Narrow your search

Library

KU Leuven (2204)

ULiège (2126)

ULB (2012)

Odisee (1793)

Thomas More Mechelen (1793)

VIVES (1793)

Thomas More Kempen (1791)

UCLL (1762)

UGent (785)

AP (728)

More...

Resource type

book (3086)

digital (734)

periodical (23)

dissertation (5)

undetermined (1)


Language

English (3766)

German (34)

French (24)

Dutch (6)

Italian (5)


Year
From To Submit

2024 (36)

2023 (94)

2022 (72)

2021 (91)

2020 (117)

More...
Listing 11 - 20 of 3835 << page
of 384
>>
Sort by

Book
Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography
Author:
Year: 2020 Publisher: New York : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It is our great pleasure to welcome you to the 7th ACM Asia Public-Key Cryptography Workshop - APKC 2020, held on October 6, 2020, in conjunction with the 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2020). Public-key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public-key cryptosystems for solving a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretical aspects of public-key cryptography. The call for papers attracted 20 submissions from Asia, Europe, and USA. The program committee accepted 6 papers based on their overall quality and novelty (acceptance ratio: 30%). The program also includes one invited talk entitled "Insider Collusion Attack on Distributed Machine Learning System and its Solutions -- A Case of SVM" by Dr. Peter Shaojui Wang. We hope these proceedings will serve as a valuable reference for researchers and practitioners in the field of public-key cryptography and its applications.


Book
Implementing cryptography using python
Author:
ISBN: 1119615453 1119612225 1119612217 Year: 2020 Publisher: Indianapolis, Indiana : Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Nachrichten verschlüsseln Für Dummies Junior
Authors: ---
ISBN: 3527820256 Year: 2019 Publisher: Weinheim : Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Sécurité Internet pour l'entreprise
Authors: --- --- --- ---
ISBN: 2841801330 Year: 1996 Publisher: Paris International Thomson Publishing France

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Advanced security solutions for multimedia
Authors: --- ---
ISBN: 0750337346 0750337354 Year: 2021 Publisher: Bristol [England] (Temple Circus, Temple Way, Bristol BS1 6HG, UK) : IOP Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Modern internet-enabled devices and fast communication technologies have ushered in a revolution in sharing of digital images and video. This may be for social reasons or for commercial and industrial applications. Attackers can steal this data or manipulate it for their own uses, causing financial and emotional damage to the owners. This drives the need for advanced security solutions and the need to continuously develop and maintain security measures in an ever-evolving battle against fraud and malicious intent. There are various techniques employed in protecting digital media and information, such as digital watermarking, cryptography, stenography, data encryption, and more. In addition, sharing platforms and connected nodes themselves may be open to vulnerabilities and can suffer from security breaches. This book reviews present state-of-the-art research related to the security of digital imagery and video, including developments in machine learning applications. It is particularly suited for those that bridge the academic world and industry, allowing readers to understand the security concerns in the multimedia domain by reviewing present and evolving security solutions, their limitations, and future research directions.


Book
Progress in cryptology - INDOCRYPT 2021 : 22nd international conference on cryptology in India, Jaipur, India, December 12-15, 2021, proceedings
Authors: --- ---
ISBN: 303092517X 3030925188 Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Progress in Cryptology - INDOCRYPT 2022 : 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings
Authors: ---
ISBN: 3031229126 3031229118 Year: 2022 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11–14, 2022. The conference took place in Kolkata, India. The 31 full papers included in this book were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: symmetric key cryptology;protocols and implementation;cryptanalysis;boolean functions;quantum cryptography and cryptanalysis;post quantum cryptography.


Book
NIST cryptographic standards and guidelines development process (draft)
Authors: ---
Year: 2014 Publisher: [Gaithersburg, Md.] : U.S. Department of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Recommendation for key management. : best practices for key management organization
Authors: ---
Year: 2007 Publisher: [Gaithersburg, MD] : National Institute of Standards and Technology, Technology Administration,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Quantum cryptography and secret-key distillation
Author:
ISBN: 0511617747 Year: 2006 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.

Listing 11 - 20 of 3835 << page
of 384
>>
Sort by