Narrow your search

Library

KU Leuven (6)

ULB (2)

ULiège (2)

AP (1)

KDG (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UAntwerpen (1)

UCLL (1)

More...

Resource type

dissertation (4)

book (2)

digital (2)


Language

English (4)

German (4)


Year
From To Submit

2015 (3)

2014 (3)

2012 (1)

2001 (1)

Listing 1 - 8 of 8
Sort by

Book
ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
Authors: ---
ISBN: 9783319184678 3319184660 9783319184661 3319184679 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.

Keywords

Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Data Encryption. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Information Systems. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Engineering & Applied Sciences --- Computer Science --- Information storage and retrieval systems --- Systèmes d'information --- Computer communication systems. --- Computer security. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Computer networks. --- Cryptography. --- Data and Information Security. --- IT Operations. --- Management. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)


Digital
ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
Authors: ---
ISBN: 9783319184678 9783319184661 9783319184685 9783319387079 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.

Designing Privacy Enhancing Technologies : International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000. Proceedings
Authors: ---
ISBN: 3540417249 3540447024 Year: 2001 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous. This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues.

Keywords

Computer security --- Computer networks --- Computer Science --- Engineering & Applied Sciences --- Security measures --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Information storage and retrieval. --- Management information systems. --- Computer engineering. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Computer Engineering. --- Operating Systems. --- Management of Computing and Information Systems. --- Information Storage and Retrieval. --- Computers --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Design and construction --- Communication systems --- Operating systems --- Distributed processing --- Information Systems. --- Information storage and retrieva. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer networks. --- Data encryption (Computer science) --- Operating systems (Computers)


Dissertation
Datenschutzfreundliche Mechanismen zum Schutz vor gefälschten Nachrichten in vernetzten Fahrzeugen

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Dissertation
Gestaltung einer Plattform zur Komposition und Evaluation von Mix-basierten Anonymisierungsdiensten
Authors: --- --- ---
Year: 2014 Publisher: Hamburg Universität Hamburg. Fakultät für Mathematik, Informatik und Naturwissenschaften

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Dissertation
Beobachtungsmöglichkeiten im Domain Name System : Angriffe auf die Privatsphäre und Techniken zum Selbstdatenschutz
Authors: --- --- --- ---
Year: 2014 Publisher: Hamburg Universität Hamburg. Fakultät für Mathematik, Informatik und Naturwissenschaften

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Dissertation
Kollaboratives IT-Sicherheitsmanagement : Technische Lösungen zum unternehmensübergreifenden und sicheren Datenaustausch im IT-Sicherheitsmanagement
Authors: --- --- --- ---
Year: 2014 Publisher: Hamburg Universität Hamburg. Fakultät für Mathematik, Informatik und Naturwissenschaften

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Digital
Mensch & Computer 2012 : 12. fachübergreifende Konferenz für interaktive und kooperative Medien
Authors: --- --- --- --- --- et al.
ISBN: 9783486718782 9783486718799 Year: 2012 Publisher: Berlin ;; Boston Oldenbourg Wissenschaftsverlag

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 8 of 8
Sort by