1,171 search results for “Computer security” in the Public website
-
Secure Multiparty Computation and Secret Sharing
The first book ever on information-theoretically secure multiparty computation
-
Algebraic techniques for low communication secure protocols
Promotor: R. Cramer
-
eLaw publishes article in Computer Law & Security Review
In healthcare, gender and sex considerations are crucial because they affect individuals' health and disease differences. Yet, most algorithms deployed in the healthcare context lack close consideration of these aspects and do not account for bias detection. In their latest paper, Eduard Fosch-Villaronga,…
-
Eleftheria Makri
Science
-
Security by behavioural design
In 2021, the National Cyber Security Centre (NCSC) asked Leiden University to conduct a rapid review of best practices and possibilities for follow-up research on the integration of behavioral sciences in security by design methodologies and projects. This academic field is called security by behavioral…
-
Cyber Security by Integrated Design (C-SIDe)
C-SIDe project involves a broad selection of associates in solving cybersecurity problems. Security of software systems has emerged as a critical need in our interconnected society. Companies developing software products look for Security-by-Design approaches accommodating security into their software…
-
Cyber Security
Cyber security is one of the critical challenges in our inter-connected world. Organizations are being constantly targeted by adversaries. Various critical systems become exposed on the Internet. Users can find that their data has been stolen from a company that they were not even aware of.
-
Intelligence and Security
Our main goal is to improve understanding of how intelligence and security services operate, how they are embedded in broader political, bureaucratic, and societal contexts, and how their methodologies can be complemented.
-
Computer Systems, Imagery & media
The Computer Systems, Imagery & media (CSI) research programme performs research on methods and techniques for the design, implementation and application of advanced computer systems, in particular parallel, distributed and embedded computer systems.
-
Gianclaudio Malgieri appointed as Associate Editor of Computer Law & Security Review
Gianclaudio Malgieri, after having served as an Editorial Board Member of Computer Law & Security Review, Elsevier (CLSR) in the last three years, has now been appointed as Associate Editor of that review.
-
Systems and security
Researchers at LIACS are working to devise the computers of tomorrow that will be the backbone of the Cloud and Edge computing paradigms as well as the Internet of Things. In this respect, we are involved in research and development of high performance computing systems, embedded & real-time computing…
-
Security Vision
How do technologies of computer vision, which promise to replace humans in the understanding of images, work in practice in the field of security, and what are their ethical and political implications?
-
Cyber Security Governance
The research group Cyber Security Governance will provide cutting-edge academic research in the domain of cyber, where modern technology interacts with traditional concepts such as governance, sovereignty, law-enforcement, international relations and conflict.
-
Computational linguistics
Computational linguistics uses computational methods to help answer linguistics questions across a variety of topics.
-
Security in Transnational Spaces
This book focuses on transnationalism as a key concept to evaluate how Europe responds to cross-border security challenges.
-
Computer programming
We see computer programming as an essential skill. It enables you to be self-sufficient in building tools, processing data, visualizing research output, communicating research results, etc. Moreover, it empowers you to make beautiful things.
-
Natural computing
Research in the natural computing group covers theoretical foundations, the development of new algorithms, and interdisciplinary applications of natural computing methods.
-
Computer Committee
Task of the Computer Committee is to give advice, possibly unsolicited, on ICT matters to the Management Team of LIACS. This includes advice on ICT related policies of the faculty and university, procurement of computer and other machinery, and system administration.
-
Natural Computing
Research in the natural computing cluster covers theoretical foundations, the development of new algorithms, and interdisciplinary applications of natural computing methods.
-
Computational Biology
Projects within the theme ‘Computational Biology’ aim to employ mathematical or computational dynamical modelling approaches to discover novel concepts that are important for drug development.
-
Computational Linguistics
In this theme you will be supplied with a firm background in the core of current computational linguistics and a solid comprehension of its neighboring fields.
-
Computational electrocatalysis
This dissertation focused on computational methods based on first principles calculations using the Density Functional Theory (DFT) framework. Emphasis was laid on affordable methods that can provide a tradeoff between computational expense and accuracy.
-
Computer Science
Are you thinking about studying Computer Science? Learn more and watch the videos.
