Narrow your search

Library

ULB (2)

EhB (1)

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULiège (1)

VIVES (1)


Resource type

book (2)


Language

English (2)


Year
From To Submit

2009 (2)

Listing 1 - 2 of 2
Sort by

Book
Information security theory and practice. smart devices, pervasive systems, and ubiquitous networks : third IFIP WG 11.2 international workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 : proceedings
Author:
ISBN: 9783642039447 9783642039430 Year: 2009 Volume: 5746 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP 2009 held in Brussels, Belgium in September 2009. The 12 revised full papers presented were carefully reviewed and selected from 27 submissions for inclusion in the book; they are organized in topical sections on mobility, attacks and secure implementations, performance and security, and cryptography.


Book
Information security theory and practice : smart devices, pervasive systems, and ubiquitous networks : third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 : proceedings
Authors: --- ---
ISBN: 364203943X 3642039448 Year: 2009 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP 2009 held in Brussels, Belgium in September 2009. The 12 revised full papers presented were carefully reviewed and selected from 27 submissions for inclusion in the book; they are organized in topical sections on mobility, attacks and secure implementations, performance and security, and cryptography.

Keywords

Data protection --- Computer systems --- Smart cards --- Mobile computing --- Ubiquitous computing --- Computer Science --- Engineering & Applied Sciences --- Acess control --- Security measures --- Access control --- Pervasive computing --- UbiComp (Computer science) --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Computer science --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- Data Structures, Cryptology and Information Theory. --- Coding and Information Theory. --- Symbolic and Algebraic Manipulation. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Protection --- Distributed processing --- Embedded computer systems --- Context-aware computing --- Portable computers --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Data structures (Computer scienc. --- Algebra --- Cryptology. --- Data Structures and Information Theory. --- Data processing. --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics

Listing 1 - 2 of 2
Sort by