Listing 1 - 5 of 5 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the Second International Symposium on Engineering Secure Software and Systems, ESSoS 2010, held in Pisa, Italy, in February 2010. The 9 revised full papers presented together with 8 ideas papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on attack analysis and prevention, policy verification and enforcement, and secure system and software development.
Mathematics --- Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- cryptografie --- computers --- informatica --- computerbesturingssystemen --- externe fixatie (geneeskunde --- programmeren (informatica) --- informatietechnologie --- wiskunde --- software engineering --- computernetwerken
Choose an application
This book constitutes the refereed proceedings of the Second International Symposium on Engineering Secure Software and Systems, ESSoS 2010, held in Pisa, Italy, in February 2010. The 9 revised full papers presented together with 8 ideas papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on attack analysis and prevention, policy verification and enforcement, and secure system and software development.
Mathematics --- Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- cryptografie --- computers --- informatica --- computerbesturingssystemen --- externe fixatie (geneeskunde --- programmeren (informatica) --- informatietechnologie --- wiskunde --- software engineering --- computernetwerken
Choose an application
Choose an application
This book constitutes the refereed proceedings of the Second International Symposium on Engineering Secure Software and Systems, ESSoS 2010, held in Pisa, Italy, in February 2010. The 9 revised full papers presented together with 8 ideas papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on attack analysis and prevention, policy verification and enforcement, and secure system and software development.
Computer security --- Software engineering --- Sensor networks --- Computer Science --- Telecommunications --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Computer communication systems. --- Software engineering. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computers. --- Computer Science. --- Computer Communication Networks. --- Software Engineering/Programming and Operating Systems. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Math Applications in Computer Science. --- Models and Principles. --- Mathematics. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Distributed processing --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Computer science—Mathematics.
Choose an application
This book constitutes the refereed proceedings of three workshops held at the 20th International Conference on Financial Cryptography and Data Security, FC 2016, in Christ Church, Barbados, in February 2016. The 22 full papers presented were carefully reviewed and selected from 49 submissions. They feature the outcome of the Second Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, the First Workshop on Secure Voting Systems, VOTING 2016, and the 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Application software. --- Computers and civilization. --- Management information systems. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- e-Commerce/e-business. --- Computer Appl. in Administrative Data Processing. --- Computers and Society. --- Management of Computing and Information Systems. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Civilization and computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Commerce --- Information superhighway --- Sociotechnical systems --- Information resources management --- Management --- Civilization --- Computer software --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Communication systems --- Information systems. --- Information Systems. --- Cryptology. --- Data encryption (Computer science)
Listing 1 - 5 of 5 |
Sort by
|