This book is a compilation of high-quality scientific papers presented at the 6th International Conference on Computer & Communication Technologies (IC3T 2024).
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in Africa, AFRICACRYPT 2025, which took place in Rabat, Morocco in July 2025.
This CCIS volume constitutes the refereed proceedings of Second International Artificial Intelligence Conference on Artificial Intelligence and Machine Learning, IAIC 2024, held in Jinyun, China, November 2024.
This edited book aims to comprehensively examine the current research trend, state-of-the-art IoT applications, deployment issues, potential challenges, and future research scopes related to Industry 5.
This CCIS volume constitutes the refereed proceedings of Second International Artificial Intelligence Conference on Artificial Intelligence and Machine Learning, IAIC 2024, held in Jinyun, China, November 2024.
This book explains cloud computing and microservices from the perspective of technological evolution, showing the ins and outs as well as the causes and consequences of cloud computing and microservices.
This book explains cloud computing and microservices from the perspective of technological evolution, showing the ins and outs as well as the causes and consequences of cloud computing and microservices.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
The Six-volume proceedings set CCIS 2473 and 2478 constitutes the refereed proceedings of the 9th International Conference on Computer Vision and Image Processing, CVIP 2024, held in Chennai, India, during December 19–21, 2024.
This CCIS volume constitutes the refereed proceedings of Second International Artificial Intelligence Conference on Artificial Intelligence and Machine Learning, IAIC 2024, held in Jinyun, China, November 2024.
The four-volume set CCIS 2416, 2417, 2418 and 2419 constitutes the refereed post-conference proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024 Spring, held in Beijing, China, during June 14–16, 2024.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This CCIS volume constitutes the refereed proceedings of Second International Artificial Intelligence Conference on Artificial Intelligence and Machine Learning, IAIC 2024, held in Jinyun, China, November 2024.
The Six-volume proceedings set CCIS 2473 and 2478 constitutes the refereed proceedings of the 9th International Conference on Computer Vision and Image Processing, CVIP 2024, held in Chennai, India, during December 19–21, 2024.
This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in Africa, AFRICACRYPT 2025, which took place in Rabat, Morocco in July 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This edited book aims to comprehensively examine the current research trend, state-of-the-art IoT applications, deployment issues, potential challenges, and future research scopes related to Industry 5.
This book teaches readers how wireless networks work, why some of their properties impact wireless network performance at the application level, and what both network engineers and application developers can do to cope with these challenges.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.
The four-volume set CCIS 2416, 2417, 2418 and 2419 constitutes the refereed post-conference proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024 Spring, held in Beijing, China, during June 14–16, 2024.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This book teaches readers how wireless networks work, why some of their properties impact wireless network performance at the application level, and what both network engineers and application developers can do to cope with these challenges.
This book constitutes the proceedings of the 5th International Conference on Financial Technology, ICFT 2024, held in Singapore during September 23-25, 2024.
This book constitutes the proceedings of the 5th International Conference on Financial Technology, ICFT 2024, held in Singapore during September 23-25, 2024.
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy, ICSP 2024, held in Jamshedpur, India, during November 20–21, 2024.
This book constitutes the proceedings of the 40th International Conference on Computers and Their Applications, CATA 2025, which took place in San Francisco, CA, USA, during March 17-18, 2025.
Securing the Connected World: Exploring Emerging Threats and Innovative Solutions offers a detailed examination of the growing challenges and cutting-edge solutions in the realms of IoT (Internet of Things) and IoD (Internet of Drones).
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025.
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025.
This book constitutes the refereed proceedings of the 10th Iberoamerican Conference on Human-Computer Interaction, HCI-COLLAB 2024, held in Pereira, Colombia, during June 4–7, 2024.
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025.
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025.
This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montréal, QC, Canada, during December 09–11, 2024.
This book provides a comprehensive exploration of how Artificial Intelligence (AI) is being applied in the fields of cyber security and digital forensics.
This CCIS post conference volume constitutes the proceedings of the 4th International Conference on Internet of Things, ICIoT 2023, in Chennai, India, during April 26–28, 2023.