This book constitutes the refereed proceedings of the 9th Iberoamerican Conference on Applications and Usability of Interactive Television, jAUTI 2020, in Aveiro, Portugal, in December 2020.
The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2025, CT-RSA 2025, held in San Francisco, CA, USA, during April 28–May 1, 2025.
This book provides an introduction to the basic ideas involved in cybersecurity, whose principal aim is protection of IT systems against unwanted behaviour mediated by the networks which connect them.
This two-volume set constitutes the refereed proceedings of the 7th International Conference on Human Aspects of IT for the Aged Population, ITAP 2021, held as part of the 23rd International Conference, HCI International 2021, held as a virtual event, in July 2021.
This book constitutes the refereed proceedings of the 11th International Conference on Cloud Computing and Services Science, CLOSER 2021, Virtual Event, during April 28-30, 2021.
This textbook presents a fascinating review of cryptography and cryptanalysis, from the earliest known cryptographic systems of 2,500 years ago up to modern computer-based systems.
This book contains revised selected papers from the 24th International Conference on Selected Areas in Cryptography, SAC 2017, held in Ottawa, ON, Canada in August 2017.
This book constitutes the refereed proceedings of the 5th Latin American Conference on Geographical, Information Systems, GIS-LATAM 2024, held in Mexico City, Mexico, during September 2-6, 2024.
This book constitutes the refereed post-conference proceedings of the First EAI International Conference on Sustainable Energy for Smart Cities, SESC 2029, held as part of the Smart City 360(deg) Summit event in Braga, Portugal, in December 2019.
This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022.
A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.
The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021.
Learn advanced C# concepts and techniques such as building caches, cryptography, and parallel programming by solving interesting programming challengesKey FeaturesGain useful insights on advanced C# programming topics and APIsUse locking and cached values to solve parallel problemsTake advantage of .
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2016, held in Dubrovnik, Croatia in September 2016 under the sponsorship of the UNESCO chair in Data Privacy.
This book constitutes the refereed proceedings of the 7th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 27th International Conference, HCI International 2025, in Gothenburg, Sweden, during June 22–27, 2025.
This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020.
Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market.
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Mobile, Secure and Programmable Networking, held in Mohammedia, Morocco, in April 2019.
This book constitutes the refereed proceedings of the 4th International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022.
The two-volume set LNCS 14973 and 14974 constitutes the proceedings of the 14th International Conference on Security and Cryptography for Networks, SCN 2024, which took place in Amalfai, Italy, during September 11-13, 2024.
This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.
Foreword by Dieter Jungnickel Finite Commutative Rings and their Applications answers a need for an introductory reference in finite commutative ring theory as applied to information and communication theory.
This book constitutes the refereed proceedings of the 11th International Conference on Cloud Computing and Services Science, CLOSER 2021, Virtual Event, during April 28-30, 2021.
In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road.
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2021, held in Kristiansand, Norway, in August 2021.
This book presents state-of-the-art methodologies and a comprehensive introduction to the recognition and representation of species and individual animals based on their physiological and phenotypic appearances, biometric characteristics, and morphological image patterns.
This proceedings, HCI-CPT 2024, constitutes the refereed proceedings of the 6th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 26th International Conference, HCI International 2024, which took place from June 29 - July 4, 2024 in Washington DC, USA.
Dieses Buch erläutert kompakt, ohne theoretischen Überbau und mit möglichst wenig mathematischem Formalismus die wesentlichen Konzepte bei der Verschlüsselung schützenswerter Nachrichten und Daten.
This volume constitutes the papers of several workshops which were held in conjunction with the 28th International Conference on Database Systems for Advanced Applications, DASFAA 2023, held in Tanjin, China, in April 2023.