Narrow your search

Library

KU Leuven (3)

EhB (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

UGent (2)

ULB (2)

ULiège (2)

VIVES (2)

More...

Resource type

book (5)

digital (1)


Language

English (5)


Year
From To Submit

2016 (1)

2010 (3)

1997 (1)

Listing 1 - 5 of 5
Sort by

Multi
Engineering Secure Software and Systems : Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings
Authors: --- ---
ISBN: 9783642117473 9783642117480 9783642117466 Year: 2010 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Second International Symposium on Engineering Secure Software and Systems, ESSoS 2010, held in Pisa, Italy, in February 2010. The 9 revised full papers presented together with 8 ideas papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on attack analysis and prevention, policy verification and enforcement, and secure system and software development.


Book
Engineering Secure Software and Systems : Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings
Authors: --- --- ---
ISBN: 9783642117473 9783642117480 9783642117466 Year: 2010 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Second International Symposium on Engineering Secure Software and Systems, ESSoS 2010, held in Pisa, Italy, in February 2010. The 9 revised full papers presented together with 8 ideas papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on attack analysis and prevention, policy verification and enforcement, and secure system and software development.


Book
A short course in Java security.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Engineering secure software and systems : second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 ; proceedings
Authors: --- --- --- ---
ISBN: 3642117465 9786613563552 3642117473 1280385634 Year: 2010 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Second International Symposium on Engineering Secure Software and Systems, ESSoS 2010, held in Pisa, Italy, in February 2010. The 9 revised full papers presented together with 8 ideas papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on attack analysis and prevention, policy verification and enforcement, and secure system and software development.

Keywords

Computer security --- Software engineering --- Sensor networks --- Computer Science --- Telecommunications --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Computer communication systems. --- Software engineering. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computers. --- Computer Science. --- Computer Communication Networks. --- Software Engineering/Programming and Operating Systems. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Math Applications in Computer Science. --- Models and Principles. --- Mathematics. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Distributed processing --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Computer science—Mathematics.


Book
Financial Cryptography and Data Security : FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers
Authors: --- --- --- --- --- et al.
ISBN: 3662533561 366253357X Year: 2016 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of three workshops held at the 20th International Conference on Financial Cryptography and Data Security, FC 2016, in Christ Church, Barbados, in February 2016. The 22 full papers presented were carefully reviewed and selected from 49 submissions. They feature the outcome of the Second Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, the First Workshop on Secure Voting Systems, VOTING 2016, and the 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016.

Keywords

Computer science. --- Computer security. --- Data encryption (Computer science). --- Application software. --- Computers and civilization. --- Management information systems. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- e-Commerce/e-business. --- Computer Appl. in Administrative Data Processing. --- Computers and Society. --- Management of Computing and Information Systems. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Civilization and computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Commerce --- Information superhighway --- Sociotechnical systems --- Information resources management --- Management --- Civilization --- Computer software --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Communication systems --- Information systems. --- Information Systems. --- Cryptology. --- Data encryption (Computer science)

Listing 1 - 5 of 5
Sort by