Narrow your search

Library

Odisee (107)

Thomas More Kempen (107)

Thomas More Mechelen (107)

UCLL (107)

VIVES (107)

KU Leuven (106)

ULiège (106)

ULB (105)

LUCA School of Arts (5)

UGent (2)

More...

Resource type

book (107)


Language

English (107)


Year
From To Submit

2010 (107)

Listing 1 - 10 of 107 << page
of 11
>>
Sort by

Book
Progress in Cryptology - LATINCRYPT 2010 : First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings
Authors: --- ---
ISBN: 3642147119 3642147127 Year: 2010 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010. The 19 papers presented together with four invited talks were carefully reviewed and selected from 62 submissions. The topics covered are encryption, elliptic curves, implementation of pairings, implementation of cryptographic algorithms, cryptographic protocols and foundations, cryptanalysis of symmetric primitives, post-quantum cryptography, and side-channel attacks.


Book
Relation based access control
Author:
ISBN: 1614993394 9781614993391 1306284783 9781306284783 9781607504887 160750488X Year: 2010 Publisher: Heidelberg, Germany : IOS Press : AKA,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book describes a new model, Relation Based Access Control (RelBAC) to handle the dynamics with full features of a general sense access control system. It is organized as follows: Chapter 2 analyzes the new challenges of the Web 2.0 such as the great dynamics in subjects, objects and in permissions. Chapter 3 lists existing access control models as the state of the art. Chapter 4 describes the RelBAC model and logic. We show the reasoning power of RelBAC in chapter 5. In Chapter 6, the extendibility of RelBAC is studied. Chapters 7 and 8 show applications of two important techniques of Sem


Book
Ethical and social issues in the information age
Author:
ISBN: 1849960372 1849960399 1849960380 9786613563071 1280385154 Year: 2010 Publisher: London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Ethical dilemmas have risen in number and intensity with the increasing dependence of contemporary society on computers and computer networks. Despite the proliferation of expert remedies, viable solutions to computer security issues remain too elusive, and society continues to suffer at the hands of cyber criminals, vandals, and hackers. This thoroughly revised and expanded fourth edition of the successful Ethical and Social Issues in the Information Age provides an up-to-date examination of the ethical, social, and policy challenges stemming from the emergence of cyberspace, the convergence of telecommunication and computing technologies, and the miniaturization of computing, telecommunication, and information-enabling devices. This accessible textbook/reference broadly surveys thought-provoking questions about the impact of these new technologies, with particular emphasis on the rapid growth of a multitude of computer networks, including the Internet. It assumes only a very modest familiarity with basic computer literacy. Topics and features: • Describes how changes in information technology influence morality and the law • Establishes a philosophical framework and analytical tools for discussing moral theories and problems in ethical relativism (NEW) • Offers a pertinent discussion on privacy, surveillance, civil liberties, harassment, and discrimination • Supplies an overview of the history of computing science in hardware, software, and networking (NEW) • Examines how developments in information technology have changed the traditional issues of intellectual property rights • Surveys the evolution of computer crimes, their types, costs on society, and strategies of detection and prevention, as well as techniques in electronic crime investigation • Discusses the new frontiers of ethics: virtual reality, artificial intelligence, and the Internet • Reviews the new realities of computer networks, and their implications for global ethics, culture, and economics (NEW) • Introduces the fundamentals of network-security system design and operation, revealing vulnerable areas in computer network infrastructure • Explores biometric techniques to system access control • Incorporates recent requirements for computer curricula • Provides exercises, objectives, and issues for discussion with every chapter This comprehensive text/reference provides updated discussion of the ethical and social issues that continue to evolve as computing and information technologies proliferate. Students at all levels who need to learn about computer ethics, the legal aspects of computing, network security, computer crime investigation, and biometrics will find this well-documented work an invaluable resource. The book is also highly useful for practitioners needing such insights for their work.


Book
Communications and Multimedia Security : 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings
Authors: --- --- ---
ISBN: 3642132405 9786613564665 3642132413 1280386746 Year: 2010 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Over the last decade, we have witnessed a growing dependency on information technology resulting in a wide range of new opportunities. Clearly, it has become almost impossible to imagine life without a personal computer or laptop, or without a cell phone. Social network sites (SNS) are competing with face-- face encounters and may even oust them. Most SNS-adepts have hundreds of “friends”, happily sharing pictures and profiles and endless chitchat. We are on the threshold of the Internet of Things, where every object will have its RFID-tag. This will not only effect companies, who will be able to optimize their production and delivery processes, but also end users, who will be able to enjoy many new applications, ranging from smart shopping, and smart fridges to geo-localized services. In the near future, elderly people will be able to stay longer at home due to clever health monitoring systems. The sky seems to be the limit! However, we have also seen the other side of the coin: viruses, Trojan horses, breaches of privacy, identity theft, and other security threats. Our real and virtual worlds are becoming increasingly vulnerable to attack. In order to encourage security research by both academia and industry and to stimulate the dissemination of results, conferences need to be organized. With the 11th edition of the joint IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2010), the organizers resumed the tradition of previous CMS conferences after a three-year recess.


