This book offers a comprehensive exploration of the transformative potential of Web3 and the metaverse, enabling entrepreneurs to harness the power of tokenization for the future.
Dieses Buch beschreibt, unter welchen Bedingungen das in der DDR am weitesten verbreitete Fernschreibchiffriergerät sowie der dazugehörige Algorithmus vor etwa 50 Jahren zum Schutz von Staatsgeheimnissen entwickelt wurden.
Dieses Buch beschreibt, unter welchen Bedingungen das in der DDR am weitesten verbreitete Fernschreibchiffriergerät sowie der dazugehörige Algorithmus vor etwa 50 Jahren zum Schutz von Staatsgeheimnissen entwickelt wurden.
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.
This book offers a comprehensive exploration of the transformative potential of Web3 and the metaverse, enabling entrepreneurs to harness the power of tokenization for the future.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines.
This book constitutes the joint refereed proceedings of the 16th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2016, and the 9th Conference on Internet of Things and Smart Spaces, ruSMART 2016, held in St.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Global Security, Safety, and Sustainability (ICDS3), and of the 4th e-Democracy Joint Conferences (e-Democracy 2011) which were held in Thessaloniki in August 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Personal Satellite Services, PSATS 2010, held in Rome, Italy, Februray 2010.
Digitale Fernseh- und Hörfunktechnik in Theorie und Praxis“ ist mittlerweile ein vielgelesenes Standardwerk der modernen Rundfunktechnik, das weltweit in vielen Sprachen zur Verfügung steht.
Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants.
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines.
Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant.
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes.
The next generation of Business Process Management (BPM) methods and tools will support the development of a new generation of service-enabled applications that change and evolve over time.
Collaborative Networks for a Sustainable World Aiming to reach a sustainable world calls for a wider collaboration among multiple stakeholders from different origins, as the changes needed for sustainability exceed the capacity and capability of any individual actor.
Without a solid, robust procedure to evaluate digital asset investments, decisions are often made based on hype or influencer reviews, which, in the end, is nothing short of a lottery ticket.
Moving Target Defense (MTD) has been proposed as an innovative defense framework, which aims to introduce the dynamics, diversity and randomization into static network by the shuffling, heterogeneity and redundancy.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2012, held in Palermo, Italy, in September 2012 under the sponsorship of the UNESCO chair in Data Privacy.
This book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014.
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012.
Privacy in statistical databases is a discipline whose purpose is to provide solutions to the tension between the increasing social, political and economical demand of accurate information, and the legal and ethical obligation to protect the privacy of the various parties involved.
This book constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, UK, in March 2011.
Inference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, is about finding tradeoffs to the tension between the increasing societal need for accurate statistical data and the legal and ethical obligation to protect privacy of individuals and enterprises which are the source of data for producing statistics.