There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.
Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication.
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved.
Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc.
This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2021, which took place during November 11-13, 2021.
This book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, held in Leuven, Belgium, in April 2022.
This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products.
This book contains revised selected papers from the 28th International Conference on Selected Areas in Cryptography, SAC 2021, held as a virtual event September and October 2021.
AI has become an emerging technology to assess security and privacy, with many challenges and potential solutions at the algorithm, architecture, and implementation levels.
The age of Advanced Air Mobility (AAM) is upon us, and in ushering new ways to connect and travel, this wave of technology has been compared to GPS and cloud computing.
This book constitutes the proceedings of the 9th International Workshop on Code-Based Cryptography, CBCrypto 2021, which was held during June 21-22, 2021.
This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities.
This book gathers the latest advances, innovations, and applications in the field of sensing technology, as presented by international researchers and engineers at the 14th International Conference on Sensing Technology (ICST), held in Chennai, India on January 17-19, 2022.
This handbook aims at modernizing the current state of civil engineering and firefighting, especially in this era where infrastructures are reaching new heights, serving diverse populations, and being challenged by unique threats.
This book constitutes the refereed post-conference proceedings of the 13th International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16th International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TRIDENTCOM 2021, held in November 2021.
This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime.
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity.
This book constitutes the refereed post-conference proceedings of the 3rd EAI International Conference on Sustainable Energy for Smart Cities, SESC 2021, held in November 2021.
This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime.
This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021.
This book constitutes the proceedings of the 14th International Conference on Cloud Computing, CLOUD 2021, held online as part of SCF 2021, during December 10-14, 2021.
This book constitutes the refereed proceedings of the 9th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2021, held in San Antonio, TX, USA, in 2021.
The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022.
The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022.
This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial, machine learning, deep learning algorithms which work as a black box as of today.
This book constitutes the proceedings of the 4th International Conference on Blockchain, ICBC 2021, held as part of SCF 2021, held as a Virtual Event, during December 10-14, 2021.
This book constitutes the proceedings of the 10th International Conference on Artificial Intelligence and Mobile Services, AIMS 2021, held as a virtual conference as part of SCF 2021, during December 10-14, 2021.
This volume constitutes selected papers presented at the First International Conference on Informatics and Intelligent Applications, ICIIA 2021, held in Ota, Nigeria, in November 2021.
This book constitutes the refereed proceedings of six International Workshops that were held in conjunction with the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-6, 2021.
This volume constitutes the proceedings of the 20th International Workshop on Digital Forensics and Watermarking, IWDW 2021, held in Beijing, China, in November 2021.
The three volume set LNCS 13155, 13156, and 13157 constitutes the refereed proceedings of the 21st International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2021, which was held online during December 3-5, 2021.
The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission.
This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2021, held in Kolkata, India, in December 2021.
This book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020.
The LNCS 13172 constitute the proceedings of the 13th International Symposium on Cyberspace Safety and Security, CSS 2021, held online, in November 2021.
This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.