Narrow your search

Library

KU Leuven (9)

ULB (5)

ULiège (5)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

UCLL (4)

VIVES (4)

UGent (3)

AP (2)

More...

Resource type

book (14)

digital (2)


Language

English (16)


Year
From To Submit

2019 (2)

2017 (2)

2013 (1)

2007 (1)

2006 (1)

More...
Listing 1 - 10 of 16 << page
of 2
>>
Sort by

Book
Public Key Infrastructures, Services and Applications : 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
Authors: ---
ISBN: 3642400116 3642400124 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols, Public Key Infrastructure, Wireless Authentication and Revocation, Certificate and Trusted Computing, and Digital Structures.

Keywords

Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Systems and Data Security. --- Public key infrastructure (Computer security) --- Computer security --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Information Systems. --- Computer software. --- Cryptology. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Software, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Protection --- Security measures --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Communication systems --- Distributed processing


Book
ICT Systems Security and Privacy Protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings
Authors: ---
ISBN: 3319584693 3319584685 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks.

Keywords

Computer science. --- Computer security. --- Data encryption (Computer science). --- Application software. --- Computers and civilization. --- Computers. --- Law and legislation. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Legal Aspects of Computing. --- Computer Applications. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Civilization and computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Civilization --- Computer software --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Cryptology. --- Law and legislation --- Computer networks --- Data protection. --- Cryptography. --- Information technology --- Data and Information Security. --- Computer and Information Systems Applications. --- Technology and law --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing


Digital
ICT Systems Security and Privacy Protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings
Authors: ---
ISBN: 9783319584690 Year: 2017 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks.


Digital
Computer Security - ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings
Authors: --- ---
ISBN: 9783540319818 Year: 2005 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Book
Dependability in Sensor, Cloud, and Big Data Systems and Applications : 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings
Authors: --- --- ---
ISBN: 981151304X 9811513031 Year: 2019 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys, held in Guangzhou, China, in November 2019. The volume presents 39 full papers, which were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on dependability and security fundamentals and technologies; dependable and secure systems; dependable and secure applications; dependability and security measures and assessments; explainable artificial inteligence for cyberspace.

Keywords

Computer security. --- Computer communication systems. --- Special purpose computers. --- Architecture, Computer. --- Coding theory. --- Information theory. --- Database management. --- Systems and Data Security. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Computer System Implementation. --- Coding and Information Theory. --- Database Management. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Architecture, Computer --- Special purpose computers --- Computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection --- Security measures --- Computer security --- Computer networks


Book
Dependability in Sensor, Cloud, and Big Data Systems and Applications
Authors: --- --- --- ---
ISBN: 9789811513046 Year: 2019 Publisher: Singapore Springer Singapore :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Computer security--ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings

Loading...
Export citation

Choose an application

Bookmark

Abstract

Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12–14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty,and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm- ted, 27 were selected for presentation at the conference, giving an acceptance rate of about 16%. The conference program also includes an invited talk by Barbara Simons. There is a long list of people who volunteered their time and energy to put together the symposiom and who deserve acknowledgment. Thanks to all the members of the program committee, and the external reviewers, for all their hard work in evaluating and discussing papers. We are also very grateful to all those people whose work ensured a smooth organizational process: Pierangela Samarati, who served as General Chair, Claudio Ardagna, who served as P- licity Chair, Dieter Gollmann who served as Publication Chair and collated this volume, and Emilia Rosti and Olga Scotti for helping with local arrangements. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the program stimulating.


Book
Computer security--ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings

Loading...
Export citation

Choose an application

Bookmark

Abstract

Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12–14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty,and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm- ted, 27 were selected for presentation at the conference, giving an acceptance rate of about 16%. The conference program also includes an invited talk by Barbara Simons. There is a long list of people who volunteered their time and energy to put together the symposiom and who deserve acknowledgment. Thanks to all the members of the program committee, and the external reviewers, for all their hard work in evaluating and discussing papers. We are also very grateful to all those people whose work ensured a smooth organizational process: Pierangela Samarati, who served as General Chair, Claudio Ardagna, who served as P- licity Chair, Dieter Gollmann who served as Publication Chair and collated this volume, and Emilia Rosti and Olga Scotti for helping with local arrangements. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the program stimulating.


Book
Computer security--ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings

Loading...
Export citation

Choose an application

Bookmark

Abstract

Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12–14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty,and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm- ted, 27 were selected for presentation at the conference, giving an acceptance rate of about 16%. The conference program also includes an invited talk by Barbara Simons. There is a long list of people who volunteered their time and energy to put together the symposiom and who deserve acknowledgment. Thanks to all the members of the program committee, and the external reviewers, for all their hard work in evaluating and discussing papers. We are also very grateful to all those people whose work ensured a smooth organizational process: Pierangela Samarati, who served as General Chair, Claudio Ardagna, who served as P- licity Chair, Dieter Gollmann who served as Publication Chair and collated this volume, and Emilia Rosti and Olga Scotti for helping with local arrangements. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the program stimulating.

Data and applications security XVII : status and prospects, IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA
Authors: --- --- ---
ISBN: 1280537795 9786610537792 1402080700 1402080697 Year: 2004 Publisher: Boston, Massachusetts : Kluwer Academic Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats. Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include: -Information Warfare, -Information Assurance, -Security and Privacy, -Authorization and Access Control in Distributed Systems, -Security Technologies for the Internet, -Access Control Models and Technologies, -Digital Forensics. This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security. Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector.

Listing 1 - 10 of 16 << page
of 2
>>
Sort by