Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, held in St. Kitts, St. Kitts and Nevis in February 2019. The 32 revised full papers and 7 short papers were carefully selected and reviewed from 179 submissions. The papers are grouped in the following topical sections: Cryptocurrency Cryptanalysis, Measurement, Payment Protocol Security, Multiparty Protocols, Off-Chain Mechanisms, Fraud Detection, Game Theory, IoT Security and much more.
Computer security. --- Data encryption (Computer science). --- Software engineering. --- Application software. --- Computers. --- Computer system failures. --- Systems and Data Security. --- Cryptology. --- Software Engineering. --- Information Systems Applications (incl. Internet). --- The Computing Profession. --- System Performance and Evaluation. --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Failures --- Protection --- Security measures --- Data encryption (Computer science) --- User-centered system design
Choose an application
The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection IV, is the fourth volume in the annual series produced by IFIP Working Group 11.10 on Critical Infr- tructure Protection, an active international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Fourth Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at the National Defense University, Washington, DC, March 15– 17, 2010. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure prot- tion.
Ergodic theory. Information theory --- Mathematical control systems --- Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- coderen --- MIS (management informatie systeem) --- toegepaste informatica --- computers --- informatica --- programmeren (informatica) --- kernenergie --- informatietechnologie --- informatica management --- computerkunde --- informatietheorie
Choose an application
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference.
Electronic commerce -- Security measures. --- Electronic data processing departments -- Security measures. --- Privacy, Right of. --- Computer networks --- Data encryption (Computer science) --- Electronic commerce --- Computers --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Telecommunications --- Economic aspects --- Security measures --- Access control --- Computer networks. --- Computer network architectures. --- Computer science. --- Data protection. --- Data structures (Computer science) --- Economics. --- Security measures. --- Economic theory --- Political economy --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Architectures, Computer network --- Network architectures, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Business. --- Management science. --- Computer organization. --- Computer communication systems. --- Computer programming. --- Computer security. --- Data structures (Computer science). --- Computer Science. --- Systems and Data Security. --- Business and Management, general. --- Programming Techniques. --- Computer Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Computer Systems Organization and Communication Networks. --- Science --- Computer security --- Social sciences --- Economic man --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer architecture --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Trade --- Economics --- Management --- Commerce --- Industrial management --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Organization, Computer --- Electronic computer programming --- Programming (Electronic computers) --- Coding theory --- Quantitative business analysis --- Problem solving --- Operations research --- Statistical decision --- Programming
Choose an application
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection IV, is the fourth volume in the annual series produced by IFIP Working Group 11.10 on Critical Infr- tructure Protection, an active international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Fourth Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at the National Defense University, Washington, DC, March 15- 17, 2010. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure prot- tion.
Ergodic theory. Information theory --- Mathematical control systems --- Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- coderen --- MIS (management informatie systeem) --- toegepaste informatica --- computers --- informatica --- programmeren (informatica) --- kernenergie --- informatietechnologie --- informatica management --- computerkunde --- informatietheorie
Choose an application
Choose an application
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference.
Business policy --- Business management --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- computers --- informatica --- management --- computerbesturingssystemen --- programmeren (informatica) --- organisatiecultuur --- strategisch beleid --- informatietechnologie --- computerbeveiliging --- OS (operating system) --- computernetwerken
Choose an application
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference.
Computer Science. --- Systems and Data Security. --- Economics/Management Science, general. --- Computer Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Computer Systems Organization and Communication Networks. --- Computer science. --- Computer network architectures. --- Data protection. --- Data structures (Computer science). --- Economics. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Structures de données (Informatique) --- Economie politique --- Architectures --- Computer networks --- Data encryption (Computer science) --- Electronic commerce --- Computers --- Security measures --- Economic aspects --- Access control --- Computer networks - Security measures - Economic aspects - Congresses --- Data encryption (Computer science) - Economic aspects - Congresses --- Electronic commerce - Security measures - Congresses --- Computers - Access control - Economic aspects - Congresses
Choose an application
This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014. The 15 full papers and 3 poster abstracts presented were carefully reviewed and selected from 30 submissions. They are grouped in topical sections on Bitcoin transactions, policy and legal issues; Bitcoin security; improving digital currencies; posters, and WAHC papers.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Application software. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- e-Commerce/e-business. --- Computer Appl. in Administrative Data Processing. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Information systems. --- Cryptology. --- Data encryption (Computer science)
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- DES (data encryption standard) --- complexe analyse (wiskunde) --- ad-hocnetwerken --- informatica --- informatiesystemen --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014. The 15 full papers and 3 poster abstracts presented were carefully reviewed and selected from 30 submissions. They are grouped in topical sections on Bitcoin transactions, policy and legal issues; Bitcoin security; improving digital currencies; posters, and WAHC papers.
Office management --- Applied marketing --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- DES (data encryption standard) --- e-business --- bitcoin --- computers --- informatica --- bedrijfsadministratie --- informatiesystemen --- e-commerce --- computerbeveiliging --- computerkunde
Listing 1 - 10 of 12 | << page >> |
Sort by
|