This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013.
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013.
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013.
This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013.
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks.
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks.
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery.
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022.
This engaging and thought-provoking textbook examines the ethical, social, and policy challenges arising from our rapidly and continuously evolving computing technology, ranging from the Internet to the ubiquitous portable devices we use to access it.
This book explores how digital technologies have proved to be a useful and necessary tool to help ensure that local and regional governments on the frontline of the emergency can continue to provide essential public services during the COVID-19 crisis.
This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and Blockchain Technology (CBT 2017) held in Oslo, Norway, in September 2017.
This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications.
This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption.
The Proceedings contain twenty selected, refereed contributions arising from the International Conference on Public-Key Cryptography and Computational Number Theory held in Warsaw, Poland, on September 11-15, 2000.
This book presents the best papers from the 5th International Conference on Mathematical Research for Blockchain Economy (MARBLE) 2024, held in Malaga, Spain.
This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies.
This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies.
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation.
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation.
This handbook aims to serve as a one-stop, reliable source of reference, with curations of survey and expository contributions on the state-of-the-art in Blockchain technology.
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017.
This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99, which has been held in Singapore during the week of November 22-26, 1999.
This volume constitutes selected papers presented at the First International Conference on Engineering Software for Modern Challenges, ESMoC 2021, held in Johor, Malaysia, in October 20-21, 2021.
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.
This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi'an, China, in October 2022.
This volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022, held in August 2022 in Vienna, Austria, as part of the DEXA 2022 conference.
This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022.
This book constitutes the refereed proceedings of the 15th IFIP TC 9 International Conference on Human Choice and Computers, HCC15 2022, in Tokyo, Japan, in September 2022.
This volume constitutes the proceedings of the 13th International Conference on post-quantum cryptography, PQCrypto 2022, held in as a Virtual Event in September 2022.
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, which was held virtually in November 2021.
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022.
This book constitutes the proceedings of the 13th International Conference on Security and Cryptography for Networks, SCN 2022, held in Amalfi, Italy, in September 2022.
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model).
This book examines whether the integration of edge intelligence (EI) and blockchain (BC) can open up new horizons for providing ubiquitous intelligent services.