The two-volume set LNCS 16491 + 16492 constitutes the proceedings of the 17th International Workshop on Post-Quantum Cryptography, PQCrypto 2026, held in Saint Malo, France, during April 2026.
The two-volume set LNCS 16491 + 16492 constitutes the proceedings of the 17th International Workshop on Post-Quantum Cryptography, PQCrypto 2026, held in Saint Malo, France, during April 2026.
The two-volume set LNCS 16491 + 16492 constitutes the proceedings of the 17th International Workshop on Post-Quantum Cryptography, PQCrypto 2026, held in Saint Malo, France, during April 2026.
The two-volume set LNCS 16491 + 16492 constitutes the proceedings of the 17th International Workshop on Post-Quantum Cryptography, PQCrypto 2026, held in Saint Malo, France, during April 2026.
As 3D vision reshapes industries from augmented reality to autonomous systems, a critical challenge emerges: How can we efficiently process massive point cloud data without sacrificing quality?
As 3D vision reshapes industries from augmented reality to autonomous systems, a critical challenge emerges: How can we efficiently process massive point cloud data without sacrificing quality?
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.
This book constitutes the proceedings of the 6th International Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2025, held in Volgograd, Russia, during September 22–25, 2025.
This book constitutes the proceedings of the 6th International Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2025, held in Volgograd, Russia, during September 22–25, 2025.
In the last few years, the protection of computerised medical records, and of other personal health information, has become the subject of both technical research and political dispute in a number of countries.
Interference Cancellation Using Space-Time Processing and Precoding Design introduces original design methods to achieve interference cancellation, low-complexity decoding and full diversity for a series of multi-user systems.
This textbook covers thetheoretical background of one- and multidimensional signal processing,statistical analysis and modelling, coding and information theory with regardto the principles and design of image, video and audio compression systems.
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers.
Since their introduction in the mid 1950s, the filtering techniques developed by Kalman, and by Kalman and Bucy have been widely known and widely used in all areas of applied sciences.
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration.
Psychoacoustics - Facts and Models offers a unique, comprehensive summary of information describing the processing of sound by the human hearing system.
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration.
Information and Its Role in Nature presents an in-depth interdisciplinary discussion of the concept of information and its role in the control of natural processes.
Cryptology, for millennia a "e;secret science"e;, is rapidly gaining in practical importance for the protection of communication channels, databases, and software.
On behalf of the program committee, it is our pleasure to present to you the proceedings of the fourth Recent Advances in Intrusion Detection Symposium.
This volume constitutes the strictly refereed post-workshop proceedings of the Fourth International Workshop on Fast Software Encryption, FSE'97, held in Haifa, Israel, in January 1997.
This book constitutes the refereed proceedings of the 5th International Symposium, Latin American Theoretical Informatics, LATIN 2002, held in Cancun, Mexico, in April 2002.
This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly RSA Security Conference in Springer-Verlag's Lecture Notes in Computer Science series.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.