The Crypto '95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciety Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara.
Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
Computers and their interactions are becoming the characteristic features of our time: Many people believe that the industrial age is going over into the information age.
This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2004, held on Samos Island, Greece in June 2004.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication.
The CQRE [Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving economic processes.
As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide variety of different disciplines of information security to foster the exchange of ideas.
This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Systems, MMM-ACNS 2001, held in St.
The 1st International Conference on "e;Applied Cryptography and Network Se- rity"e; (ACNS 2003) was sponsored and organized by ICISA (International C- munications and Information Security Association), in cooperation with MiAn Pte.
This book constitutes the refereed proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, held in Cheju Island, Korea in February 2001.
Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security.
This book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union's Sixth Framework Programme and the Swiss Federal Office for Education and Science.
Crypto '96, the Sixteenth Annual Crypto Conference, is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and P- vacy and the Computer Science Department of the University of California at Santa Barbara (UCSB).
Quantum Cryptography and Annealing for Securing Industrial IoT focuses on the rapidly evolving field of quantum security solutions for Industrial Internet of Things (IIoT) platforms, emphasizing the critical intersection of quantum cryptography, post-quantum cryptography, and their practical applications in IIoT.
This book offers a comprehensive roadmap for securing modern digital supply chains by weaving together foundational theory, organizational strategy, and advanced technologies.
This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025, held in Istanbul, Turkey, during September 1–2, 2025.
This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025, held in Istanbul, Turkey, during September 1–2, 2025.
This book presents the best papers from the 6th International Conference on Mathematical Research for Blockchain Economy (MARBLE) 2025, held in Athens, Greece.
This book offers a comprehensive roadmap for securing modern digital supply chains by weaving together foundational theory, organizational strategy, and advanced technologies.
“Blockchain-based Web of Things Security: Advances, Challenges, and Solutions” offers a concise yet comprehensive exploration of how blockchain technologies can enhance the security and trustworthiness of the Web of Things (WoT).
This research examines the adoption of blockchain technology in pharmaceutical supply chains, focusing on the barriers that prevent most initiatives from moving beyond the pilot stage.
This research examines the adoption of blockchain technology in pharmaceutical supply chains, focusing on the barriers that prevent most initiatives from moving beyond the pilot stage.
This book presents the best papers from the 6th International Conference on Mathematical Research for Blockchain Economy (MARBLE) 2025, held in Athens, Greece.
“Blockchain-based Web of Things Security: Advances, Challenges, and Solutions” offers a concise yet comprehensive exploration of how blockchain technologies can enhance the security and trustworthiness of the Web of Things (WoT).
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
This volume constitutes the proceedings of 9th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2025, in Be'er Sheva, Israel, during December 4–5, 2025.
This volume constitutes the proceedings of 9th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2025, in Be'er Sheva, Israel, during December 4–5, 2025.
This book includes extended and revised versions of a set of selected papers presented at the 20th International Conference on Security and Cryptography, SECRYPT 2023, which took place in Rome, Italy, during July 10–12, 2023; and the 21st International Conference on Security and Cryptography, SECRYPT 2024, which was held in Dijon, France, during July 8-10, 2024.