This book provides a first course on lattices - mathematical objects pertaining to the realm of discrete geometry, which are of interest to mathematicians for their structure and, at the same time, are used by electrical and computer engineers working on coding theory and cryptography.
This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and Blockchain Technology (CBT 2017) held in Oslo, Norway, in September 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in June 2017.
This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017.
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017.
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017.
This book constitutes the refereed conference proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2017, held in Atlanta, GA, USA, in September 2017.
This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017.
This book constitutes the proceedings of the 11th International Conference on Network and System Security, NSS 2017, held in Helsinki, Finland, in August 2017.
This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV.
This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017.
This book constitutes the refereed proceedings of the 14th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2017, held in Lyon, France, in August 2017 in conjunction with DEXA 2017.
This book constitutes the refereed proceedings of the 12th International Workshop on Security, IWSEC 2017, held in Hiroshima, Japan, in August/September 2017.
This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany,in August 2017.
Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM).
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.
This book constitutes the refereed proceedings of the 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, held in Bonn, Germany in July 2017.
This book constitutes the thoroughly refereed post-workshop proceedings of the 24 th International Workshop on Securit Protocols, held in Brno, Czech Republic, in April 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Workshop on Radio Frequency Identification and IoT Security, RFIDSec 2016, held in Hong Kong, China, in November/December 2016.
This book constitutes the refereed proceedings of the Second Conference on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2016, held in Crete, Greece, in September 2016 in conjunction with ESORICS 2016, the 21st annual European Symposium on Research in Computer Security.
This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.
This book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017.
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017.
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy,ACISP 2017, held in Auckland, New Zealand, in July 2017.
This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017.
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017.
This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016.
The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks.
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers.
This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017.
This book constitutes the thoroughly refereed conference proceedings of the Fourth International Workshop on Risk Assessment and Risk-Driven Quality Assurance, RISK 2016, held in conjunction with ICTSS 2016, in Graz, Austria, in October 2016.
This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016.
This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016.
This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017.
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on the Arithmetic of Finite Field, WAIFI 2016, held in Ghent, Belgium, in July 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Smart Card Research and Advanced Applications, CARDIS 2016, held in Cannes, France, in November 2016.
This book constitutes the refereed post-conference proceedings of the 5th International Conference on Computational Modeling of Objects Presented in Images, CompIMAGE 2016, held in Niagara Falls, NY, USA, in September 2016.