Narrow your search

Library

KU Leuven (6)

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

VIVES (5)

UCLL (4)

ULB (4)

ULiège (4)

VUB (4)

AP (3)

More...

Resource type

book (10)

digital (4)


Language

English (13)


Year
From To Submit

2024 (1)

2018 (2)

2017 (1)

2016 (2)

2013 (2)

More...
Listing 1 - 10 of 13 << page
of 2
>>
Sort by

Book
Trusted computing : principles and applications
Author:
ISBN: 3110476096 Year: 2018 Publisher: Berlin, [Germany] ; Boston, [Massachusetts] : De Gruyter : Tsinghua University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.


Book
Trusted computing : principles and applications
Author:
ISBN: 9783110477597 9783110477603 3110477602 3110477599 9783110476040 3110476045 9783110476095 3110476096 Year: 2018 Publisher: Berlin, [Germany] ; Boston, [Massachusetts] : De Gruyter : Tsinghua University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.


Book
Boolean Functions and Their Applications in Cryptography
Authors: ---
ISBN: 3662488639 3662488655 Year: 2016 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.


Digital
Boolean Functions and Their Applications in Cryptography
Authors: ---
ISBN: 9783662488652 Year: 2016 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.


Digital
Trusted Computing : Principles and Applications
Authors: ---
ISBN: 9783110477597 9783110476095 9783110476040 Year: 2017 Publisher: Berlin ;; Boston De Gruyter

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Information Security and Cryptology (vol. # 3822) : First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
Authors: --- ---
ISBN: 9783540324249 Year: 2005 Publisher: Berlin Heidelberg Springer-Verlag GmbH

Loading...
Export citation

Choose an application

Bookmark

Abstract

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer's Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions.

Information security and cryptology : first SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005 : proceedings
Authors: --- --- --- ---
ISBN: 9783540308553 3540308555 3540324240 Year: 2005 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer’s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions.

Keywords

Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Congresses. --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Coding and Information Theory. --- Computer Communication Networks. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Operating systems --- Distributed processing --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Cryptography. --- Computer networks. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)


Book
Cyberspace Safety and Security : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings
Authors: --- --- ---
ISBN: 3319035835 3319035843 Year: 2013 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.

Keywords

Computer science. --- Computer Communication Networks. --- Data protection. --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computers and Society. --- Engineering & Applied Sciences --- Computer Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Computer communication systems. --- Computer security. --- Computers and civilization. --- Internet --- Security measures --- Safety measures --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Cryptology. --- Science --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Computer networks. --- Data encryption (Computer science)


Book
Information Security and Cryptology : First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings
Authors: --- --- ---
ISBN: 9783540324249 Year: 2005 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer's Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions.


Book
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Authors: ---
ISBN: 1605589365 Year: 2010 Publisher: ACM

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 13 << page
of 2
>>
Sort by