This book constitutes the proceedings of the 18th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2021, held virtually in July 2021.
This book provides the most complete description, analysis, and comparative studies of modern standardized and most common stream symmetric encryption algorithms, as well as stream modes of symmetric block ciphers.
This book constitutes the refereed post-conference proceedings of the 10th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2020, held as a virtual event, in September 2020.
This book constitutes the thoroughly refereed proceedings of the CAiSE Forum 2021 which was held as part of the 33rd International Conference on Advanced Information Systems Engineering, CAiSE 2021, in June 2021.
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 33rd International Conference on Advanced Information Systems Engineering, CAiSE 2021, which was held during June 28-July 2, 2021.
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021.
This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.
This book constitutes the refereed proceedings of the 5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021, held in Be'er Sheva, Israel, in July 2021.
The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021.
This book presents an overview on security and privacy issues in dynamic sensor networks and Internet of Things (IoT) networks and provides a novel tamper evident technique to counter and defend against these security related issues.
This book constitutes the refereed proceedings of the 8th International Conference on HCI in Business, Government and Organizations, HCIBGO 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.
The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021.
The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021.
This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021.
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021.
The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021.
The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021.
This book offers a holistic approach to the Internet of Things (IoT) model, covering both the technologies and their applications, focusing on uniquely identifiable objects and their virtual representations in an Internet-like structure.
This book constitutes the refereed proceedings of the Third International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2021, held as part of the 23rd International Conference, HCI International 2021, which took place virtually in July 2021.
The three-volume set LNCS 12771-12773 constitutes the refereed proceedings of the 13th International Conference on Cross-Cultural Design, CCD 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.
This book constitutes revised selected papers of the Second International Conference on Computing Science, Communication and Security, COMS2 2021, held in Gandhinagar, India, in February 2021.
This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT).
This book constitutes revised and selected papers from the scientific satellite events held in conjunction with the18th International Conference on Service-Oriented Computing, ICSOC 2020.
This book presents chapters from diverse range of authors on different aspects of how Blockchain and IoT are converging and the impacts of these developments.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2021, CT-RSA 2021, held in San Francisco, CA, USA, in May 2021.
The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021.
The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021.
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics.
This book constitutes the refereed post-conference proceedings of the First International Conference Edge Computing and IoT, ICECI 2020, held in November 2020 in Changsha, China.
Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively.
This textbook introduces the non-specialist reader to the concepts of quantum key distribution and presents an overview of state-of-the-art quantum communication protocols and applications.
The LNCS 12653 constitute the proceedings of the 12th International Symposium on Cyberspace Safety and Security, CSS 2020, held in Haikou, China, in December 2020.
This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020.
This book provides extensive insights on blockchain systems, starting from a historical perspective and moving towards building foundational knowledge, with focus on communication networks.
This book constitutes the refereed post-conference proceedings of the Third International Conference on Intelligent Technologies and Applications, INTAP 2020, held in Grimstad, Norway, in September 2020.