You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Security Protocols held in Cambridge, UK in April 1998. The 15 revised papers presented as position statements are followed by transcripts of the discussions between the authors and the audience. Also included is a report on the final panel discussion on future directions in security protocols research and developments. Thus the volume reflects the lively interaction at the workshop. The papers are devoted to the interrelations between trust and delegation, exploring the implications and effects of these upon such issues as authorization, security policy, and cryptosystems and component design.
The modern society is rapidly becoming a fully digital society. This has many benefits, but unfortunately it also means that personal privacy is threatened. The threat does not so much come from a 1984 style Big Brother, but rather from a set of smaller big brothers. The small big brothers are companies that we interact with; they are public services and institutions. Many of these little big brothers are indeed also being invited to our private data by ourselves. Privacy as a subject can be problematic. At the extreme it is personal freedom against safety and security. We shall not take a political stand on personal privacy and what level of personal freedom and privacy is the correct one.A...
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Moncton, New Brunswick, Canada, in 2007. The annual iTrust international conference looks at trust from multidisciplinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology. This volume, therefore, presents the most up-to-date research on privacy, security, and trust management.
The Handbook is a comprehensive research reference that is essential for anyone interested in conducting research in supply chain. Unique features include: -A focus on the intersection of quantitative supply chain analysis and E-Business, -Unlike other edited volumes in the supply chain area, this is a handbook rather than a collection of research papers. Each chapter was written by one or more leading researchers in the area. These authors were invited on the basis of their scholarly expertise and unique insights in a particular sub-area, -As much attention is given to looking back as to looking forward. Most chapters discuss at length future research needs and research directions from both theoretical and practical perspectives, -Most chapters describe in detail the quantitative models used for analysis and the theoretical underpinnings; many examples and case studies are provided to demonstrate how the models and the theoretical insights are relevant to real situations, -Coverage of most state-of-the-art business practices in supply chain management.
The Internet and the World Wide Web (WWW) play an increasingly imp- tant role in our today's activities. More and more we use the Web to buy goods and to inform ourselves about cultural, political, economical, medical, and scienti?c developments. For example, accessing?ight schedules, me- cal data, or retrieving stock information become common practice in today's world. Many people assume that there is no one who "watches" them when accessing this data. However, sensitive userswho accesselectronic shops(e-shops) might have observedthat this assumptionoften isnot true. In many cases, E-shopstrack the users'"accessbehavior"when browsingthe Web pagesof the e-shopthus deriving "accesspatterns" f...
This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Collaborating with the Enemy".
This book constitutes the thoroughly refereed post-proceedings of the 8th International Conference on Financial Cryptography, FC 2004, held in Key West, FL, USA, in February 2004. The 17 revised full papers presented together with abstracts of 4 invited talks and 4 panel statements were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on loyalty and micropayment systems, user authentication, e-voting, auctions and lotteries, game theoretic and cryptographic tools, and mix networks and anonymous communications.
IT policies are set in place to streamline the preparation and development of information communication technologies in a particular setting. IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications is a comprehensive collection of research on the features of modern organizations in order to advance the understanding of IT standards. This is an essential reference source for researchers, scholars, policymakers, and IT managers as well as organizations interested in carrying out research in IT policies.
The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of coding theory and cryptology and were designed to prepare for original research in these areas. The present volume collects the expanded lecture notes of these tutorials. The topics range from mathematical areas such as computational number theory, exponential sums and algebraic function fields through coding-theory subjects such as extremal problems, quantum error-correcting codes and algebraic-geometry codes to cryptologic subjects such as stream ciphers, public-key infrastructures, key management, authentication schemes and distributed system security.