This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This book provides a comprehensive exploration of the engineering and scientific principles behind the Metaverse, a 3D digital world designed to replicate and enhance physical reality through some advanced technologies, such as extended reality (xR), artificial intelligence (AI), blockchain, 5G/6G, and computer vision.
This book provides a comprehensive exploration of the engineering and scientific principles behind the Metaverse, a 3D digital world designed to replicate and enhance physical reality through some advanced technologies, such as extended reality (xR), artificial intelligence (AI), blockchain, 5G/6G, and computer vision.
Dieses Lehrbuch prasentiert umfassend die Grundlagen der Kryptographie, beginnend mit symmetrischen Verfahren zur Sicherung von Vertraulichkeit, Integritat und Authentizitat bis hin zu aktuellen Public-Key-Verfahren und Post-Quantum-Kryptographie.
Dieses Lehrbuch prasentiert umfassend die Grundlagen der Kryptographie, beginnend mit symmetrischen Verfahren zur Sicherung von Vertraulichkeit, Integritat und Authentizitat bis hin zu aktuellen Public-Key-Verfahren und Post-Quantum-Kryptographie.
Schluss mit Passwortsalat und standigen Zurucksetzen-Mails: Dieses praxisnahe Handbuch fuhrt Sie Schritt fur Schritt vom klassischen Login zur modernen Anmeldung mit Passkeys-schnell, sicher und ohne Technikfrust.
This book systematically addresses the security and resilience of networked agent systems, from sensor networks to general multi-agent systems, against evolving cyber threats.
This book is a collection of best selected research papers presented at the International Conference on Modern Practices and Trends in Expert Applications and Security (MP-TEAS 2024).
This book contains best selected research papers presented at ICTCS 2024: Ninth International Conference on Information and Communication Technology for Competitive Strategies.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2025), held at Haldia Institute of Technology, Haldia, West Bengal, India, during January 14–16, 2025.
This book features research papers presented at the Third International Conference on Innovations in Data Analytics (ICIDA 2024), held at Eminent College of Management and Technology (ECMT), West Bengal, India, during 18–19 December 2024.
This book contains best selected research papers presented at ICTCS 2024: Ninth International Conference on Information and Communication Technology for Competitive Strategies.
This book features research papers presented at the Third International Conference on Innovations in Data Analytics (ICIDA 2024), held at Eminent College of Management and Technology (ECMT), West Bengal, India, during 18–19 December 2024.
This book features research papers presented at the Third International Conference on Innovations in Data Analytics (ICIDA 2024), held at Eminent College of Management and Technology (ECMT), West Bengal, India, during 18–19 December 2024.
This book presents a case study of the development of a smart contract, from the analysis of the legal contract to the structural design of the smart contract and implementation on the Ethereum blockchain.
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2025), held at Haldia Institute of Technology, Haldia, West Bengal, India, during January 14–16, 2025.
This book features research papers presented at the Third International Conference on Innovations in Data Analytics (ICIDA 2024), held at Eminent College of Management and Technology (ECMT), West Bengal, India during 18–19 December 2024.
This book presents a case study of the development of a smart contract, from the analysis of the legal contract to the structural design of the smart contract and implementation on the Ethereum blockchain.
This book is a collection of best selected research papers presented at the International Conference on Modern Practices and Trends in Expert Applications and Security (MP-TEAS 2024).
This book features research papers presented at the Third International Conference on Innovations in Data Analytics (ICIDA 2024), held at Eminent College of Management and Technology (ECMT), West Bengal, India during 18–19 December 2024.
This book contains best selected research papers presented at ICTCS 2024: Ninth International Conference on Information and Communication Technology for Competitive Strategies.
This book contains best selected research papers presented at ICTCS 2024: Ninth International Conference on Information and Communication Technology for Competitive Strategies.
This book is a collection of best -selected research papers presented at the International Conference on Modern Practices and Trends in Expert Applications and Security (MP-TEAS 2024).
This book features research papers presented at the Third International Conference on Innovations in Data Analytics (ICIDA 2024), held at Eminent College of Management and Technology (ECMT), West Bengal, India, during 18–19 December 2024.
This book is a collection of best -selected research papers presented at the International Conference on Modern Practices and Trends in Expert Applications and Security (MP-TEAS 2024).
This book lays a systematic foundation for professionals, researchers, and industry readers who are interested the applications and implications of generative AI for cybersecurity.
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape.
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.
Los avances en la ciencia del cerebro y las neurotecnologias abren nuevas vias para mejorar el diagnostico y el tratamiento de los trastornos mentales, y de las enfermedades neurologicas en general.
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.
This two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Symposium Workshops, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.
This book guides readers from the foundations of quantum mechanics through advanced quantum algorithms (such as Shor’s and Grover’s) and state-of-the-art machine learning methods.
This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025.