Narrow your search

Library

KU Leuven (13)

ULB (13)

ULiège (13)

AP (11)

KDG (11)

Odisee (11)

Thomas More Kempen (11)

Thomas More Mechelen (11)

UCLL (11)

VIVES (11)

More...

Resource type

book (26)

digital (11)


Language

English (36)


Year
From To Submit

2021 (4)

2019 (2)

2018 (3)

2014 (2)

2012 (5)

More...
Listing 1 - 10 of 36 << page
of 4
>>
Sort by

Book
Information Security and Privacy : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
Authors: ---
ISBN: 3319083430 3319083449 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.


Book
Advances in web-based learning - ICWL 2021 : 20th international conference, ICWL 2021, Macau, China, November 13-14, 2021, proceedings
Authors: ---
ISBN: 3030907848 3030907856 Year: 2021 Publisher: Cham, Switzerland : Springer,


Digital
Information Security and Privacy : 6th Australasian Conference, ACISP 2001 Sydney, Australia, July 11–13, 2001 Proceedings
Authors: ---
ISBN: 9783540477198 Year: 2006 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg


Digital
Information Security and Privacy : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
Authors: ---
ISBN: 9783319083445 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.


Digital
Advances in Web-Based Learning - ICWL 2021 : 20th International Conference, ICWL 2021, Macau, China, November 13-14, 2021, Proceedings
Authors: ---
ISBN: 9783030907853 9783030907860 9783030907846 Year: 2021 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 20th International Conference on Advances in Web-Based Learning, ICWL 2021, which was held in Macau, China, in November 2021. The papers included in this volume deal with multiple topics, from algorithms to systems and applications and are organized in 3 tracks: Online learning methodologies, trust, and analysis; Online learning environment with tools; Online learning privacy issues and special tools.


Book
Network and System Security : 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings
Authors: --- ---
ISBN: 3642346006 3642346014 Year: 2012 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Database management. --- Management information systems. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Database Management. --- Management of Computing and Information Systems. --- e-Commerce/e-business. --- Information Systems. --- Cryptology. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer networks --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Communication systems --- Distributed processing


Book
Introduction to Security Reduction
Authors: --- ---
ISBN: 3319930494 3319930486 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.


Book
Cryptology and Network Security : 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings
Authors: --- ---
ISBN: 3030315789 3030315770 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security, CANS 2019, held in Fuzhou, China, in October 2019. The 21 full papers and 8 short papers were carefully reviewed and selected from 55 submissions. The papers focus on topics such as homomorphic encryption; SIKE and Hash; lattice and post-quantum cryptography; searchable encryption; blockchains, cloud security; secret sharing and interval test, LWE; encryption, data aggregation, and revocation; and signature, ML, payment, and factorization.

Keywords

Data encryption (Computer science). --- Software engineering. --- Artificial intelligence. --- Data mining. --- Special purpose computers. --- Computer communication systems. --- Cryptology. --- Software Engineering/Programming and Operating Systems. --- Artificial Intelligence. --- Data Mining and Knowledge Discovery. --- Special Purpose and Application-Based Systems. --- Computer Communication Networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Special purpose computers --- Computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Distributed processing --- Data encryption (Computer science)


Book
Advances in Web-Based Learning – ICWL 2021
Authors: --- ---
ISBN: 9783030907853 9783030907860 9783030907846 Year: 2021 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Cryptology and Network Security (vol. # 4301) : 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings
Authors: --- ---
ISBN: 9783540494638 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH

Listing 1 - 10 of 36 << page
of 4
>>
Sort by