Narrow your search

Library

KU Leuven (3)

KBC (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

UGent (1)

ULB (1)

ULiège (1)

VIVES (1)


Resource type

book (2)

dissertation (1)


Language

English (3)


Year
From To Submit

2018 (1)

1992 (1)

1974 (1)

Listing 1 - 3 of 3
Sort by

Book
Protocol specification, testing and verification
Author:
Year: 1992 Publisher: Amsterdam North-Holland

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Foundations and Practice of Security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers
Authors: --- --- --- ---
ISBN: 3319756508 3319756494 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes revised selected papers from the 10th International Symposium on Foundations and Practice of Security, FPS 2017, held in Nancy, France in October 2017. The 20 papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers were organized in topical sections named: access control; formal verification; privacy; physical security; network security, encrypted DBs and blockchain; vulnerability analysis and deception systems; and defence against attacks and anonymity. .

Keywords

Computer science. --- Computer security. --- Data structures (Computer science). --- Artificial intelligence. --- Computers. --- Computer Science. --- Security. --- Systems and Data Security. --- Computing Milieux. --- Data Structures, Cryptology and Information Theory. --- Artificial Intelligence (incl. Robotics). --- Information Systems Applications (incl. Internet). --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Data protection. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Artificial Intelligence. --- Data structures (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer security --- Data encryption (Computer science) --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Dissertation
Renamings in parallel program schemas
Authors: ---
Year: 1974 Publisher: Ontario University of Waterloo. Department of applied analysis & computer science

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Listing 1 - 3 of 3
Sort by