In a world where cyber threats are more pervasive and sophisticated than ever, this book serves as a trusted companion for professionals charged with protecting critical digital assets.
This book provides a systematic and comprehensive analysis of the full spectrum of Russian influence operations targeting international actors and various segments of society following the onset of the war in Ukraine.
This book provides a systematic and comprehensive analysis of the full spectrum of Russian influence operations targeting international actors and various segments of society following the onset of the war in Ukraine.
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.
This book explores the most common generative AI (GenAI) tools and techniques used by malicious actors for hacking and cyber-deception, along with the security risks of large language models (LLMs).
This book constitutes the refereed proceedings of the 4th EAI International Conference on Blockchain Technology and Emerging Applications, BlockTEA 2025, held in Venice, Italy, during September 18–19, 2025.
This book constitutes the refereed proceedings of the 4th EAI International Conference on Blockchain Technology and Emerging Applications, BlockTEA 2025, held in Venice, Italy, during September 18–19, 2025.
This book explores the most common generative AI (GenAI) tools and techniques used by malicious actors for hacking and cyber-deception, along with the security risks of large language models (LLMs).
In a world where cyber threats are more pervasive and sophisticated than ever, this book serves as a trusted companion for professionals charged with protecting critical digital assets.
In the last few years, the protection of computerised medical records, and of other personal health information, has become the subject of both technical research and political dispute in a number of countries.
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols.
Das Buch verhilft Lesern dazu, das eigene Netz mit den Augen des Angreifers zu sehen – um seine Techniken zu verstehen und um sich besser schützen zu können.
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers.
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration.
The Critical Infrastructure Protection Survey recently released by Symantec found that 53% of interviewed IT security experts from international companies experienced at least ten cyber attacks in the last five years, and financial institutions were often subject to some of the most sophisticated and large-scale cyber attacks and frauds.
This volume constitutes the strictly refereed post-workshop proceedings of the Fourth International Workshop on Fast Software Encryption, FSE'97, held in Haifa, Israel, in January 1997.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
The CISO's Guide to Cyber AI: A Practical ApproachBook DescriptionIn an era where cyber threats evolve faster than security teams can respond, artificial intelligence has emerged as the critical force multiplier for cybersecurity operations.
This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career.
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography.
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects.
Crypto '99, the Nineteenth Annual Crypto Conference, was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department, University of California, Santa Barbara (UCSB).
This, the 29th issue of the Transactions on Computational Science journal, is comprised of seven full papers focusing on the area of secure communication.
This, the 29th issue of the Transactions on Computational Science journal, is comprised of seven full papers focusing on the area of secure communication.
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks.