Narrow your search

Library

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLouvain (1)

UCLL (1)

ULB (1)

ULiège (1)

VIVES (1)


Resource type

book (2)


Language

English (2)


Year
From To Submit

2007 (1)

2005 (1)

Listing 1 - 2 of 2
Sort by
Trust, privacy, and security in digital business : second international conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005 : proceedings
Authors: --- --- ---
ISSN: 03029743 ISBN: 3540282246 3540317961 9783540282242 Year: 2005 Volume: 3592 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunction with the DEXA conferences in Zaragoza. It was our goal that this event would be a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust, privacy, and security in digital business. We thank the attendees for coming to Copenhagen to participate and debate the new emerging advances in this area. The workshop program consisted of one invited talk and 11 regular technical paper sessions. The invited talk and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information Security at the University of Regensburg, Germany, on “Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control issues to electronic auctioning, from trust and protocols to smart cards. The conference attracted over 100 submissions of which the Program Committee accepted 32 papers for presentation and inclusion in the conference proceedings. The authors of the accepted papers come from 16 different countries. The proceedings contain the revised versions of all accepted papers.

Advances in cryptology - EUROCRYPT 2007 : 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, proceedings
Authors: --- ---
ISBN: 9783540725398 3540725393 9786610943722 1280943726 3540725407 Year: 2007 Volume: 4515 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Cryptography --- Computer security --- Cryptographie --- Sécurité informatique --- Congresses --- Congrès --- Computers -- Access control -- Congresses. --- Cryptography -- Congresses. --- Data transmission systems -- Security measures -- Congresses. --- Electronic books. -- local. --- Computer Science --- Engineering & Applied Sciences --- Computers --- Data transmission systems --- Access control --- Security measures --- Sécurité informatique --- Congrès --- EPUB-LIV-FT SPRINGER-B --- Data communication systems --- Transmission of data --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Management of Computing and Information Systems. --- Mathematics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Communication systems --- Mathematics --- Foundations --- Protection --- Distributed processing --- Information theory --- Telecommunication systems --- Computer software. --- Computational complexity. --- Information Systems. --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer science—Mathematics.

Listing 1 - 2 of 2
Sort by