Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- maatschappij --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St. Lucia, in February/March 2011. The 16 revised full papers and 10 revised short papers presented were carefully reviewed and selected from 65 initial submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on fundamental and applied real-world deployments on all aspects surrounding commerce security; as well as on systems security and inter-disciplinary efforts.
Engineering & Applied Sciences --- Computer Science --- Data encryption (Computer science) --- Data protection --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer
Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- IR (information retrieval) --- DES (data encryption standard) --- informatica --- maatschappij --- informatica management --- OS (operating system) --- computernetwerken
Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- IR (information retrieval) --- DES (data encryption standard) --- informatica --- maatschappij --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St. Lucia, in February/March 2011. The 16 revised full papers and 10 revised short papers presented were carefully reviewed and selected from 65 initial submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on fundamental and applied real-world deployments on all aspects surrounding commerce security; as well as on systems security and inter-disciplinary efforts.
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- maatschappij --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
Computer security --- Computer networks --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Privacy, Right of --- Computer Science --- Engineering & Applied Sciences --- Privacy, Right of. --- Invasion of privacy --- Right of privacy --- Law and legislation --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Information storage and retrieval. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Operating Systems. --- Information Storage and Retrieval. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval
Choose an application
Computer security --- Computer networks --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Information storage and retrieval. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- Information Storage and Retrieval. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval
Choose an application
PET 2005 held in Cavtat (Croatia) from May 30 to June 1, 2005, was the th 5 Workshop on Privacy-Enhancing Technologies, which is now established as a yearly event. The workshop received 74 full paper submissions out of which 17 papers were ultimately selected to be presented. The selection process relied on over 200 reviews from the Program Committee, Program Chairs and additional reviewers, at least three per paper. A further 2-week long e-mail discussion led to consensus on the papers accepted-with the ultimate responsibility for the program resting on the Program Co-chairs. The number of accepted papers and ?nal program format was to ensure that PET retains its character as a workshop, with ample time for discussion, two panel discussions, and space for the fermentation of new ideas and collaborations. The Program Chairs would ?rst like to thank the PET 2005 Program C- mittee for the high-quality reviews and discussion that led to the program: - Martin Abadi, University of California at Santa Cruz, USA - Alessandro Acquisti, Heinz School, Carnegie Mellon University, USA - Caspar Bowden, Microsoft EMEA, UK - Jean Camp, Indiana University at Bloomington, USA - Richard Clayton, University of Cambridge, UK - LorrieCranor,SchoolofComputerScience,CarnegieMellonUniversity,USA - Roger Dingledine, The Free Haven Project, USA - Hannes Federrath, University of Regensburg, Germany - Ian Goldberg, Zero Knowledge Systems, Canada - Philippe Golle, Palo Alto Research Center, USA - MaritHansen,IndependentCentreforPrivacyProtectionSchleswig-Holstein, Germany - Markus Jakobsson, Indiana University at Bloomington, USA - Dogan Kesdogan, Rheinisch-Westfaelische Technische Hochschule Aachen, Germany
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- IR (information retrieval) --- DES (data encryption standard) --- informatica --- maatschappij --- informatica management --- OS (operating system) --- computernetwerken
Choose an application
The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was held at Robinson College, Cambridge (UK), on June 28-30, 2006. The workshop received91full papersubmissionsoutofwhich24wereselectedfor presentation. As a rule, papers were reviewed by 3 independent members of the Program Committee, and often alsoby externalreviewers.A further two-weeklong online discussion took place amongst the PC to reach consensus on all submissions. The ultimate responsibility for the ?nal selection of papers rests on the program chairs. The ratio of acceptance puts PET in league with other premiere computer security venues, and guarantees a high quality scienti?c program. Yet PET also retains its character as a workshop, by providing a venue where promising new ideas canbe presentedanddiscussedbythe privacy community.Identifying high quality, as well as high potential, submissions was a di?cult balancing act. The program chairs would like to thank the Program Committee of PET 2006 for their invaluable work in helping select the best submissions: - Alessandro Acquisti, Heinz School, Carnegie Mellon University, USA - Mikhail Atallah, Purdue University, USA - Michael Backes, Saarland University, Germany - Alastair Beresford, University of Cambridge, UK - Nikita Borisov, University of Illinois at Urbana-Champaign, USA - Jan Camenisch, IBM Zurich Research Laboratory, Switzerland - Kim Cameron, Microsoft, USA - Fred Cate, Indiana University at Bloomington, USA - Roger Dingledine, The Free Haven Project, USA - Hannes Federrath, University of Regensburg, Germany - Simone Fischer-Hubner ¨ , Karlstad University, Sweden - Ian Goldberg, Zero Knowledge Systems, Canada - Markus Jakobsson, Indiana University at Bloomington, USA
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- IR (information retrieval) --- DES (data encryption standard) --- informatica --- maatschappij --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
Applied marketing --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- e-business --- informatica --- maatschappij --- e-commerce --- informatica management --- computernetwerken
Listing 1 - 10 of 13 | << page >> |
Sort by
|