This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Barcelona, Spain, in October 2013.
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in September 2013.
This book constitutes the refereed proceedings of the 10th International Conference on Distributed Computing and Internet Technology, ICDCIT 2014, held in Bhubaneswar, India, in February 2014.
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013.
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013.
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013.
This book constitutes the thoroughly refereed proceedings of the 15 International Symposium on Stabilization, Safety and Security of Distributed Systems, SSS 2013, held in Osaka, Japan, in November 2013.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013.
This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for Security, GameSec 2013, held in Fort Worth, TX, USA, in November 2013.
This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013.
This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes.
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks.
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks.
This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO).
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery.
Wahlmanipulation, Erpressung, Rufmord, Handel mit Kinderpornografie: Viele traditionelle Formen der Kriminalität bedienen sich zunehmend moderner Informations- und Kommunikationstechnologien – die Digitalisierung der Kriminalität schreitet voran.
The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds.
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022.
This book addresses one of the most overlooked practical, methodological, and moral questions in the journey to secure and handle the massive amount of data being generated from smart devices interactions: the integration of Blockchain with 5G-enabled IoT.
This book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, held in Nanjing, China, in December 2020.
This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named "e;ATM Hacking.
This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017.
This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS).
This engaging and thought-provoking textbook examines the ethical, social, and policy challenges arising from our rapidly and continuously evolving computing technology, ranging from the Internet to the ubiquitous portable devices we use to access it.
This book explores how digital technologies have proved to be a useful and necessary tool to help ensure that local and regional governments on the frontline of the emergency can continue to provide essential public services during the COVID-19 crisis.
This book contains a selection of the best papers that were presented at the 28th edition of the annual Benelux Conference on Artificial Intelligence, BNAIC 2016.
This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and Blockchain Technology (CBT 2017) held in Oslo, Norway, in September 2017.
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures.
This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications.
This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption.
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers.
This book aims to clarify the priorities of the Sendai Framework for the DRR 2015 - 2030, through gathering recent contributions addressing the different ways researchers define, measure, reduce, and manage risk in the challenge of the DRR.
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain.
This book presents the best papers from the 5th International Conference on Mathematical Research for Blockchain Economy (MARBLE) 2024, held in Malaga, Spain.
Die Autorin stellt in diesem Standardwerk die zur Umsetzung der Sicherheitsanforderungen benötigten Verfahren und Protokolle detailliert vor und erläutert sie anschaulich anhand von Fallbeispielen.