This book provides a thorough and unique overview of the challenges, opportunities and solutions related with data protection in the age of AI and ML technologies.
This book constitutes the refereed proceedings of the 25th International Computer Symposium on New Trends in Computer Technologies and Applications, ICS 2022, which took place in Taoyuan, Taiwan, in December 2022.
This book constitutes the proceedings of the BPM 2024 Blockchain/RPA/CEE/Educators/Industry Forum held at the 22nd International Conference on Business Process Management, BPM 2024, which took place in Krakow, Poland, in September 2024.
This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12-14, 2022.
This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway.
This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30-December 2, 2022.
This book constitutes the refereed proceedings of the Second International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2022, held in Varanasi, India, during December 22-24, 2022.
This book constitutes the refereed proceedings of the 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023, held in Munich, Germany, during April 3-4, 2023.
This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity.
The 8-volume set, comprising the LNCS books 13801 until 13809, constitutes the refereed proceedings of 38 out of the 60 workshops held at the 17th European Conference on Computer Vision, ECCV 2022.
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11-13, 2022.
This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28-31, 2022.
In today's digital transformation environments, a rigorous cybersecurity approach to effective risk management - including contingency planning, outlining immediate actions, preparing post-breach responses - is central to defending organizations' interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.
This book provides a detailed insight into Robotic Process Automation (RPA) technologies linked with AI that will help organizations implement Industry 4.
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.
This three-volume set CCIS 1755-1757 constitutes the refereed proceedings of the 4th International Conference on Applied Technologies, ICAT 2022, held in Quito, Ecuador, in November 2022.
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.
This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022.
The two-volume set LNICST 460 and 461 constitutes the proceedings of the 18th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2022, held in Hangzhou, China, in October 2022.
This book constitutes refereed proceedings of the First International Conference on Emerging Networking Architecture and Technologies, ICENAT 2022, held in Shenzhen, China, in October 2022.
This book provides insights into deep learning techniques that impact the implementation strategies toward achieving the Sustainable Development Goals (SDGs) laid down by the United Nations for its 2030 agenda, elaborating on the promises, limits, and the new challenges.
This book constitutes the refereed proceedings of the 5th International Conference on Recent Trends in Image Processing and Pattern Recognition, RTIP2R 2022, held in Kingsville, TX, USA, in collaboration with the Applied AI Research Laboratory of the University of South Dakota, during December 01-02, 2022.
This two-volume constitutes the refereed proceedings of the First International Conference on Advancements in Smart Computing and Information Security, ASCIS 2022, held in Rajkot, India, in November 2022.
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China.
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China.
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China.
This book constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022.
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022.
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022.
This book constitutes the refereed proceedings of the 13th International Conference on Progress in Cryptology in Africa, AFRICACRYPT 2022, held in Fes, Morocco, from July 18th - 20th, 2022.
This book constitutes the proceedings of the 5th International Conference on Blockchain, ICBC 2022, held as part of the Services Conference Federation, SCF 2022, held in Honolulu, HI, USA, in December 2022.
This book constitutes the proceedings of the 29th International Conference on Web Services, ICWS 2022, held in Honolulu, USA, as part of SCF 2022, during December 10-14, 2022.
The 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022.
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022.
The 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022.
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022.
This book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode.
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022.
This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16-20, 2022The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions.
This book constitutes the proceedings of the 7th International Conference on Internet of Things, ICIOT 2022, held in Honolulu, USA, as part of SCF 2022, during December 10-14, 2022.
The 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022.
This book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11-12,2022.
This book constitutes the refereed First International Conference on Cryptography, Codes and Cyber Security, I4CS 2022, held in Casablanca, Morocco, during October 27-28, 2022.
This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022.
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022.