Listing 1 - 10 of 20 | << page >> |
Sort by
|
Choose an application
Data encryption (Computer science) --- User-centered system design --- Computer security --- Cognitive engineering (System design) --- Participatory design (System design) --- UCD (System design) --- Usability engineering (System design) --- User-centered design (System design) --- System design --- Human-computer interaction
Choose an application
Computer networks. --- Data encryption (Computer science) --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Protection --- Security measures --- Distributed processing
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- maatschappij --- informatica management --- computernetwerken
Choose an application
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021. The 47 revised full papers and 4 short papers together with 3 as Systematization of Knowledge (SoK) papers were carefully selected and reviewed from 223 submissions. The accepted papers were organized according to their topics in 12 sessions: Smart Contracts, Anonymity and Privacy in Cryptocurrencies, Secure Multi-Party Computation, System and Application Security, Zero-Knowledge Proofs, Blockchain Protocols, Payment Channels, Mining, Scaling Blockchains, Authentication and Usability, Measurement, and Cryptography.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheid (technologie) --- cryptografie --- applicatiebeheer --- apps --- informatica --- netwerken (informatica) --- computerbeveiliging --- OS (operating system) --- computernetwerken --- architectuur (informatica) --- mobiele communicatie
Choose an application
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021. The 47 revised full papers and 4 short papers together with 3 as Systematization of Knowledge (SoK) papers were carefully selected and reviewed from 223 submissions. The accepted papers were organized according to their topics in 12 sessions: Smart Contracts, Anonymity and Privacy in Cryptocurrencies, Secure Multi-Party Computation, System and Application Security, Zero-Knowledge Proofs, Blockchain Protocols, Payment Channels, Mining, Scaling Blockchains, Authentication and Usability, Measurement, and Cryptography.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- applicatiebeheer --- apps --- informatica --- programmeren (informatica) --- computerbeveiliging --- OS (operating system) --- architectuur (informatica)
Choose an application
This book features interviews with 19 scholars who do research with children in a variety of contexts. It examines how these key scholars address research 'after the child’ by exploring the opportunities and challenges of drawing on posthumanist and materialist methodologies that unsettle humanist research practices. The book reflects on how posthumanist and materialist approaches have informed research in relation to de-centering the child, re-thinking methodological concepts of voice, agency, data, analysis and representation. It also explores what the future of research after the child might entail and offers suggestions to new and emerging scholars involved in research with children. Reviewing how posthumanist and materialist approaches have informed authors’ thinking about children, research and knowledge production, the book will appeal to graduate students and emerging scholars in the field of childhood studies who wish to experiment with posthumanist methodologies and materialist approaches.
Developmental psychology --- Age group sociology --- Sociology of education --- Research on teaching --- ontwikkeling van het kind --- onderwijs --- onderwijsonderzoek
Choose an application
This book constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011, held in Leuven, Belgium, in September 2011. The 36 papers included in the book were carefully reviewed and selected from 155 papers. The articles are organized in topical sections on wireless security; Web security; forensics, biometrics and software protection; access control; cryptography and protocol analysis; information flow, side channels, and vulnerability analysis; usability, trust, and economics of security and privacy; and privacy.
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- maatschappij --- informatica management --- computernetwerken
Choose an application
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheid (technologie) --- cryptografie --- applicatiebeheer --- apps --- informatica --- netwerken (informatica) --- computerbeveiliging --- OS (operating system) --- computernetwerken --- architectuur (informatica) --- mobiele communicatie
Choose an application
Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- applicatiebeheer --- apps --- informatica --- programmeren (informatica) --- computerbeveiliging --- OS (operating system) --- architectuur (informatica)
Choose an application
This book features interviews with 19 scholars who do research with children in a variety of contexts. It examines how these key scholars address research 'after the child’ by exploring the opportunities and challenges of drawing on posthumanist and materialist methodologies that unsettle humanist research practices. The book reflects on how posthumanist and materialist approaches have informed research in relation to de-centering the child, re-thinking methodological concepts of voice, agency, data, analysis and representation. It also explores what the future of research after the child might entail and offers suggestions to new and emerging scholars involved in research with children. Reviewing how posthumanist and materialist approaches have informed authors’ thinking about children, research and knowledge production, the book will appeal to graduate students and emerging scholars in the field of childhood studies who wish to experiment with posthumanist methodologies and materialist approaches.
Children --- Child research --- Research. --- Child development. --- Education—Research. --- Educational sociology . --- Education and sociology. --- Educational sociology. --- Early Childhood Education. --- Research Methods in Education. --- Sociology of Education. --- Education and sociology --- Social problems in education --- Society and education --- Sociology, Educational --- Sociology --- Education --- Child study --- Development, Child --- Developmental biology --- Aims and objectives --- Development --- Early childhood education. --- Educational research
Listing 1 - 10 of 20 | << page >> |
Sort by
|