The two-volume set LNCS 16491 + 16492 constitutes the proceedings of the 17th International Workshop on Post-Quantum Cryptography, PQCrypto 2026, held in Saint Malo, France, during April 2026.
The two-volume set LNCS 16491 + 16492 constitutes the proceedings of the 17th International Workshop on Post-Quantum Cryptography, PQCrypto 2026, held in Saint Malo, France, during April 2026.
The two-volume set LNCS 16491 + 16492 constitutes the proceedings of the 17th International Workshop on Post-Quantum Cryptography, PQCrypto 2026, held in Saint Malo, France, during April 2026.
The two-volume set LNCS 16491 + 16492 constitutes the proceedings of the 17th International Workshop on Post-Quantum Cryptography, PQCrypto 2026, held in Saint Malo, France, during April 2026.
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.
This book constitutes the proceedings of the 6th International Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2025, held in Volgograd, Russia, during September 22–25, 2025.
This book constitutes the proceedings of the 6th International Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2025, held in Volgograd, Russia, during September 22–25, 2025.
Welcome to "e;Evolune,"e; a far-reaching adventure set in the year 11000, where the frontiers of Virtual Reality (VR), AI, Blockchain technology, and the Metaverse converge.
Welcome to "e;Evolune,"e; a far-reaching adventure set in the year 11000, where the frontiers of Virtual Reality (VR), AI, Blockchain technology, and the Metaverse converge.
In the last few years, the protection of computerised medical records, and of other personal health information, has become the subject of both technical research and political dispute in a number of countries.
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers.
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration.
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration.
Cryptology, for millennia a "e;secret science"e;, is rapidly gaining in practical importance for the protection of communication channels, databases, and software.
On behalf of the program committee, it is our pleasure to present to you the proceedings of the fourth Recent Advances in Intrusion Detection Symposium.
This volume constitutes the strictly refereed post-workshop proceedings of the Fourth International Workshop on Fast Software Encryption, FSE'97, held in Haifa, Israel, in January 1997.
This book constitutes the refereed proceedings of the 5th International Symposium, Latin American Theoretical Informatics, LATIN 2002, held in Cancun, Mexico, in April 2002.
This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly RSA Security Conference in Springer-Verlag's Lecture Notes in Computer Science series.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
On behalf of the program committee, it is our pleasure to present to you the proceedings of the Fifth Symposium on Recent Advances in Intrusion Detection (RAID).
This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career.
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
ASIACRYPT'98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22.
The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography.