Listing 1 - 9 of 9 |
Sort by
|
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
Computer science. --- Computer communication systems. --- Special purpose computers. --- Architecture, Computer. --- Computer security. --- Data structures (Computer science). --- Computer science --- Computer Science. --- Systems and Data Security. --- Data Structures, Cryptology and Information Theory. --- Computer Communication Networks. --- Computer System Implementation. --- Special Purpose and Application-Based Systems. --- Mathematics of Computing. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Architecture, Computer --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Mathematics. --- Mathematics --- Protection --- Security measures --- File organization (Computer science) --- Abstract data types (Computer science) --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Science --- Distributed processing --- Data structures (Computer scienc. --- Computer network architectures. --- Software engineering. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Computer software engineering --- Engineering --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer security --- Telecommunication systems --- Information technology --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Computer science—Mathematics. --- Data protection. --- Information theory. --- Computer networks. --- Computer systems. --- Computers, Special purpose. --- Data and Information Security. --- ADP systems (Computer systems) --- Computing systems --- Systems, Computer --- Communication theory --- Communication --- Cybernetics --- Data governance --- Data regulation --- Personal data protection --- Protection, Data
Choose an application
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Security for Information Technology and Communications, SecITC 2019, held in Bucharest, Romania, in November 2019. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 34 submissions. The papers present a wide range from cryptographic algorithms, to digital forensic and cyber security.
Computer security. --- Computer networks --- Computer communication systems. --- Architecture, Computer. --- Application software. --- Systems and Data Security. --- Mobile and Network Security. --- Security Services. --- Computer Communication Networks. --- Computer System Implementation. --- Information Systems Applications (incl. Internet). --- Security measures. --- Computer networks. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Protection --- Security measures --- Distributed processing --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Architecture, Computer
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algorithms and Protocols, Security Technologies for IT&C, Information Security Management, Cyber Defense, and Digital Forensics. .
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Information storage and retrieval. --- Computer Science. --- Systems and Data Security. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Data Encryption. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Informatics --- Science --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Protection --- Security measures --- Distributed processing --- Information storage and retrieva. --- Computer software. --- Cryptology. --- Software, Computer --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Telecommunication systems --- Information technology --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algorithms and Protocols, Security Technologies for IT&C, Information Security Management, Cyber Defense, and Digital Forensics. .
Information retrieval --- Complex analysis --- Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- cryptografie --- complexe analyse (wiskunde) --- applicatiebeheer --- apps --- informatica --- informatiesystemen --- algoritmen --- computerbeveiliging --- computernetwerken --- architectuur (informatica)
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Security for Information Technology and Communications, SecITC 2019, held in Bucharest, Romania, in November 2019. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 34 submissions. The papers present a wide range from cryptographic algorithms, to digital forensic and cyber security.
Programming --- Computer architecture. Operating systems --- applicatiebeheer --- apps --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- netwerk management
Choose an application
Choose an application
Programming --- Computer architecture. Operating systems --- applicatiebeheer --- apps --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- netwerk management
Choose an application
Listing 1 - 9 of 9 |
Sort by
|