-
Computer Science
Computational thinking, programming, and algorithms form the basic of many of the things that are shaping our world, the way we work, interact, organize ourselves, and even spend our free time with social networks, streaming media, and games. And this transformation is far from being complete, it is…
-
Systems and Security
Researchers at LIACS are working to devise the computers of tomorrow that will be the backbone of the Cloud and Edge computing paradigms as well as the Internet of Things. In this respect, we are involved in research and development of high performance computing systems, embedded & real-time computing…
-
Cyber Security Governance Essentials
The Leiden Institute of Advance Computer Science (LIACS) in collaboration with the Institute of Security and Global Affairs (ISGA) have developed the minor Cyber Security Governance Essentials to provide students with a mixture of technical and governance knowledge to set them on a path towards understanding…
-
Computer Science
PhD candidates carry out a programme of independent research and additional (limited) course work, culminating in production of a PhD thesis in typically 4 years.
-
Optimization of quantum algorithms for near-term quantum computers
This thesis covers several aspects of quantum algorithms for near-term quantum computers and its applications to quantum chemistry and material science.
-
Computational facilities
Beowulf clusters looking for new frontiers.
-
Traditional Authority and Security in Contemporary Nigeria
This book describes the changing roles of traditional authorities in combatting contemporary security challenges.
-
Advances in computational methods for Quantum Field Theory calculations
In this work we describe three methods to improve the performance of Quantum Field Theory calculations.
-
Computed fingertip touch for the instrumental control of musical sound with an excursion on the computed retinal afterimage
Promotor: Prof.dr. S. Haring
-
Historicizing Security. Enemies of the State, 1813 until present
The research project ‘The History of National Security, 1945-present', is funded by the Netherlands Organisation for Scientific Research (NWO), the Campus The Hague/Leiden University and the Netherlands Institute for Military History (NIMH). The project will run until the summer of 2013, when we hope…
-
Antonio Missiroli
Faculty Governance and Global Affairs
-
Foundations of Computing (MSc)
The master's specialisation Bioinformatics at Leiden University focuses on research, development and application of computational tools and approaches for expanding the use of biological, medical, behavioral and health data.
-
Computer Science (MSc)
The two-year master’s programme in Computer Science at Leiden University offers seven specialisations ranging from AI to Bioinformatics and Data Science. The programme combines excellent theoretical teaching with possibilities for applied work with industrial relevance.
-
Gender equality, cybersecurity, and security sector governance
In this article, James Shires and Tatiana Tropina, assistant professors at the Institute of Security and Global Affairs, map the relationship between gender equality and cybersecurity governance as a component of good security sector governance (SSG). Here, it highlights the way in which cybersecurity…
-
The quantum computer
The worldwide race to the quantum computer is in full swing. This computer can take on computing tasks that we can only dream of today, such as finding proteins that can be used as medicines in seconds flat. Leiden physicists have discovered how the Majorana particle can be used as a building block…
-
Stereotyping in Computer Science
LIACS is partner in the project 'Stereotyping in Computer Science.' The project is a collaboration between multiple universities and the Dutch national expert organization on girls/women and science/technology (VHTO), which will investigate the stereotypes that children hold about computer scientist…
-
Bio-inspired Computing
We investigate reaction systems, a novel computational model gleaned from the biochemical reactions taking place in living cells and information processing in nature.
-
High performance computing
A high performance computer or supercomputer owes its massive processing capacity to the fact that it chops a single overarching task into a whole series of smaller tasks. It simultaneously tackles each of those smaller problems.
-
Computer Science (BSc)
We are becoming ever more dependent on automation systems in our daily lives. Computer Science is more than programming; you integrate maths and logic into the development of systems and solutions that can be applied in all fields - from business to healthcare.
-
Handbook of Natural Computing
Natural Computing investigates algorithms and phenonema based on nature to create better and new computer science innovations.
- Security Studies
-
Computational Network Science Lab
The Leiden Computational Network Science Lab (CNS Lab) researches methods for knowledge discovery from real-world network data.
-
Computer Science & Economics (BSc)
Met de bachelorspecialisatie Informatica & Economie aan de Universiteit Leiden leer je waardevolle inzichten in de economie te combineren met (programmeer)vaardigheden en kennis uit de informatica.
-
Computability of the étale Euler-Poincaré characteristic
Promotor: S.J. Edixhoven, L.D.J. Taelman
-
Cyber security
To make digital communication more secure, we need to tighten up the legal frameworks and identify the biggest cyber threats.
-
of a Secret State. The Intelligence & Security Services and their contribution to the National Security State, 1945-1989
Subproject of
-
Security Studies
Security is key to survival for any living organism: life is full of perils and threats, both physically, environmentally, and societally. Security challenges such as terrorism, natural disasters, and cybercrime rank among the most pressing issues of our time, affecting the security and safety of millions…