Listing 1 - 10 of 48 | << page >> |
Sort by
|
Choose an application
Computer architecture. Operating systems --- Computer security --- Sécurité informatique --- AA / International- internationaal --- 681.3*E3 --- 681.3*D46 --- 681.3*C2 --- 654 --- 338.043 --- Data encryption: data encryption standard; DES; public key cryptosystems --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computer communication networks: data communications; OSI; security and protection --- Informatieverwerking. Bureautica. --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica. --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Computer security. --- Sécurité informatique --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica --- Informatieverwerking. Bureautica --- Protection --- Security measures --- 681.3 *C2
Choose an application
Computer security --- Sécurité informatique --- Congresses --- Congrès --- Sécurité informatique --- Congrès
Choose an application
This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996. The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.
Computers --- Ordinateurs --- Access control --- Passwords --- Congresses --- Accès --- Contrôle --- Mots de passe --- Congrès --- Congresses. --- Accès --- Contrôle --- Congrès --- Information theory. --- Data encryption (Computer science). --- Software engineering. --- Computer software. --- Coding theory. --- Combinatorics. --- Theory of Computation. --- Cryptology. --- Software Engineering/Programming and Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Coding and Information Theory. --- Combinatorics --- Algebra --- Mathematical analysis --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Software, Computer --- Computer systems --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication theory --- Communication --- Cybernetics --- Computers - Access control - Passwords - Congresses.
Choose an application
Computer security --- Sécurité informatique --- 681.3*C20 --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computerwetenschap--?*C20 --- Security measures --- Computer security. --- Cyber security --- Cybersecurity --- Sécurité informatique --- Protection of computer systems --- Protection --- 6813*C20
Choose an application
This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.
681.3*D46 --- 681.3*K65 --- 681.3*D46 Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- Security and protection: authentication insurance invasive software (e.g. viruses, worms, Trojan horses) physical security unauthorized access (e.g. hacking, phreaking) --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Protection --- Security measures
Choose an application
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Data Encryption. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Information Systems. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Engineering & Applied Sciences --- Computer Science --- Information storage and retrieval systems --- Systèmes d'information --- Computer communication systems. --- Computer security. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Computer networks. --- Cryptography. --- Data and Information Security. --- IT Operations. --- Management. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.
Computer science. --- Computer Communication Networks. --- Software engineering. --- Computer network architectures. --- Data protection. --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer System Implementation. --- Special Purpose and Application-Based Systems. --- Computer Science, general. --- Engineering & Applied Sciences --- Computer Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Architectures, Computer network --- Network architectures, Computer --- Computer software engineering --- Informatics --- Computer communication systems. --- Special purpose computers. --- Architecture, Computer. --- Computer security. --- Computer security --- Ubiquitous computing --- Cryptology. --- Science --- Engineering --- Computer architecture --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Special purpose computers --- Architecture, Computer --- Distributed processing
Choose an application
This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- computers --- informatica --- programmeren (informatica) --- software engineering --- computerbeveiliging --- computernetwerken --- computerkunde
Choose an application
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- MIS (management informatie systeem) --- cryptografie --- computers --- informatica --- computerbeveiliging --- informatica management --- computernetwerken --- computerkunde
Choose an application
This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013. The 18 revised regular papers together with 3 short papers and one invited talk were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security policies, information flow, security experiences, Web security, and network security.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computer security --- Computer networks --- Security measures --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Algorism --- Algebra --- Arithmetic --- Foundations
Listing 1 - 10 of 48 | << page >> |
Sort by
|