The CRYPTO '93 conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom), in co-operation with the IEEE Computer Society Technical Committee.
The CRYPTO '94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy.
A series of workshops devoted to modern cryptography beganin Santa Barbara,California in 1981 and was followed in1982 by a European counterpart in Burg Feuerstein, Germany.
This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992.
'I'he int,ernational Association for Cryptologic Research (IACK) organizes two inter- tioilill coiifcrcnces every year, one in Europe and one in the United States.
Eurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the International Association for Cryptologic Research (IACR).
A series of open workshops devoted to modem cryptology began in Santa Barbara, California in 1981 and was followed in 1982 by a European counterpart in Burg Feurstein, Germany.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book offers a novel multi-portfolio approach and stochastic programming formulations for modeling and solving contemporary supply chain risk management problems.
This book constitutes the refereed post proceedings of the 22nd International Workshop on Digital Forensics and Watermarking, IWDW 2023, held in Jinan, China,during November 25 26, 2023.
As depicted in David Lodge's celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth's population.
"e;Safety-Critical Systems: Problems, Process and Practice"e; contains the papers presented at the seventeenth annual Safety-critical Systems Symposium, held at Brighton, UK, in February 2009.
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes.
viii As we look for such a strategy, technological development races on with new technologies that make our efforts and existing technologies on which they are based obsolete in shorter and shorter periods.
When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it.
Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using their portable devices, such as smartphones and wearable devices.
The book aims to present a multi-dimensional view on the blockchain-driven supply chain management and its linkage with open innovation, digital technologies, supply chain sustainability, mapping, visibility, and resilience.
Aid organizations usually embrace the idea of digitalization, both in terms of using diverse technologies and processing data digitally for improving their services, making their operations more efficient and even mitigating various risks.
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape.
The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023.
The two-volume set LNBIP 547 + LNBIP 548 constitutes the proceedings of the 19th International Conference on Research Challenges in Information Sciences, RCIS 2025, which took place in Seville, Spain, in May 2025.
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023.
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 36th International Conference on Advanced Information Systems Engineering, CAiSE 2024, which was held in Limassol, Cyprus, during June 2024.
The evolving landscape of technology has presented numerous opportunities for addressing some of the most critical challenges in high-stakes domains such as medicine, law, and finance.