This volume constitutes selected papers presented at the First International Conference on Engineering Software for Modern Challenges, ESMoC 2021, held in Johor, Malaysia, in October 20-21, 2021.
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security Practice and Experience, ISPEC 2022, held in Taipei, Taiwan, in November 2022.
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.
This book constitutes the proceedings of the 11th International Congress on Telematics and Computing, WITCOM 2022, held in Cancun, Mexico, in November 2022.
This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi'an, China, in October 2022.
This volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022, held in August 2022 in Vienna, Austria, as part of the DEXA 2022 conference.
This book constitutes the proceedings of the 4th International Conference on Science of Cyber Security, SciSec 2022, held in Matsu, Japan in August 2022.
This book sonstitutes selected papers from the first International Conference on Cyber Warfare, Security and Space Research, SpacSec 2021, held in Jaipur, India, in December 2021.
This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022.
This book constitutes the refereed proceedings of the 15th IFIP TC 9 International Conference on Human Choice and Computers, HCC15 2022, in Tokyo, Japan, in September 2022.
This volume constitutes the proceedings of the 13th International Conference on post-quantum cryptography, PQCrypto 2022, held in as a Virtual Event in September 2022.
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022.
This book constitutes the proceedings of the Blockchain, Robotic Process Management (RPA), and Central and Eastern Europe (CEE) Forum which were held as part of the 20th International Conference on Business Process Management, BPM 2022, which took place in Munster, Germany, during September 11-15, 2022.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, which was held virtually in November 2021.
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022.
This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS).
This book constitutes the refereed proceedings of the 17th International Workshop on Security, IWSEC 2022, which took place as a hybrid event in Tokyo, Japan, in August/September 2022.
This book constitutes the proceedings of the 13th International Conference on Security and Cryptography for Networks, SCN 2022, held in Amalfi, Italy, in September 2022.
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model).
This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies.
This book constitutes the refereed proceedings of the 4th International Conference on Intelligent Technologies and Applications, INTAP 2021, held in Grimstad, Norway, October 11-13, 2021.
This book examines whether the integration of edge intelligence (EI) and blockchain (BC) can open up new horizons for providing ubiquitous intelligent services.
This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021.
This monograph provides a comprehensive and rigorous exposition of the basic concepts and most important modern research results concerning blockchain and its applications.
This book constitutes the revised selected papers of the 14th International Symposium on Foundations and Practice of Security, FPS 2021, held in Paris, France, in December 2021.
Cyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is commonly understood.
This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June - July 2021.
The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022.
This book constitutes selected papers from the 24th International Conference on Information Security and Cryptology, ICISC 2021, held in Seoul, South Korea, in December 2021.
This SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems.
This book highlights the latest design and development of security issues and various defences to construct safe, secure and trusted Cyber-Physical Systems (CPS).
This book constitutes the refereed proceedings of the 6th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2022, held in Be'er Sheva, Israel, in June - July 2022.
This handbook aims to serve as a one-stop, reliable source of reference, with curations of survey and expository contributions on the state-of-the-art in Blockchain technology.