Narrow your search

Library

ULiège (10)

ULB (9)

KU Leuven (8)

AP (2)

KBR (2)

KDG (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

More...

Resource type

book (11)

digital (2)


Language

English (13)


Year
From To Submit

2013 (2)

2010 (3)

2004 (1)

2002 (1)

2000 (1)

More...
Listing 1 - 10 of 13 << page
of 2
>>
Sort by
Advances in cryptology - ASIACRYPT 2002 : 8th international conference on the theory and application of crytpology and information security Queenstown, New Zealand, december 2002. Proceedings
Author:
ISBN: 3540001719 3540361782 Year: 2002 Volume: 2501 Publisher: New York, NY ; Berlin : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002. The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures, applications, Boolean functions, key management, and ID-based cryptography.

Keywords

Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Congresses --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Congrès --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer science --- Computer Science. --- Coding and Information Theory. --- Data Encryption. --- Computer Communication Networks. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer software. --- Computational complexity. --- Cryptology. --- Software, Computer --- Computer systems --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Complexity, Computational --- Electronic data processing --- Machine theory --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Operating systems --- Information theory. --- Computer science—Mathematics. --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Communication theory --- Communication --- Cybernetics --- Foundations --- Distributed processing


Book
Tunable multiband ferroelectric devices for reconfigurable RF-frontends
Author:
ISBN: 3642442986 3642357792 3642357806 1299197914 Year: 2013 Publisher: Heidelberg [Germany] : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Reconfigurable RF-frontends aim to cope with the continuous pursuit of wider frequency coverage, higher efficiency, further compactness and lower cost of ownership. They are expected to lay the foundations of future software defined or cognitive radios. As a potential enabling technology for the frontends, the tunable ferroelectric devices have shown not only enhanced performance but also new functionalities. This book explores the recent developments in the field. It provides a cross-sectional perspective on the interdisciplinary research. With attention to the devices based on ceramic thick-films and crystal thin-films, the book reviews the adapted technologies of material synthesis, film deposition and multilayer circuitry. Next, it highlights the original classes of thin-film ferroelectric devices, including stratified metal-insulator-metal varactors with suppression of acoustic resonance and programmable bi-stable high frequency capacitors. At the end the book analyzes how the frontends can be reformed by tunable multiband antennas, tunable single- and multiband impedance matching networks and tunable substrate integrated waveguide filters, which are all built on low cost ferroelectric thick-films. For all the above devices, the theoretical analyses, modeling and design methods are elaborated, while through demonstrative prototypes the application potential is evaluated.


Digital
Tunable Multiband Ferroelectric Devices for Reconfigurable RF-Frontends
Author:
ISBN: 9783642357800 Year: 2013 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Reconfigurable RF-frontends aim to cope with the continuous pursuit of wider frequency coverage, higher efficiency, further compactness and lower cost of ownership. They are expected to lay the foundations of future software defined or cognitive radios. As a potential enabling technology for the frontends, the tunable ferroelectric devices have shown not only enhanced performance but also new functionalities. This book explores the recent developments in the field. It provides a cross-sectional perspective on the interdisciplinary research. With attention to the devices based on ceramic thick-films and crystal thin-films, the book reviews the adapted technologies of material synthesis, film deposition and multilayer circuitry. Next, it highlights the original classes of thin-film ferroelectric devices, including stratified metal-insulator-metal varactors with suppression of acoustic resonance and programmable bi-stable high frequency capacitors. At the end the book analyzes how the frontends can be reformed by tunable multiband antennas, tunable single- and multiband impedance matching networks and tunable substrate integrated waveguide filters, which are all built on low cost ferroelectric thick-films. For all the above devices, the theoretical analyses, modeling and design methods are elaborated, while through demonstrative prototypes the application potential is evaluated.

Advance in cryptology - AUSCRYPT 92. Workshop on the theory and application of cryptographic techniques, Gold Coast, Queensland, Australia, December 1992. Proceedings
Authors: ---
ISBN: 3540572201 0387572201 Year: 1993 Volume: 718 Publisher: Berlin : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Public Key cryptography. First international workshop on practice and theory in public key cryptography, PKC 98, Pacifico Yokohama, Japan, February 1998. Proceedings
Authors: ---
Year: 1998 Publisher: Berlin [etc.] : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Practical signcryption
Authors: ---
ISBN: 9783540894094 9783540894117 Year: 2010 Publisher: Berlin ; Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the "encrypt-then-sign" method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.


Book
Practical Signcryption
Authors: ---
ISBN: 3540894098 9786612981074 354089411X 1282981072 Year: 2010 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the “encrypt-then-sign” method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.


Digital
Practical Signcryption
Authors: ---
ISBN: 9783540894117 9783540894094 9783540894735 9783642265938 Year: 2010 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the “encrypt-then-sign” method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.

Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings
Authors: --- --- ---
ISBN: 3540666958 354047790X Year: 1999 Volume: 1729 Publisher: Berlin ; Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Computers --- Sécurité informatique --- Congresses --- Access control --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Congrès --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Mathematics. --- Computer software. --- Computational complexity. --- Information Systems. --- Cryptology. --- Complexity, Computational --- Electronic data processing --- Machine theory --- Software, Computer --- Computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer science—Mathematics. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Algorism --- Algebra --- Arithmetic --- Communication systems --- Distributed processing --- Foundations

Information Security : 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings
Authors: --- ---
ISBN: 3540301445 3540232087 9783540232087 Year: 2004 Volume: 3225 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend c- tinuedintheprogramofthisyear’sconference.Theprogramcommitteereceived 106 submissions, from which 36 were selected for presentation. Each submission was reviewed by at least three experts in the relevant research area. We would liketothankalltheauthorsfortakingtheirtimetopreparethesubmissions,and wehopethatthosewhosepapersweredeclinedwillbeableto?ndanalternative forum for their work. We were fortunate to have an energetic team of experts who took on the task of the program committee. Their names may be found overleaf, and we thank them warmly for their time and e?orts. This team was helped by an even larger number of external reviewers who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete. We would also like to thank the advisory committee for their advice and s- port.TheexcellentlocalarrangementswerehandledbyDirkBalfanzandJessica Staddon. We made use of the electronic submission and reviewing software s- plied by COSIC at the Katholieke Universiteit Leuven. Both the software and the ISC 2004 website were run on a server at UNC Charlotte, and were perfectly maintained by Seung-Hyun Im. We also appreciate assistance from Lawrence Teo in editing the proceedings.

Keywords

Computer science. --- Computer Communication Networks. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computer software. --- Information Systems. --- Computer Science. --- Data Encryption. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer security --- Computers --- Computer Science --- Engineering & Applied Sciences --- Access control --- Sécurité informatique --- Ordinateurs --- Congresses --- Congrès --- Accès --- Contrôle --- Computer communication systems. --- Algorithms. --- Computers and civilization. --- Management information systems. --- Cryptology. --- Informatics --- Science --- Software, Computer --- Computer systems --- Computer operating systems --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Operating systems --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Foundations --- Distributed processing

Listing 1 - 10 of 13 << page
of 2
>>
Sort by