This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Personal Satellite Services, PSATS 2010, held in Rome, Italy, Februray 2010.
Digitale Fernseh- und Hörfunktechnik in Theorie und Praxis“ ist mittlerweile ein vielgelesenes Standardwerk der modernen Rundfunktechnik, das weltweit in vielen Sprachen zur Verfügung steht.
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.
Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant.
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes.
Collaborative Networks for a Sustainable World Aiming to reach a sustainable world calls for a wider collaboration among multiple stakeholders from different origins, as the changes needed for sustainability exceed the capacity and capability of any individual actor.
Without a solid, robust procedure to evaluate digital asset investments, decisions are often made based on hype or influencer reviews, which, in the end, is nothing short of a lottery ticket.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2012, held in Palermo, Italy, in September 2012 under the sponsorship of the UNESCO chair in Data Privacy.
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012.
This book constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, UK, in March 2011.
Inference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, is about finding tradeoffs to the tension between the increasing societal need for accurate statistical data and the legal and ethical obligation to protect privacy of individuals and enterprises which are the source of data for producing statistics.
Privacy in statistical databases is a discipline whose purpose is to provide so- tionstothetensionbetweenthesocial,political,economicandcorporatedemand for accurate information, and the legal and ethical obligation to protect the p- vacy of the various parties involved.
Without a solid, robust procedure to evaluate digital asset investments, decisions are often made based on hype or influencer reviews, which, in the end, is nothing short of a lottery ticket.
This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009.
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This book constitutes the proceedings of the workshops held at the 29th International Conference on Theory and Practice of Digital Libraries, TPDL 2025, which took place in Tampere, Finland, during September 23-26, 2025.
This book constitutes the proceedings of the workshops held at the 29th International Conference on Theory and Practice of Digital Libraries, TPDL 2025, which took place in Tampere, Finland, during September 23-26, 2025.
Written from the perspective of an experienced IT expert, this book leverages a maturity model framework to guide organizations through each stage of adopting, securing, scaling, and tracking the value of low-code AI responsibly and efficiently.
Written from the perspective of an experienced IT expert, this book leverages a maturity model framework to guide organizations through each stage of adopting, securing, scaling, and tracking the value of low-code AI responsibly and efficiently.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
Dieses Lehrbuch prasentiert umfassend die Grundlagen der Kryptographie, beginnend mit symmetrischen Verfahren zur Sicherung von Vertraulichkeit, Integritat und Authentizitat bis hin zu aktuellen Public-Key-Verfahren und Post-Quantum-Kryptographie.
Dieses Lehrbuch prasentiert umfassend die Grundlagen der Kryptographie, beginnend mit symmetrischen Verfahren zur Sicherung von Vertraulichkeit, Integritat und Authentizitat bis hin zu aktuellen Public-Key-Verfahren und Post-Quantum-Kryptographie.