This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.
This book constitutes the refereed proceedings of the 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018, held in Marrakesh, Morocco, in May 2018.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017.
This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located with the 25th European Symposium on Research in Computer Security, ESORICS 2020.
Chapter "e;A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain"e; is available open access under a Creative Commons Attribution 4.
This book constitutes the proceedings of the Blockchain and RPA Forum, held as part of the 19th International Conference on Business Process Management, BPM 2021, which took place during September 6-10, 2021, in Rome, Italy.
This book constitutes the refereed post-conference proceedings of the 13th International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16th International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TRIDENTCOM 2021, held in November 2021.
This book constitutes the revised selected post conference proceedings of the 15th International Workshop on Data Privacy Management, DPM 2020, and the 4th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2020, held in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020, held in Guildford, UK in September 2020.
This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.
The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017.
This book is intended to give researchers and practitioners in the cross-cutting fields of artificial intelligence, machine learning (AI/ML) and cyber security up-to-date and in-depth knowledge of recent techniques for improving the vulnerabilities of AI/ML systems against attacks from malicious adversaries.
This volume constitutes selected papers presented at the First International Conference on Engineering Software for Modern Challenges, ESMoC 2021, held in Johor, Malaysia, in October 20-21, 2021.
This two-volume set, LNAI 10234 and 10235, constitutes the thoroughly refereed proceedings of the 21st Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2017, held in Jeju, South Korea, in May 2017.
This volume constitutes the refereed proceedings of the 9th International Conference on Multimedia Communications, Services and Security, MCSS 2017, held in Krakow, Poland, in November 2017.
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022.
This volume constitutes the refereed post-conference proceedings of the International Conference on Theoretical Computer Science and Discrete Mathematics, held in Krishnankoil, India, in December 2016.
This book constitutes the refereed proceedings of the 18th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2017, held in Antwerp, Belgium, in September 2017.
The 30-volume set, comprising the LNCS books 12346 until 12375, constitutes the refereed proceedings of the 16th European Conference on Computer Vision, ECCV 2020, which was planned to be held in Glasgow, UK, during August 23-28, 2020.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015.
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020.
This book constitutes the refereed proceedings of the 26th Nordic Conference on Secure IT Systems, NordSec 2021, which was held online during November 2021.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in October 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Mobile, Secure, and Programmable Networking, MSPN 2015, held in Paris, France, in June 2015.
The 30-volume set, comprising the LNCS books 12346 until 12375, constitutes the refereed proceedings of the 16th European Conference on Computer Vision, ECCV 2020, which was planned to be held in Glasgow, UK, during August 23-28, 2020.
This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition towards the quantum computing application in various sectors.
Everyone expects the products and services they use to be secure, but 'building security in' at the earliest stages of a system's design also means designing for use as well.
The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022.
This book constitutes the proceedings of the 17th International Workshop on Security and Trust Management, STM 2021, co-located with the 26th European Symposium on Research in Computer Security, ESORICS 2021.
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Mobile Networks and Management, MONAMI 2017, held in Melbourne, Australia, in December 2017.
The two-volume set LNICST 209-210 constitutes the post-conference proceedings of the 11th EAI International Conference on Communications and Networking, ChinaCom 2016, held in Chongqing, China, in September 2016.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, which was held virtually in November 2021.
AI has become an emerging technology to assess security and privacy, with many challenges and potential solutions at the algorithm, architecture, and implementation levels.
This book constitutes the refereed post-conference proceedings of the First International Conference Edge Computing and IoT, ICECI 2020, held in November 2020 in Changsha, China.
This book constitutes the refereed proceedings of the 14th International Symposium on Neural Networks, ISNN 2017, held in Sapporo, Hakodate, and Muroran, Hokkaido, Japan, in June 2017.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field.
This book constitutes the refereed proceedings of the 6th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2022, held in Be'er Sheva, Israel, in June - July 2022.
This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021.