Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 17353 dokumen yang sesuai dengan query
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012. The 13 revised full papers were carefully selected from numerous submissions and cover the application layer of security, highlighting the practical importance of security of mobile devices in concrete usages. Contributions to MobiSec 2012 range from treatments on user privacy issues, over mobile application and app security, to mobile identity management, and NFC. With the orientation toward applications, MobiSec is a perfect interface between academia and industry in the field of mobile communications."
Heidelberg: Springer, 2012
e20410397
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011. The 15 revised full papers were carefully selected from numerous submissions and cover the most active areas of research in mobile security with its 3 focus areas machine-to-machine communication security, policies for mobile environments, and mobile user authentication and authorization."
Heidelberg: Springer, 2012
e20410305
eBooks  Universitas Indonesia Library
cover
Ilia Bider, editor
"This book contains the refereed proceedings of the 13th International Conference on Business Process Modeling, Development and Support (BPMDS 2012) and the 17th International Conference on Exploring Modeling Methods for Systems Analysis and Design (EMMSAD 2012), held together with the 24th International Conference on Advanced Information Systems Engineering (CAiSE 2012) in Gdańsk, Poland, in June 2012.
The 17 papers accepted for BPMDS were selected from 48 submissions and cover a wide spectrum of issues related to business process development, modeling, and support. They are grouped into sections on business process in the cloud, advanced BPM in an organizational context, similarity, variations and configuration, BPM and requirements engineering, humans and business process models, and BPM technologies using computational methods.
The 13 papers accepted for EMMSAD were chosen from 28 submissions and focus on exploring, evaluating, and enhancing current information modeling methods and methodologies. They are grouped in sections on modeling of enterprise architecture, modeling facts and rules, business process modeling, modeling of non-functional requirements, safety modeling and analysis, quality of models and modeling languages, and supporting the learning of conceptual modeling."
Berlin: [, Springer-Verlag], 2012
e20410455
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation."
Heidelberg: Springer-Verlag, 2012
e20409210
eBooks  Universitas Indonesia Library
cover
"The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation."
Berlin: Springer-Verlag, 2012
e20409976
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed proceedings of eight international workshops held in GdaƄsk, Poland, in conjunction with the 24th International Conference on Advanced Information Systems Engineering, CAiSE 2012, in June 2012.The 35 full and 17 short revised papers were carefully selected from 104 submissions. The eight workshops were Agility of Enterprise Systems (AgilES), Business/IT Alignment and Interoperability (BUSITAL), Enterprise and Organizational Modeling and Simulation (EOMAS), Governance, Risk and Compliance (GRCIS), Human-Centric Process-Aware Information Systems (HC-PAIS), System and Software Architectures (IWSSA), Ontology, Models, Conceptualization and Epistemology in Social, Artificial and Natural Systems (ONTOSE), and Information Systems Security Engineering (WISSE)"
Berlin: Springer-Verlag , 2012
e20406310
eBooks  Universitas Indonesia Library
cover
"This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security."
Heidelberg: Springer, 2012
e20410469
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 33rd International Conference on Applications and Theory of Petri Nets and Concurrency, PETRI NETS 2012, held in Hamburg, Germany, in June 2012. The 18 regular papers and 3 tool papers presented were carefully reviewed and selected from 55 submissions. The book also contains 2 invited talks. All current issues on research and development in the area of Petri nets and related models of concurrent systems are addressed."
Berlin: Springer-Verlag, 2012
e20410484
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals, cryptanalysis, message authentication codes and hash functions, public key cryptography, digital signatures, identity-based and attribute-based cryptography, lattice-based cryptography, and lightweight cryptography."
Berlin: Springer, 2012
e20406454
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012.
The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices."
Berlin: Springer-Verlag, 2012
e20407817
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>