Narrow your search

Library

KU Leuven (23)

ULiège (20)

ULB (19)

VUB (14)

AP (12)

KDG (12)

Odisee (12)

Thomas More Kempen (12)

Thomas More Mechelen (12)

UCLL (12)

More...

Resource type

book (40)

digital (12)

dissertation (1)


Language

English (47)

German (1)


Year
From To Submit

2023 (2)

2020 (2)

2018 (2)

2017 (3)

2015 (2)

More...
Listing 1 - 10 of 48 << page
of 5
>>
Sort by
Computer security
Author:
ISBN: 0470862939 9780470862933 Year: 2006 Publisher: Chichester Wiley

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer architecture. Operating systems --- Computer security --- Sécurité informatique --- AA / International- internationaal --- 681.3*E3 --- 681.3*D46 --- 681.3*C2 --- 654 --- 338.043 --- Data encryption: data encryption standard; DES; public key cryptosystems --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computer communication networks: data communications; OSI; security and protection --- Informatieverwerking. Bureautica. --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica. --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Computer security. --- Sécurité informatique --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica --- Informatieverwerking. Bureautica --- Protection --- Security measures --- 681.3 *C2

Computer security ESORICS 94. Third european symposium on research in computer security, Brighton, UK, November 1994. Proceedings
Author:
ISBN: 0387586180 3540586180 Year: 1994 Volume: 875 Publisher: Berlin : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Fast Software Encryption : third international workshop, Cambridge, UK, February 1996. Proceedings
Author:
ISBN: 3540608656 3540496521 9783540608653 Year: 1996 Volume: 1039 Publisher: Berlin [etc.] : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996. The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.

Computer security
Author:
ISBN: 0471978442 Year: 1999 Publisher: Chichester Wiley


Book
Computer security
Author:
ISBN: 9780470741153 0470741155 Year: 2011 Publisher: Chichester Wiley

Loading...
Export citation

Choose an application

Bookmark

Abstract

This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.


Book
ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
Authors: ---
ISBN: 9783319184678 3319184660 9783319184661 3319184679 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.

Keywords

Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Data Encryption. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Information Systems. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Engineering & Applied Sciences --- Computer Science --- Information storage and retrieval systems --- Systèmes d'information --- Computer communication systems. --- Computer security. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Computer networks. --- Cryptography. --- Data and Information Security. --- IT Operations. --- Management. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)


Book
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems : 7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedings
Authors: ---
ISBN: 364238529X 3642385303 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with  two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.

Keywords

Computer science. --- Computer Communication Networks. --- Software engineering. --- Computer network architectures. --- Data protection. --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer System Implementation. --- Special Purpose and Application-Based Systems. --- Computer Science, general. --- Engineering & Applied Sciences --- Computer Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Architectures, Computer network --- Network architectures, Computer --- Computer software engineering --- Informatics --- Computer communication systems. --- Special purpose computers. --- Architecture, Computer. --- Computer security. --- Computer security --- Ubiquitous computing --- Cryptology. --- Science --- Engineering --- Computer architecture --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Special purpose computers --- Architecture, Computer --- Distributed processing


Digital
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems : 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
Authors: ---
ISBN: 9783642385308 Year: 2013 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with  two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.


Digital
ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
Authors: ---
ISBN: 9783319184678 9783319184661 9783319184685 9783319387079 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.


Book
Secure IT Systems : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings
Authors: ---
ISBN: 3642414877 3642414885 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013. The 18 revised regular papers together with 3 short papers and one invited talk were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security policies, information flow, security experiences, Web security, and network security.

Listing 1 - 10 of 48 << page
of 5
>>
Sort by