Narrow your search

Library

ULiège (2248)

KU Leuven (2162)

ULB (2122)

Odisee (1804)

VIVES (1804)

Thomas More Kempen (1803)

Thomas More Mechelen (1803)

UCLL (1778)

UGent (687)

KBC (377)

More...

Resource type

book (2234)

periodical (14)

digital (2)

dissertation (2)


Language

English (2243)

Italian (4)

French (1)


Year
From To Submit

2024 (28)

2023 (81)

2022 (23)

2021 (40)

2020 (95)

More...
Listing 1 - 10 of 2248 << page
of 225
>>
Sort by

Book
Financial Cryptography and Data Security. FC 2023 International Workshops : Voting, CoDecFin, DeFi, WTSC, Bol, Brač, Croatia, May 5, 2023, Revised Selected Papers
Authors: --- --- --- --- --- et al.
ISBN: 3031488067 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the revised selected papers from the workshops affiliated with the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which took place in Bol, Brač, Croatia, in May 2023. The 7 full papers presented in this book were carefully reviewed and selected from 18 submissions. They stem from the following workshops: CoDecFin 2022: 3rd Workshop on Coordination of Decentralized Finance DeFi 2022: 2nd Workshop on Decentralized Finance Voting 2022: 7th Workshop on Advances in Secure Electronic Voting WTSC 2022: 6th Workshop on Trusted Smart Contracts.


Book
Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part I
Authors: ---
ISBN: 3031577183 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.


Book
Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part II
Authors: ---
ISBN: 3031577221 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.


Book
Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part IV
Authors: ---
ISBN: 3031577280 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.


Book
Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part III
Authors: ---
ISBN: 3031577256 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation. .


Book
Enterprise Cybersecurity : How to Build a Successful Cyberdefense Program Against Advanced Threats
Authors: --- --- ---
Year: 2015 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise’s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization’s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities.


Periodical
ISeCure.
Author:
ISSN: 20082045 20083076 Year: 2009 Publisher: Tehran, Iran : Iranian Society of Cryptology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
Cryptologia.
Authors: --- ---
ISSN: 15581586 Year: 1977 Publisher: Laguna Hills, Calif. : Aegean Park Press

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
Journal of cryptology : the journal of the International Association for Cryptologic Research.
Author:
ISSN: 14321378 09332790 Year: 1988 Publisher: New York : Springer-Verlag

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
IACR Transactions on Symmetric Cryptology
Author:
ISSN: 2519173X Year: 2016 Publisher: Bochum, Germany: : Ruhr-Universität Bochum,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 2248 << page
of 225
>>
Sort by