Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6-7, 2001.
This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2021, held in Lugano, Switzerland, in October 2021.
This book contains revised selected papers fromthe Second International Conference on Cryptology and Information Security inthe Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015.
Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft", gewinnt zusehends praktische Bedeutung für den Schutz von Kommunikationswegen, Datenbanken und Software.
The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021.
This book constitutes the refereed proceedings of the 26th Nordic Conference on Secure IT Systems, NordSec 2021, which was held online during November 2021.
This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022.
Information and Its Role in Nature presents an in-depth interdisciplinary discussion of the concept of information and its role in the control of natural processes.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022.
The text covers the fundamentals of Python programming and the implementation of data structures using Python programming with the help of worked-out examples.
This book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First Workshop on the Security of Cyber Physical Systems, WOS-CPS 2015, held in Vienna, Austria, in September 2015 in conjunction with ESORICS 2015, the 20th annual European Symposium on Research in Computer Security.
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
This book constitutes the proceedings of the 6th International Conference on Cryptology and Security in Latin America, LATINCRYPT 2019, held in Santiago di Chile, Chile, in October 2019.
This volume contains the proceedings of the 13th International Conference on Financial Cryptography and Data Security, held at the Accra Beach Hotel and Resort, Barbados, February 23-26, 2009.
This volume constitutes the refereed post-conference proceedings of the Second IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2017, held in Sofia, Bulgaria, in October 2017.
This book constitutes the refereed proceedings of the 4th International Conference on Future Network Systems and Security, FNSS 2018, held in Paris, France, in July 2018.
This book constitutes the refereed proceedings of the 4th International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022.
This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017.
Information is a core concept in animal communication: individuals routinely produce, acquire, process and store information, which provides the basis for their social life.
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012.
This book constitutes the refereed proceedings of the 5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021, held in Be'er Sheva, Israel, in July 2021.
This book constitutes the proceedings of the 7th International Workshop on Graphical Models for Security, GramSec 2020, which took place on June 22, 2020.
Anyone who has ever bought a car, rented an apartment, had a job or conversation that they would rather not see in their employee review may find this book of interest.
The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of C- munication and Information at Rutgers University, was held on May 12, 2008 at the Hyatt Regency, New Brunswick, New Jersey, USA.
The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023.
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments.
A new class of provably capacity achieving error-correction codes, polar codes are suitable for many problems, such as lossless and lossy source coding, problems with side information, multiple access channel, etc.
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.
This book constitutes the proceedings of the 10th International Conference on Artificial General Intelligence, AGI 2017, held in Melbourne, VIC, Australia, in August 2017.