This book constitutes the conference proceedings of the 4th International Conference on Security and Privacy, ICSP 2025, held in Rourkela, India, during December 5–7, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
This book constitutes the conference proceedings of the 4th International Conference on Security and Privacy, ICSP 2025, held in Rourkela, India, during December 5–7, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29–31, 2025.
This volume constitutes the proceedings of First International Conference on Modeling, Simulation and Computer Technology, ICMSCT 2024, held in Skikda, Algeria, during November 5–6, 2024.
This volume constitutes the proceedings of First International Conference on Modeling, Simulation and Computer Technology, ICMSCT 2024, held in Skikda, Algeria, during November 5–6, 2024.
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
This book includes extended and revised versions of a set of selected papers presented at the 20th International Conference on Security and Cryptography, SECRYPT 2023, which took place in Rome, Italy, during July 10–12, 2023; and the 21st International Conference on Security and Cryptography, SECRYPT 2024, which was held in Dijon, France, during July 8-10, 2024.
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012.
This book constitutes the refereed proceedings of 3 workshops held at the 22nd International Conference on Financial Cryptography and Data Security, FC 2018, in Nieuwport, Curacao, in March 2018.
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2–4, 2025.
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
This book constitutes the refereed proceedings of 3 workshops held at the 22nd International Conference on Financial Cryptography and Data Security, FC 2018, in Nieuwport, Curacao, in March 2018.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015.
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015.
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013.
This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014.
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014.
This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013.
This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014.
This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014.
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013).
This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan.
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013.
This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013.
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013.
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013.
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013.