This book features high-quality research papers presented at the International Conference on AI and Financial Innovation (AIFI 2025), IIMT Bhubaneswar, Odisha, India, during February 7–8, 2025.
This book features high-quality research papers presented at the International Conference on AI and Financial Innovation (AIFI 2025), IIMT Bhubaneswar, Odisha, India, during February 7–8, 2025.
This book presents peer-reviewed articles from the 7th International Conference on Technical Textiles and Nonwovens, ICTN 2023, held from 12th to 14th December 2023 at the Indian Institute of Technology Delhi (IIT Delhi) in India.
This book delves into the intricate dynamics of energy transitions within the ASEAN and East Asia region, focusing on the practical applications of various strategies.
This book delves into the intricate dynamics of energy transitions within the ASEAN and East Asia region, focusing on the practical applications of various strategies.
This book presents peer-reviewed articles from the 7th International Conference on Technical Textiles and Nonwovens, ICTN 2023, held from 12th to 14th December 2023 at the Indian Institute of Technology Delhi (IIT Delhi) in India.
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
This book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017.
The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016.
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Web and Internet Economics, WINE 2016, held in Montreal, QC, Canada, in December 2016.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016.
This book constitutes the refereed proceedings of three workshops heldat the 20th International Conference on Financial Cryptography and DataSecurity, FC 2016, in Christ Church, Barbados, in February 2016.
Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016.
This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016.
The two-volume proceedings LNCS 9665 + 9666constitutes the thoroughly refereed proceedings of the 35th AnnualInternational Conference on the Theory and Applications of CryptographicTechniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016.
The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016.
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016.
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016.
This book constitutes the proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, which took place in Eindhoven, The Netherlands, in April 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016.
This book constitutes the proceedings of the 13th International Conference on Service-Oriented Computing, ICSOC 2015, held in Goa, India, in November 2015.
This volume provides a complete record of presentations made at Industrial Engineering, Management Science and Applications 2015 (ICIMSA 2015), and provides the reader with a snapshot of current knowledge and state-of-the-art results in industrial engineering, management science and applications.
Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016.
This book constitutes the proceedings of the 6th International IFIP Working Conference on Enterprise Interoperability, IWEI 2015, held in Nimes, France, in May 2015.
The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015.
This volume presents five surveys with extensivebibliographies and six original contributions on set optimization and its applicationsin mathematical finance and game theory.
The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015.
This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015.
This book constitutes the refereed proceedings of the Second International Multidisciplinary Social Networks Conference, MISNC 2015, held in Matsuyama, Japan, in September 2015.
This book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Security, FC 2015, in San Juan, Puerto Rico, in January 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015.
The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015.
The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014.
This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, in London, UK, in April 2015.
This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014.
This book constitutes the refereed conference proceedings of the 12th International Conference on Service-Oriented Computing, ICSOC 2014, held in Paris, France, in November 2014.
This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, UK, in March 2010.