The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023.
This proceedings, HCI-CPT 2024, constitutes the refereed proceedings of the 6th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 26th International Conference, HCI International 2024, which took place from June 29 - July 4, 2024 in Washington DC, USA.
This two volume set (CCIS 858 and CCIS 859) constitutes the refereed proceedings of the Third International Conference on Digital Transformation and Global Society, DTGS 2018, held in St.
This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.
Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly the Internet, have permeated into every facet of our daily lives.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020.
This book provides basic knowledge required by an application developer to understand and use the Fully Homomorphic Encryption (FHE) technology for privacy preserving Data-Science applications.
This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017.
This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques.
Learn quick and effective techniques for developing blockchain-based distributed ledgers with easeKey FeaturesDiscover why blockchain is a game changer in the technology landscapeSet up blockchain networks using Hyperledger FabricWrite smart contracts at speed with Hyperledger ComposerBook DescriptionBlockchain and Hyperledger are open source technologies that power the development of decentralized applications.
This book constitutes revised selected papers from the 9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, held in Singapore, in April 2018.
Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease Key FeaturesWrite your own chaincode/smart contracts using Golang on hyperledger networkBuild and deploy decentralized applications (DApps)Dive into real world blockchain challenges such as integration and scalabilityBook DescriptionBBlockchain and Hyperledger technologiesare hot topics today.
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments.
Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA's fastest-growing credential, CompTIA Security+.
This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating relationship between the two concepts.
This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017.
This book constitutes the proceedings of the 22nd International Conference on Text, Speech, and Dialogue, TSD 2019, held in Ljubljana, Slovenia, in September 2019.
The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025.
The current digital signature methods like RSA, DSA, and ECDSA are relatively simple to understand, and their signing and verification processes operate in comparable time frames.
This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017.
This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020.
This book constitutes the proceedings of the 6th International Conference on Cryptology and Security in Latin America, LATINCRYPT 2019, held in Santiago di Chile, Chile, in October 2019.
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018.
Chapter "e;A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain"e; is available open access under a Creative Commons Attribution 4.
This book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St.
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection.
This volume contains the papers accepted for presentation at Africacrypt 2023, the 14th International Conference on the Theory and Application of Cryptographic Techniques in Africa.
This book constitutes thoroughly refereed and revised selected papers from the proceedings of 19th European Conference on Multi-Agent Systems, EUMAS 2022, held in Dusseldorf, Germany, during September 14-16, 2022.