Narrow your search

Library

ULiège (17)

KU Leuven (16)

UAntwerpen (9)

ULB (8)

KBR (7)

UCLouvain (6)

UGent (4)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

More...

Resource type

book (17)


Language

English (17)


Year
From To Submit

2019 (1)

2011 (1)

2009 (1)

2007 (1)

2006 (1)

More...
Listing 1 - 10 of 17 << page
of 2
>>
Sort by

Book
Hardware security
Authors: ---
ISBN: 9780128124789 0128124784 0128124776 9780128124772 Year: 2019 Publisher: Cambridge, MA

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials. Provides a thorough overview of computer hardware, including the fundamentals of computer systems and the implications of security risks Includes discussion of the liability, safety and privacy implications of hardware and software security and interaction Gives insights on a wide range of security, trust issues and emerging attacks and protection mechanisms in the electronic hardware lifecycle, from design, fabrication, test, and distribution, straight through to supply chain and deployment in the field A full range of instructor and student support materials can be found on the authors' own website for the book: http://hwsecuritybook.org.

Advances in cryptology-EUROCRYPT '88 : workshop on the theory and application of cryptographic techniques, Davos, May 25-27, 1988 : proceedings
Authors: ---
ISBN: 3540502513 9786610804542 1280804548 3540459618 Year: 1988 Volume: vol 330 Publisher: Berlin Heidelberg New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

The International .4ssociation for Cryptologic Research (1.4CR) organizes tmo - ternational conferences every year, one in Europe and one in the 1-nited States. EUROCRYI’T’88. held in the beautiful environment of the S~isb mountains in Davos, was the sixth European conference. The number of contributions and of participants at the meeting has increased substantiall!.. which is an indication of the high interest in cryptography and system security in general. The interest has not only increased but has also further moved towards - thentication. signatures and other protocols. This is easy to understand in view of the urgent needs for such protocols, in particular in connection with open - formation systems, and in view of the exciting problems in this area. The equally fascinating classical field of secrecy, 2.e. the theory, design and analysis of stream or block ciphers and of public key cryptosystems. was however also well represented and several significant results mere communicated. The present proceedings contain all contributions which were accepted for presentation. The chapters correspond to the sessions at the conference.

Computer data security
Author:
ISBN: 0442242581 9780442242589 Year: 1973 Publisher: New York (N.Y.): Van Nostrand

Local area network security : workshop LANSEC'89, Karlsruhe, April 3-6, 1989 : proceedings
Authors: ---
ISBN: 3540517545 0387517545 3540468021 Year: 1989 Volume: vol 396 Publisher: Berlin New York London Springer


Book
IPv6 security.
Authors: ---
ISBN: 9781587055942 1587055945 Year: 2009 Publisher: Indianapolis Cisco Press

Decrypted secrets : methods and maxims of cryptology
Author:
ISBN: 3540668713 3662040263 3662040247 Year: 2000 Publisher: Berlin Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. Decrypted Secrets has become a standard book on cryptology. The new edition has been revised and extended in many details, particularly on the ENIGMA and other rotor machines, on cipher teletype machines, codenamed FISH by the British, and on key negotiation. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransén, International Intelligence History Study Group).

Keywords

Mathematical control systems --- cryptologie --- 519.764 --- 003.26 --- 091.14:003.26 --- 681.188 --- Computer security --- -Cryptography --- -681.3*D46 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Deciphering of systems of symbols --- Cryptografische schriftsoorten. Geheimschrift --- Codices--Geheimschrift, cryptografie --- Cryptographic devices. Ciphering, encoding machines. Deciphering, decoding machines --- Congresses --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security measures --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.188 Cryptographic devices. Ciphering, encoding machines. Deciphering, decoding machines --- 091.14:003.26 Codices--Geheimschrift, cryptografie --- 003.26 Cryptografische schriftsoorten. Geheimschrift --- 519.764 Deciphering of systems of symbols --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Cryptography --- 681.3*D46 --- Cryptographie --- Data encryption (Computer science). --- Coding theory. --- Information theory. --- Number theory. --- Applied mathematics. --- Engineering mathematics. --- Computers and civilization. --- Cryptology. --- Coding and Information Theory. --- Number Theory. --- Applications of Mathematics. --- Computers and Society. --- Civilization and computers --- Civilization --- Engineering --- Engineering analysis --- Mathematical analysis --- Number study --- Numbers, Theory of --- Algebra --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Mathematics

Handbook of applied cryptography
Authors: --- ---
ISBN: 0849385237 9780849385230 1439821917 0429466331 Year: 1997 Publisher: London CRC

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computers --- Cryptography --- Access control --- -Cryptography --- -005.82 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- -Computers --- -519.76 --- 621.391.7 --- -681.3*D46 --- Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Secret systems of electrical communication --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 621.391.7 Secret systems of electrical communication --- 519.76 Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Cryptography. --- 519.76 --- 681.3*D46 --- Access control&delete& --- Handbooks, manuals, etc --- Mathematical control systems --- Programming --- cryptografie --- Handbooks, manuals, etc. --- Ordinateurs --- Cryptographie --- Accès --- Contrôle --- Guides, manuels, etc. --- Guides, manuels, etc --- Computers - Access control - Handbooks, manuals, etc. --- Cryptography - Handbooks, manuals, etc.

Security, accuracy, and privacy in computer systems
Authors: ---
ISBN: 0137989911 9780137989911 Year: 1973 Volume: 57 Publisher: Englewood Cliffs, NJ Prentice-Hall

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer. Automation --- Electronic data processing departments --- Electronic data processing --- Privacy, Right of --- Security measures --- AA / International- internationaal --- 654 --- -338.043 --- #TCPW P4.0 --- 681.3*C20 --- 681.3*D46 --- 681.3*K4 --- 681.3*K41 --- 681.3*K6m --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Computer centers --- ADP (Data processing) --- Automatic data processing --- Data processing --- EDP (Data processing) --- IDP (Data processing) --- Integrated data processing --- Computers --- Office practice --- Informatieverwerking. Bureautica. --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica. --- Computerwetenschap--?*C20 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computerwetenschap--?*K4 --- Computerwetenschap--?*K41 --- Insurance; security (Management of computing and information systems) --- Law and legislation --- Automation --- Electronic data processing. --- Privacy, Right of. --- Security measures. --- 681.3*K6m Insurance; security (Management of computing and information systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 338.043 --- Computer department security measures --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica --- Informatieverwerking. Bureautica --- 6813*C20 --- Persoonlijkheidsrechten. --- Personnalité (Droits de la). --- Information (Traitement automatique de l') (Départements du). Mesures de sûreté. --- Elektronische informatieverwerkingsafdelingen. Zekerheidsmaatregelen. --- Systèmes, Conception de --- System design --- Programmation système (informatique) --- Electronic data processing departments - Security measures

Listing 1 - 10 of 17 << page
of 2
>>
Sort by