This book presents the concept of a fuzzy-based recommender system for user account privacy settings that can be used for citizen participation on online political platforms.
This book constitutes the refereed conference proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2017, held in Atlanta, GA, USA, in September 2017.
This double volumes LNCS 10573-10574 constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2017, Ontologies, Databases, and Applications of Semantics, ODBASE 2017, and Cloud and Trusted Computing, C&TC, held as part of OTM 2017 in October 2017 in Rhodes, Greece.
This book provides the most complete description, analysis, and comparative studies of modern standardized and most common stream symmetric encryption algorithms, as well as stream modes of symmetric block ciphers.
This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021.
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017.
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology in India, INDOCRYPT 2020, held in Bangalore, India, in December 2020.
This book constitutes the refereed proceedings of the 16th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2017, held in Messina, Italy, in September 2017.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2021, CT-RSA 2021, held in San Francisco, CA, USA, in May 2021.
This book constitutes the revised selected papers of the 13th International Symposium on Foundations and Practice of Security, FPS 2020, held in Montreal, QC, Canada, in December 2020.
This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi'an, China, in October 2022.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017.
This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2021, the 40th International Conference on Computer Safety, Reliability and Security, which took place in York, UK, in September 2021.
The LNCS 12653 constitute the proceedings of the 12th International Symposium on Cyberspace Safety and Security, CSS 2020, held in Haikou, China, in December 2020.
This book constitutes selected papers from the 23rd International Conference on Information Security and Cryptology, ICISC 2020, held in Seoul, South Korea, in December 2020.
This book constitutes the revised selected papers from the 22nd International Conference on Information Security Applications, WISA 2021, which took place on Jeju Island, South Korea, during August 2021.
This book constitutes the proceedings of the 11th International Conference on Network and System Security, NSS 2017, held in Helsinki, Finland, in August 2017.
The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.
This volume constitutes the refereed post-conference proceedings of the 5th International Conference on Machine Learning and Intelligent Communications, MLICOM 2020, held in Shenzhen, China, in September 2020.
This book constitutes the refereed proceedings of the 16th International Conference on Information Security Practice and Experience, ISPEC 2021, held in Nanjing, China, in December 2021.
This volume constitutes the refereed proceedings of the 8th International Conference on Multimedia Communications, Services and Security, MCSS 2015, held in Krakow, Poland, in November 2015.
This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2020, held in Lugano, Switzerland, in April 2020.
This volume constitutes the proceedings of the Second International Conference on Reliability, Safety and Security of Railway Systems, RRSRail 2017, held in Pistoia, Italy, in November 2017.
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020.
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly.
The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.
This book constitutes the proceedings of the Second International Conference on Cloud, Networking for IoT Systems, CN4IoT 2017, and the Second EAI International Conference on ICT Infrastructures and Services for Smart Cities, IISSC 2017, held in Brindisi, Italy, in April 2017.
This book constitutes the refereed post-conference proceedings of the 8th International Conference on Mobile Networks and Management, MONAMI 2016, held in Abu Dhabi, United Arab Emirates, in October 2016.
This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017.
This book constitutes the proceedings of the 18th International Conference on Passive and Active Measurement, PAM 2017, held in Sydney, Australia, in March 2017.
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.
This three-volume set LNCS 13338-13340 constitutes the thoroughly refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial IoT Technologies and Applications, IoT 2017, held in Wuhu, China, in March 2017.
This book constitutes the refereed proceedings of the 14th International Symposium on Neural Networks, ISNN 2017, held in Sapporo, Hakodate, and Muroran, Hokkaido, Japan, in June 2017.
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers.
This book constitutes the revised selected papers of the 10th International Workshop on Data Privacy Management, DPM 2015, and the 4th International Workshop on Quantitative Aspects in Security Assurance, QASA 2015, held in Vienna, Austria, in September 2015, co-located with the 20th European Symposium on Research in Computer Security, ESORICS 2015.
The three-volume set, consisting of LNCS 10116, 10117, and 10118, contains carefully reviewed and selected papers presented at 17 workshops held in conjunction with the 13th Asian Conference on Computer Vision, ACCV 2016, in Taipei, Taiwan in November 2016.
This book constitutes the refereed proceedings of the 8th International Conference on HCI in Business, Government and Organizations, HCIBGO 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.