Book
Locally Decodable Codes and Private Information Retrieval Schemes
Author:
ISBN: 3642143571 9786613003508 364214358X 1283003503 Year: 2010 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable reconstruction of an arbitrary bit of a message by looking at only a small number of randomly chosen codeword bits. Local decodability comes with a certain loss in terms of efficiency – specifically, locally decodable codes require longer codeword lengths than their classical counterparts. Private information retrieval (PIR) schemes are cryptographic protocols designed to safeguard the privacy of database users. They allow clients to retrieve records from public databases while completely hiding the identity of the retrieved records from database owners. In this book the author provides a fresh algebraic look at the theory of locally decodable codes and private information retrieval schemes, obtaining new families of each which have much better parameters than those of previously known constructions, and he also proves limitations of two server PIRs in a restricted setting that covers all currently known schemes. The author's related thesis won the ACM Dissertation Award in 2007, and this book includes some expanded sections and proofs, and notes on recent developments.


Book
iOS Forensic Analysis for iPhone, iPad, and iPod touch
Authors: ---
ISBN: 1430233427 1430233435 Year: 2010 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With never-before-published iOS information and data sets that are new and evolving, this book gives the examiner and investigator the knowledge to complete a full device examination that will be credible and accepted in the forensic community.

Keywords

Application software -- Development. --- iOS (Electronic resource). --- iPad (Computer) -- Programming. --- iPhone (Smartphone) -- Programming. --- iPod touch (Digital music player) -- Programming. --- Mobile computing. --- Application software --- iPhone (Smartphone) --- iPod touch (Digital music player) --- iPad (Computer) --- Mobile computing --- Engineering & Applied Sciences --- Computer Science --- Development --- Programming --- Information Technology --- General and Others --- Cell phones --- Programming. --- Cell telephones --- Cellphones --- Cellular phones --- Cellular radio --- Cellular telephones --- Mobile phones --- Mobiles (Telephones) --- Phones, Cell --- Telephones, Cell --- Wireless phones --- Apple iPad (Computer) --- Apple iPhone (Smartphone) --- Computer science. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Operating Systems. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Informatics --- Science --- Operating systems --- iOS (Electronic resource) --- i Operating system --- iOS 4.0 --- iOs 5 --- iOS operating system --- iPhone OS --- Electronic data processing --- Context-aware computing --- Portable computers --- Radio --- Telephone --- Digital music players --- Portable media players --- Smartphones --- Apple computer --- Tablet computers --- Transmitter-receivers --- Apple computer. --- Apple and iOS. --- Cryptology. --- Microcomputers --- IOS (Electronic resource)


Book
Elements of computer security
Author:
ISBN: 0857290053 0857290061 Year: 2010 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future. Developed from the author's highly successful Springer text, Foundations of Computer Security, this accessible, broad-ranging, and versatile textbook has been fully updated and enhanced with resources for students, instructors, and even those motivated to self-study on this topic. Topics and features: Examines the physical security of computer hardware, networks, and digital data Introduces the different forms of rogue software (or malware), discusses methods for preventing and defending against them, and thoroughly describes a selection of viruses, worms and Trojans in detail Provides numerous exercises and examples throughout the text, in addition to a Glossary of terms used in the book Investigates the important threats to network security, and explores the timely subjects of authentication, spyware, and identity theft Discusses key issues about privacy and trust in the online world, including children's privacy and safety Includes helpful appendices which discuss the definition, meaning, and history of the term "hacker"; introduce the language of "l33t Speak;" and provide a detailed virus timeline Supplies additional resources at the associated website: http://www.DavidSalomon.name/, including an introduction to cryptography, and answers to the exercises Clearly and engagingly written, this concise textbook is an ideal resource for undergraduate classes on computer security, as well as a solid reference for anyone needing to expand their security knowledge. The book is mostly non-mathematical, and is suitable for anyone familiar with the basic concepts of computers and computations. David Salomon is a professor emeritus of Computer Science at California State University, Northridge. He has authored numerous articles and Springer books, including Handbook of Data Compression, A Concise Introduction to Data Compression, Variable-length Codes for Data Compression, Transformations and Projections in Computer Graphics, Curves and Surfaces for Computer Graphics, Coding for Data and Computer Communications, Data Privacy and Security, and A Guide to Data Compression Methods.


Book
Algorithmic Number Theory : 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010, Proceedings
Authors: --- --- ---
ISBN: 3642145175 9786613565969 1280388048 3642145183 Year: 2010 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,


Book
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security : Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010, Revised Selected Papers
Authors: --- ---
ISBN: 3642160735 3642160743 Year: 2010 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Formal methods (Computer science) --- Cryptography --- Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Software engineering. --- Programming languages (Electronic computers). --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Computers and Society. --- Algorithm Analysis and Problem Complexity. --- Software Engineering. --- Programming Languages, Compilers, Interpreters. --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Foundations --- Distributed processing --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Automated reasoning --- Security protocol analysis --- ARSPA


Book
Advances in Cryptology - ASIACRYPT 2010 : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
Authors: --- ---
ISBN: 3642173721 9786613568458 364217373X 1280390530 Year: 2010 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Cryptography --- Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Applied mathematics. --- Engineering mathematics. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Discrete Mathematics in Computer Science. --- Systems and Data Security. --- Applications of Mathematics. --- Mathematics. --- Engineering --- Engineering analysis --- Mathematical analysis --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Mathematics --- Communication systems --- Foundations --- Protection --- Security measures --- Computer software. --- Information Systems. --- Computational complexity. --- Cryptology. --- Math --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer science—Mathematics.

Listing 1 - 10 of 107 << page
of 11
>>
Sort by