Cybernetic Shield: Securing the Future of Machine Intelligence explores the critical intersection between cybersecurity and the rapid advancements in artificial intelligence.
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
Cybernetic Shield: Securing the Future of Machine Intelligence explores the critical intersection between cybersecurity and the rapid advancements in artificial intelligence.
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
This book constitutes the proceedings from the 24th International Conference on Cryptology and Network Security, CANS 2025, held in Osaka, Japan during November 17–20, 2025.
This book constitutes the proceedings from the 24th International Conference on Cryptology and Network Security, CANS 2025, held in Osaka, Japan during November 17–20, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference on Financial Cryptography and Data Security, FC 2025, which took place in Miyakojima, Japan, during April 14–18, 2025.
This book constitutes the proceedings of the 15th International Symposium on Cyberspace Safety and Security, CSS 2025, held in Hangzhou, China, on February 24, 2025.
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025.
This book contains revised selected papers from the 32nd International Conference on Selected Areas in Cryptography, SAC 2025, held in Toronto, ON, Canada, in August 2025.
The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference on Financial Cryptography and Data Security, FC 2025, which took place in Miyakojima, Japan, during April 14–18, 2025.
This book focuses on four key parts of the Blockchain ecosystem, which are the most relevant for financial services executives: Tokenomics and Digital Platforms, Markets, Privacy and the emerging phenomenon of Decentralized Autonomous Organizations (DAOs).
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025.
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025.
This book constitutes the refereed proceedings of the 28th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2025, held in Milan, Italy, during June 3-4, 2025.
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025.
This book constitutes revised selected papers from the 5th International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2025, held in Hammamet, Tunisia, during April 26-27, 2025.
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025.
This book focuses on four key parts of the Blockchain ecosystem, which are the most relevant for financial services executives: Tokenomics and Digital Platforms, Markets, Privacy and the emerging phenomenon of Decentralized Autonomous Organizations (DAOs).
This book constitutes the refereed proceedings of the 28th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2025, held in Milan, Italy, during June 3-4, 2025.
The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference on Financial Cryptography and Data Security, FC 2025, which took place in Miyakojima, Japan, during April 14–18, 2025.
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025.
This book constitutes revised selected papers from the 5th International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2025, held in Hammamet, Tunisia, during April 26-27, 2025.
This book contains revised selected papers from the 32nd International Conference on Selected Areas in Cryptography, SAC 2025, held in Toronto, ON, Canada, in August 2025.
The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference on Financial Cryptography and Data Security, FC 2025, which took place in Miyakojima, Japan, during April 14–18, 2025.
The book constitutes the proceedings of the 28th International Conference on Information Security, ISC 2025, held in Seoul, South Korea, during October 20–22, 2025.
The book constitutes the proceedings of the 28th International Conference on Information Security, ISC 2025, held in Seoul, South Korea, during October 20–22, 2025.
This volume constitutes revised selected papers from the workshops that took place in conjunction with the 29th International Conference on Financial Cryptography and Data Security, FC 2025, Miyakojima, Japan, during April 14–18, 2025.
This volume constitutes revised selected papers from the workshops that took place in conjunction with the 29th International Conference on Financial Cryptography and Data Security, FC 2025, Miyakojima, Japan, during April 14–18, 2025.
This volume constitutes revised selected papers from the workshops that took place in conjunction with the 29th International Conference on Financial Cryptography and Data Security, FC 2025, Miyakojima, Japan, during April 14-18, 2025.
This volume constitutes revised selected papers from the workshops that took place in conjunction with the 29th International Conference on Financial Cryptography and Data Security, FC 2025, Miyakojima, Japan, during April 14-18, 2025.
This book constitutes the proceedings of the 15th International Symposium on Cyberspace Safety and Security, CSS 2025, held in Hangzhou, China, on February 24, 2025.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016.
Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016.