Listing 1 - 10 of 29 | << page >> |
Sort by
|
Choose an application
Choose an application
Computers --- Access control --- Congresses --- Cryptography --- Computers - Access control - Congresses. --- Cryptography - Congresses.
Choose an application
Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Congresses. --- Congrès --- Sécurité informatique --- Congrès --- Congresses --- Computer security - Congresses --- Cryptography - Congresses.
Choose an application
Communication --- Cryptography --- Ciphers --- Codes --- Contractions --- Signs and symbols --- Symbolism --- Abbreviations --- Code names --- Writing --- Communication - Congresses --- Cryptography - Congresses --- Ciphers - Congresses
Choose an application
Computers --- Cryptography --- Ordinateurs --- Cryptographie --- Access control --- Congresses --- Accès --- Contrôle --- Congrès --- Computers - Access control - Congresses. --- Cryptography - Congresses.
Choose an application
Computer security --- Cryptography --- Data protection --- Sécurité informatique --- Cryptographie --- Protection de l'information (Informatique) --- Congresses --- Congrès --- Congresses. --- Computer security - Congresses --- Data protection - Congresses. --- Cryptography - Congresses.
Choose an application
681.3*E3 --- 681.3*E4 --- Data encryption: data encryption standard; DES; public key cryptosystems --- Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- 681.3*E4 Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Computers --- Access control --- Congresses --- Cryptography --- Computers - Access control - Congresses. --- Cryptography - Congresses.
Choose an application
AboutCryptology It is nowwidelyperceivedthatweareexperiencinganinformationrevolution whose e?ects will ultimately be as pervasive and profound as was brought by the industrial revolution of the last century. From the beginning of time, information has been an important asset for humans. In the early days of humanexistence,themereknowledgeofwheretomosteasilygatherfoodwas the di?erence between life and death. Throughout history, information has provided the means for winning wars, making fortunes, and shaping history. The underlying theme of the information revolution is that we continue to ?nd new ways to use information. These new uses for information serve to highlight our need to protect di?erent aspects of information. Cryptology may be broadly de?ned as the scienti?c study of adversarial information protection. Cryptology has traditionally dealt with the co- dentiality of information, but innovation in using information produces new requirements for protection of that information. Some are longstanding and fundamental - how do we guarantee that information is ”authentic”? How do we guarantee that information is timely? How can we produce bits that have the same properties as ”money”? Each of these questions has been grappled with in the cryptologic research community.
Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Congresses. --- Congresses --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Congrès --- cryptologie --- Computer science. --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Computer. Automation --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Criptografía --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Seguridad informática --- Congresos --- Computer security - Congresses --- Cryptography - Congresses
Choose an application
Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Congresses --- Congrès --- -Cryptography --- -681.3*E3 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encryption: data encryption standard; DES; public key cryptosystems --- Security measures --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cyber security --- Cybersecurity --- Sécurité informatique --- Congrès --- Protection of computer systems --- Protection --- 681.3*E3 --- Computer security - Congresses. --- Cryptography - Congresses.
Choose an application
This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge. Work on information hiding has been carried out over the last few years within different research communities, mostly unaware of each other's existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.
Computer security --- Data protection --- Cryptography --- Congresses. --- Congresses --- Data encryption (Computer science). --- Computer security. --- Operating systems (Computers). --- Information Systems. --- Computer science. --- Cryptology. --- Systems and Data Security. --- Operating Systems. --- Information Systems Applications (incl. Internet). --- Management of Computing and Information Systems. --- Computers and Society. --- Informatics --- Science --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Operating systems --- Protection --- Security measures --- Computer security - Congresses --- Data protection - Congresses. --- Cryptography - Congresses.
Listing 1 - 10 of 29 | << page >> |
Sort by
|