Listing 1 - 8 of 8 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Data Encryption. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Information Systems. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Engineering & Applied Sciences --- Computer Science --- Information storage and retrieval systems --- Systèmes d'information --- Computer communication systems. --- Computer security. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Computer networks. --- Cryptography. --- Data and Information Security. --- IT Operations. --- Management. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- MIS (management informatie systeem) --- cryptografie --- computers --- informatica --- computerbeveiliging --- informatica management --- computernetwerken --- computerkunde
Choose an application
Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous. This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues.
Computer security --- Computer networks --- Computer Science --- Engineering & Applied Sciences --- Security measures --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Information storage and retrieval. --- Management information systems. --- Computer engineering. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Computer Engineering. --- Operating Systems. --- Management of Computing and Information Systems. --- Information Storage and Retrieval. --- Computers --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Design and construction --- Communication systems --- Operating systems --- Distributed processing --- Information Systems. --- Information storage and retrieva. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer networks. --- Data encryption (Computer science) --- Operating systems (Computers)
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Listing 1 - 8 of 8 |
Sort by
|