The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book presents recent advances in the field of scalable distributed computing including state-of-the-art research in the field of Cloud Computing, the Internet of Things (IoT), and Blockchain in distributed environments along with applications and findings in broad areas including Data Analytics, AI, and Machine Learning to address complex real-world problems.
This volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), held April 19-21, 2006 in York, UK.
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019.
This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023.
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks.
The open access volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019.
Develop your cybersecurity knowledge to obtain CCNA Cyber Ops certification and gain professional skills to identify and remove potential threatsKey FeaturesExplore different security analysis tools and develop your knowledge to confidently pass the 210-255 SECOPS examGrasp real-world cybersecurity skills such as threat analysis, event correlation, and identifying malicious activityLearn through mock tests, useful tips, and up-to-date exam questionsBook DescriptionCybersecurity roles have grown exponentially in the IT industry and an increasing number of organizations have set up security operations centers (SOCs) to monitor and respond to security threats.
This book discovers what it will take to reindustrialize the previous industrial powerhouses in order to offset the advantages of cheap labor suppliers dominating the industrial sector by exploring the current situation of the production, processing, and manufacturing industries.
The two-volume set LNCS 7289 and 7290 constitutes the refereed proceedings of the 11th International IFIP TC 6 Networking Conference held in Prague, Czech Republic, in May 2012.
This book is a part of the Blue Book series "e;Research on the Development of Electronic Information Engineering Technology in China"e;, which explores the cutting edge of blockchain technology studies.
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.
Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market.
This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically expounds the principle of cyberspace endogenous security and safety, introduces the author-invented dynamic heterogeneous redundant (DHR) architecture with endogenous security and safety features, and theoretically answers why DHR endogenous security and safety architecture can enable network resilience engineering; the enabling role of DHR architecture solves the problem that network resilience cannot cope with unknown damage, lacks structural gain, and cannot quantify design measures.
Concurrent and distributed processes occur everywhere: in embedded systems, in information networks and databases, and in the form of applets roaming around on the World-Wide-Web.
This book constitutes the refereed proceedings of the Second Western European Workshop on Research in Cryptology, WEWoRC 2007, held in Bochum, Germany, in July 2007 The 12 revised full papers were carefully reviewed and selected from a total of 36 submissions.
This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022.
These are the proceedings of the Workshop on Sequences, Subsequences, and Consequences that was held at the University of Southern California (USC), May 31 - June 2, 2007.
The metaverse, a hybrid society of the real and the virtual is attracting significant attention from academia to industry and is starting to change the world.
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017.
This book gives a detailed overview of SIP specific security issues and how to solve them While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed.
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it.
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014.
This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012.
This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013.
This book constitutes the thoroughly refereed conference proceedings of the Fourth International Workshop on Risk Assessment and Risk-Driven Quality Assurance, RISK 2016, held in conjunction with ICTSS 2016, in Graz, Austria, in October 2016.
This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017.
This book starts by presenting the basics of reinforcement learning using highly intuitive and easy-to-understand examples and applications, and then introduces the cutting-edge research advances that make reinforcement learning capable of out-performing most state-of-art systems, and even humans in a number of applications.
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market request, but also because this science has created possibilities for people of investigation and solved many problems that some time ago seemed to be insolvable.
This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career.