. This book aims to summarize basic concepts, main approaches, and recent progress in this area. It focuses on the research work of the author and other Chinese scientists in this field, providing new methods and viewpoints in the investigation of spacecraft attitude motion, as well as new mathematical models, with definite engineering backgrounds, for further analysis. Professor Yanzhu Liu was the Director of the Institute of Engineering Mechanics, Shanghai Jiao Tong University, China. Dr. Liqun Chen is a Professor at the Department of Mechanics, Shanghai University, China.


Book
Trusted Systems : Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers
Authors: ---
ISBN: 3642252826 3642252834 Year: 2011 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2010, held in Beijing, China, in December 2010. The 23 revised full papers were carefully reviewd and selected from 66 submissions for inclusion in the book. The papers are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

Keywords

Engineering & Applied Sciences --- Electrical & Computer Engineering --- Telecommunications --- Computer Science --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Systems and Data Security. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer networks. --- Cryptography. --- Electronic data processing—Management. --- Data protection. --- IT Operations. --- Data and Information Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)


Book
Provable Security : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings
Authors: ---
ISBN: 3319474219 3319474227 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016. The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The papers are grouped in topical sections on attribute/role-based cryptography, data in cloud, searchable encryption, key management, encryption, leakage analysis, homomorphic encryption.

Keywords

Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Application software. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computers and Society. --- Computer Appl. in Administrative Data Processing. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Civilization and computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Algorism --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Sociotechnical systems --- Information resources management --- Management --- Civilization --- Computer software --- Algebra --- Arithmetic --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Communication systems --- Foundations --- Information systems. --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer


Book
Security Standardisation Research : First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings
Authors: ---
ISBN: 3319140531 331914054X Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Communication Networks. --- Data Structures. --- Math Applications in Computer Science. --- Mathematics. --- Data structures (Computer scienc. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer science—Mathematics. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing

Listing 1 - 10 of 44 << page
of 5
>>
Sort by