Listing 1 - 3 of 3 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.
Data encryption (Computer science) --- Data protection --- Computer networks --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Access control --- Computer science. --- Special purpose computers. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Math Applications in Computer Science. --- Special Purpose and Application-Based Systems. --- Computers and Society. --- Mathematics. --- Civilization and computers --- Civilization --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Special purpose computers --- Informatics --- Science --- Mathematics --- Foundations --- Protection --- Security measures --- Computer software. --- Software engineering. --- Cryptology. --- Computer software engineering --- Engineering --- Software, Computer --- Computer science—Mathematics. --- Seguridad informática
Choose an application
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.
Computer security --- Data encryption (Computer science) --- Computer networks --- Data protection --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Computer science. --- Software engineering. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- e-Commerce/e-business. --- Management of Computing and Information Systems. --- Software Engineering. --- Information Systems Applications (incl. Internet). --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Informatics --- Science --- Communication systems --- Protection --- Information Systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Seguridad informática --- Data protection. --- Cryptography. --- Electronic commerce. --- Electronic data processing—Management. --- Data and Information Security. --- e-Commerce and e-Business. --- IT Operations. --- Computer and Information Systems Applications. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully reviewed and selected from 19 submissions. The papers are organized in topical section on automated analysis, security and trust, mobile trust, security of distributed systems, evaluation and analysis, and embedded security.
Engineering & Applied Sciences --- Computer Science --- Computer security --- Computer networks --- Security measures --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Application software. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Computers and Society. --- Computer Appl. in Administrative Data Processing. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information Systems. --- Information systems. --- Cryptology. --- Seguridad informática
Listing 1 - 3 of 3 |
Sort by
|