This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019.
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019.
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019.
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019.
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
This book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Interplay of Security, Safety and System/Software Architecture, CSITS 2018, and the International Workshop on Cyber Security for Intelligent Transportation Systems, ISSA 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018.
This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application.
This book constitutes the proceedings of the Third International Conference on Codes, Cryptology and Information Security, C2SI 2019, held in Rabat, Morocco, in April 2019.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Smart Card Research and Advanced Applications, CARDIS 2018, held in Monpellier, France, in November 2018.
This text presents a careful introduction to methods of cryptology and error correction in wide use throughout the world and the concepts of abstract algebra and number theory that are essential for understanding these methods.
This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.
This book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2019, CT-RSA 2019, held in San Francisco, CA, USA, in March 2019.
This book constitutes the refereed proceedings of the First International Workshop, IOSec 2018, sponsored by CIPSEC, held in Heraklion, Crete, Greece, in September 2018.
This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.
This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018.
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018.
This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Internet Technology, ICDCIT 2019, held in Bhubaneswar, India, in January 2019.
This book constitutes the workshop proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018.
This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on the Arithmetic of Finite Field, WAIFI 2018, held in Bergen, Norway, in June 2018.
This book constitutes the refereed proceedings of the 4th International Conference on Security Standardisation Research, SSR 2018, held in Darmstadt, Germany, in November 2018.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.
This book constitutes the refereed proceedings of the Second International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, ISDDC 2018, held in Vancouver, BC, Canada, in November 2018.
This book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.
This book constitutes the proceedings of the First International Conference on Science of Cyber Security, SciSec 2018, held in Beijing, China, in August 2018.
This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017.
This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018.
This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018.
This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First International Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the Second International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018.
This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018.
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018.
This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud.
This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud.
This textbook introduces the fundamental concepts and techniques used in biometric recognition to students, practitioners, and non-experts in the field.
An expert guide to implementing fast, secure, and scalable decentralized applications that work with thousands of users in real timeKey FeaturesImplement advanced features of the Ethereum network to build powerful decentralized applicationsBuild smart contracts on different domains using the programming techniques of Solidity and VyperExplore the architecture of Ethereum network to understand advanced use cases of blockchain development Book DescriptionEthereum is one of the commonly used platforms for building blockchain applications.
Develop a deeper understanding of what's under the hood of blockchain with this technical reference guide on one of the most disruptive modern technologiesKey FeaturesUpdated with four new chapters on consensus algorithms, Ethereum 2.