Narrow your search

Library

KU Leuven (5)

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

UCLL (5)

ULB (5)

ULiège (5)

VIVES (5)


Resource type

book (7)


Language

English (7)


Year
From To Submit

2010 (1)

2009 (1)

2008 (1)

2006 (1)

2005 (3)

Listing 1 - 7 of 7
Sort by

Book
Information Systems Security : 6th International Conference, ICISS 2010 ; Gandhinagar, India, December 17-19, 2010 : proceedings
Authors: --- ---
ISBN: 3642177131 364217714X Year: 2010 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Computer security --- Computers --- Information networks --- Access control --- Automated information networks --- Networks, Information --- Computer science. --- Computer communication systems. --- Computer security. --- Information storage and retrieval. --- User interfaces (Computer systems). --- Biometrics (Biology). --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- User Interfaces and Human Computer Interaction. --- Systems and Data Security. --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- Biometrics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Statistical methods --- Protection --- Security measures --- Distributed processing --- Information services --- Information storage and retrieval systems --- Information storage and retrieva. --- Information Systems. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval

Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings
Authors: --- --- ---
ISBN: 9783540689621 3540689621 354068963X Year: 2006 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Computers --- Sécurité informatique --- Ordinateurs --- Congresses. --- Access control --- Congrès --- Accès --- Contrôle --- Telecommunications --- Computer Science --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Information storage and retrieval. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- Computers and Society. --- Management of Computing and Information Systems. --- Information Storage and Retrieval. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Information storage and retrieva. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval


Book
Information systems security : 5th international conference, ICISS 2009, Kolkata, India, December 14-18, 2009 ; proceedings
Authors: --- --- ---
ISBN: 3642107710 3642107729 Year: 2009 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 5th International Conference on Information Systems Security, ICISS 2009, held in Kolkata, India, in December 2009. The 17 revised full papers and 4 short papers, presented together with 4 keynote talks were carefully reviewed and selected from 85 initial submissions. The papers are organized in topical sections on authentication, verification, systems security, behavior analysis, database security, and cryptography.

Keywords

Computer security --- Information networks --- Computers --- Computer Science --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Access control --- Information Technology --- Computer Science (Hardware & Networks) --- Automated information networks --- Networks, Information --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Information storage and retrieval. --- Biometrics (Biology). --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Systems and Data Security. --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- Biometrics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Statistical methods --- Protection --- Security measures --- Distributed processing --- Information services --- Information storage and retrieval systems --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval


Book
Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings
Authors: --- --- ---
Year: 2005 Publisher: Berlin ; New York : Springer,


Book
Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings
Authors: --- --- ---
Year: 2005 Publisher: Berlin ; New York : Springer,


Book
Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings
Authors: --- --- ---
Year: 2005 Publisher: Berlin ; New York : Springer,


Book
Information systems security : 4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008 : proceedings
Authors: --- --- ---
ISBN: 354089862X 3540898611 Year: 2008 Publisher: Berlin, Germany : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008. The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully reviewed and selected from 81 submissions. The papers span a wide range of topics including access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, operating system security, and privacy, and are organized in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications.

Keywords

Computer security --- Computers --- Access control --- Information Technology --- Computer Science (Hardware & Networks) --- Computer security. --- Computer Communication Networks. --- Information storage and retrieva. --- Information Systems. --- Biometrics. --- Data encryption (Computer science). --- Systems and Data Security. --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer communication systems. --- Information storage and retrieval. --- Management information systems. --- Computer science. --- Biometrics (Biology). --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Informatics --- Science --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Statistical methods --- Communication systems --- Distributed processing

Listing 1 - 7 of 7
Sort by