This book includes extended and revised versions of a set of selected papers presented at the 19th International Conference on Smart Business Technologies, ICSBT 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022.
This book constitutes the proceedings of the 6th International Conference on Blockchain, ICBC 2023, held as part of the Services Conference Federation, SCF 2023, held in Honolulu, HI, USA, during September 23-26, 2023.
This book constitutes the refereed proceedings of the 19th European Workshop on Computer Performance Engineering, EPEW 2023, and 27th International Conference on Analytical and Stochastic Modelling Techniques and Applications, ASMTA 2023, held in Florence, Italy, in June 2023.
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.
This book constitutes the refereed proceedings of the Third International Conference on Blockchain Technology and Emerging Applications, BlockTEA 2023, held in December 2-3, 2023 in Wuhan, China.
This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.
This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from both theoretical and practical points of view.
This book provides state-of-the-art Face De-Identification techniques and privacy protection methods, while highlighting the challenges faced in safeguarding personal information.
This book constitutes the refereed proceedings of the 19th European Workshop on Computer Performance Engineering, EPEW 2023, and 27th International Conference on Analytical and Stochastic Modelling Techniques and Applications, ASMTA 2023, held in Florence, Italy, in June 2023.
This book constitutes the referred proceedings of the 5th International Conference on Machine Learning for Cyber Security, ML4CS 2023, held in Yanuca Island, Fiji, during December 4-6, 2023.
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.
This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024, held in Gardanne, France, during April 9-10, 2024.
This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from both theoretical and practical points of view.
This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29-31, 2023.
This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29-31, 2023.
This book constitutes the proceedings of the BPM Forum held at the 21st International Conference on Business Process Management, BPM 2023, which took place in Utrecht, The Netherlands, in September 2023.
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape.
This book constitutes the proceedings of the workshops that have been held in conjunction with the 28th International Conference on Financial Cryptography, FC 2024, which took place in Willemstad, Curacao, during March 4-8, 2024.
This book constitutes the proceedings of the BPM Forum held at the 21st International Conference on Business Process Management, BPM 2023, which took place in Utrecht, The Netherlands, in September 2023.
The Metaverse seamlessly integrates the real world with the virtual world and allows avatars to engage in a broad range of activities including entertainment, social networking, and trading.
The Metaverse seamlessly integrates the real world with the virtual world and allows avatars to engage in a broad range of activities including entertainment, social networking, and trading.
This book constitutes the refereed proceedings of the 42nd International Conference on Computer Safety, Reliability and Security, SAFECOMP 2023, which took place in Toulouse, France, in September 2023.
This book constitutes the refereed proceedings of the 42nd International Conference on Computer Safety, Reliability and Security, SAFECOMP 2023, which took place in Toulouse, France, in September 2023.
This book constitutes the proceedings of the workshops that have been held in conjunction with the 28th International Conference on Financial Cryptography, FC 2024, which took place in Willemstad, Curacao, during March 4-8, 2024.
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023.
The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021.
The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021.
The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by the two world wars of the first half of the twentieth century - focusing (in particular) on the socio-technological transformations associated with modernism.
This book presents selected papers from the 18th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 15th International Conference on Frontiers of Information Technology, Applications, and Tools, held on December 16-18, 2022, in Kitakyushu, Japan.
This book features selected papers from the International Conference on Soft Computing for Security Applications (ICSCS 2023), held at Dhirajlal Gandhi College of Technology, Tamil Nadu, India, during April 21-22, 2023.
This book constitutes the refereed proceedings of the 6th International Conference on Mobile Internet Security, MobiSec 2022, held in Jeju, South Korea, in December 15-17, 2022.
The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by the two world wars of the first half of the twentieth century - focusing (in particular) on the socio-technological transformations associated with modernism.