Listing 1 - 10 of 43 | << page >> |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 16th International Conference on Information Security Practice and Experience, ISPEC 2021, held in Nanjing, China, in December 2021. The 23 full papers presented in this volume were carefully reviewed and selected from 94 submissions. The conference focus on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data protection. --- Data and Information Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.
Data encryption (Computer science). --- Computer communication systems. --- Operating systems (Computers). --- Computers and civilization. --- Management information systems. --- Computer science. --- Information storage and retrieval. --- Cryptology. --- Computer Communication Networks. --- Operating Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Information Storage and Retrieval. --- Computer security --- Computer networks --- Data protection --- Security measures
Choose an application
The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.
Data encryption (Computer science). --- Computer communication systems. --- Operating systems (Computers). --- Computers and civilization. --- Management information systems. --- Computer science. --- Information storage and retrieval. --- Cryptology. --- Computer Communication Networks. --- Operating Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Information Storage and Retrieval. --- Computer security --- Computer networks --- Data protection --- Security measures
Choose an application
The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.
Data encryption (Computer science). --- Computer communication systems. --- Operating systems (Computers). --- Computers and civilization. --- Management information systems. --- Computer science. --- Information storage and retrieval. --- Cryptology. --- Computer Communication Networks. --- Operating Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Information Storage and Retrieval. --- Computer security --- Computer networks --- Data protection --- Security measures
Choose an application
This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks.
Computer science. --- Data protection. --- Data encryption (Computer science). --- Information Systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Management of Computing and Information Systems. --- Engineering & Applied Sciences --- Computer Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Computer security. --- Management information systems. --- Computer security --- Computer networks --- Data encryption (Computer science) --- Security measures --- Cryptology. --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems
Choose an application
Electronic funds transfers. --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Electronic data interchange --- Electronic benefits transfers --- Home banking services
Choose an application
Electronic funds transfers. --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Electronic data interchange --- Electronic benefits transfers --- Home banking services
Choose an application
This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks.
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- DES (data encryption standard) --- computers --- informatica --- informatiesystemen --- computerbeveiliging --- informatica management --- computerkunde
Choose an application
Choose an application
Handbook of Blockchain, Digital Finance, and Inclusion, Volume 1: Cryptocurrency, FinTech, InsurTech, and Regulation explores recent advances in digital banking and cryptocurrency, emphasizing mobile technology and evolving uses of cryptocurrencies as financial assets. Contributors go beyond summaries of standard models to describe new banking business models that will be sustainable and will likely dictate the future of finance. The volume not only emphasizes the financial opportunities made possible by digital banking, such as financial inclusion and impact investing, but it also looks at engineering theories and developments that encourage innovation. Its ability to illuminate present potential and future possibilities make it a unique contribution to the literature. Explores recent advances in digital banking and cryptocurrency, emphasizing mobile technology and evolving uses of cryptocurrencies as financial assets Explains the practical consequences of both technologies and economics to readers who want to learn about subjects related to their specialties Encompasses alternative finance, financial inclusion, impact investing, decentralized consensus ledger and applied cryptography Provides the only advanced methodical summary of these subjects available today.
Listing 1 - 10 of 43 | << page >> |
Sort by
|