Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
One of the fundamental theses of this book is that logical consequence and logical truth are not simply given, but arise as conventions among the users of logic. Thus Syverson explains convention within a game-theoretic framework, as a kind of equilibrium between the strategies of players in a game where they share common knowledge of events--a revisiting of Lewis's Convention that argues that convention can be reasonably treated as coordination equilibria. Most strikingly, a realistic solution is provided for Gray's classic coordination problem, wherein two generals can only communicate with each other through unreliable means.
Choose an application
Electronic funds transfers --- Data encryption (Computer science) --- Electronic commerce --- Internet --- Computer networks --- Chiffrement (Informatique) --- Security measures --- Congresses --- Congrès --- Banking --- Finance --- Business & Economics --- Congrès --- DARPA Internet --- Internet (Computer network) --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Digital cash --- Digital currency --- Digital money --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Virtual money --- Computer science. --- Operating systems (Computers). --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Management information systems. --- Public finance. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Public Economics. --- Systems and Data Security. --- Data Encryption. --- Operating Systems. --- Management of Computing and Information Systems. --- Wide area networks (Computer networks) --- World Wide Web --- Commerce --- Information superhighway --- Electronic data interchange --- Electronic benefits transfers --- Home banking services --- Data structures (Computer scienc. --- Information Systems. --- Data Structures and Information Theory. --- Cryptology. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cameralistics --- Public finance --- Currency question --- Operating systems --- Protection --- Public finances --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems --- Electronic funds transfers - Security measures - Congresses --- Data encryption (Computer science) - Congresses --- Electronic commerce - Security measures - Congresses --- Internet - Security measures - Congresses --- Computer networks - Security measures - Congresses
Choose an application
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12–14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty,and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm- ted, 27 were selected for presentation at the conference, giving an acceptance rate of about 16%. The conference program also includes an invited talk by Barbara Simons. There is a long list of people who volunteered their time and energy to put together the symposiom and who deserve acknowledgment. Thanks to all the members of the program committee, and the external reviewers, for all their hard work in evaluating and discussing papers. We are also very grateful to all those people whose work ensured a smooth organizational process: Pierangela Samarati, who served as General Chair, Claudio Ardagna, who served as P- licity Chair, Dieter Gollmann who served as Publication Chair and collated this volume, and Emilia Rosti and Olga Scotti for helping with local arrangements. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the program stimulating.
Cryptography. --- Data encryption (Computer science). --- Computer networks. --- Operating systems (Computers). --- Database management. --- Electronic data processing --- Computers and civilization. --- Cryptology. --- Computer Communication Networks. --- Operating Systems. --- Database Management. --- IT Operations. --- Computers and Society. --- Management. --- Computer security --- Computers --- Access control
Choose an application
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12–14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty,and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm- ted, 27 were selected for presentation at the conference, giving an acceptance rate of about 16%. The conference program also includes an invited talk by Barbara Simons. There is a long list of people who volunteered their time and energy to put together the symposiom and who deserve acknowledgment. Thanks to all the members of the program committee, and the external reviewers, for all their hard work in evaluating and discussing papers. We are also very grateful to all those people whose work ensured a smooth organizational process: Pierangela Samarati, who served as General Chair, Claudio Ardagna, who served as P- licity Chair, Dieter Gollmann who served as Publication Chair and collated this volume, and Emilia Rosti and Olga Scotti for helping with local arrangements. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the program stimulating.
Cryptography. --- Data encryption (Computer science). --- Computer networks. --- Operating systems (Computers). --- Database management. --- Electronic data processing --- Computers and civilization. --- Cryptology. --- Computer Communication Networks. --- Operating Systems. --- Database Management. --- IT Operations. --- Computers and Society. --- Management. --- Computer security --- Computers --- Access control
Choose an application
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12–14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty,and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm- ted, 27 were selected for presentation at the conference, giving an acceptance rate of about 16%. The conference program also includes an invited talk by Barbara Simons. There is a long list of people who volunteered their time and energy to put together the symposiom and who deserve acknowledgment. Thanks to all the members of the program committee, and the external reviewers, for all their hard work in evaluating and discussing papers. We are also very grateful to all those people whose work ensured a smooth organizational process: Pierangela Samarati, who served as General Chair, Claudio Ardagna, who served as P- licity Chair, Dieter Gollmann who served as Publication Chair and collated this volume, and Emilia Rosti and Olga Scotti for helping with local arrangements. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the program stimulating.
Cryptography. --- Data encryption (Computer science). --- Computer networks. --- Operating systems (Computers). --- Database management. --- Electronic data processing --- Computers and civilization. --- Cryptology. --- Computer Communication Networks. --- Operating Systems. --- Database Management. --- IT Operations. --- Computers and Society. --- Management. --- Computer security --- Computers --- Access control
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Listing 1 - 10 of 11 | << page >> |
Sort by
|