As e-commerce becomes the norm of business transactions and information be- comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology.
This thesis addresses deep questions that cut to the physical and informational essence of central chemical quantities such as transition paths and reaction mechanisms and proposes fundamental new connections between transition-path theory, linear-response theory, nonequilibrium thermodynamics, and information theory.
Autonomic Computing and Networking presents introductory and advanced topics on autonomic computing and networking with emphasis on architectures, protocols, services, privacy & security, simulation and implementation testbeds.
Introduction to Data Compression, Fifth Edition, builds on the success of what is widely considered the best introduction and reference text on the art and science of data compression.
This book constitutes the refereed and revised post-conference proceedings of the 8th International Workshop on Code-Based Cryptography, CBCrypto 2020, held in Zagreb, Croatia, in May 2020.
This book constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022.
This book constitutes the refereed proceedings of the Second International Conference on Artificial Intelligence Security and Privacy, AIS&P 2024, held in Guangzhou, China, during December 6-7, 2024.
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
This book constitutes the refereed post-conference proceedings of the 27th International Conference, on Distributed and Computer and Communication Networks, DCCN 2024, held in Moscow, Russia, during September 23-27, 2024.
This book offers a deep dive into quantum teleportation and immune noise models, providing cutting-edge solutions to challenges in noisy quantum communication systems.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
Nature, Risk and Responsibility explores ethical interpretations of biotechnology and examines whether sufficient consensus exists or is emerging to enable this technology to occupy a stable role in the techno-economic, social and cultural order.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Gerotechnology, IWoG 2019, held in Caceres, Spain, in September 2019.
The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021.
This book constitutes revised selected papers from the thoroughly refereed proceedings of the 7th International Conference on Space Information Network, SINC 2023, held in Wuhan, China, during October 12-13, 2023.
This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application.
This book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Coordination, Organizations, Institutions, and Norms for Governance of Multi-Agent Systems, COIN 2017, co-located with AAMAS 2017, and the International Workshop on Coordination, Organizations, Institutions, Norms and Ethics for Governance of Multi-Agent Systems, COINE 2020, co-located with AAMAS 2020.
This book offers a comprehensive overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security.
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.
This book constitutes the proceedings of the 23rd International TRIZ Future Conference on Towards AI-Aided Invention and Innovation, TFC 2023, which was held in Offenburg, Germany, during September 12-14, 2023.
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025.
Presents an analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek).
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025.
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.
This book constitutes the proceedings of the Third International Conference on Space Information Networks, SINC 2018, held in Changchun, China, in August 2018.
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.
The five-volume set CCIS 1832-1836 contains the extended abstracts of the posters presented during the 25th International Conference on Human-Computer Interaction, HCII 2023, which was held as a hybrid event in Copenhagen, Denmark, in July 2023.
This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019.
This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, held as a virtual event from March 11-13, 2024.
This two-volume set constitutes the thoroughly refereed proceedings of the 22nd International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2025, held as part of HCI International 2025, held in Gothenburg, Sweden, during June 22–27, 2025.
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021.
Presenting innovative research-oriented ideas, and the implementation and socioeconomic applications of internet of things-based network, Challenges and Solutions in Internet of Things-Based Smart Applications showcases smart waste management, optical technologies for internet of things and remote patient monitoring and data analysis.
Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences.
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition 5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography and Security provides easy, intuitive access to information on all aspects of cryptography and security.
This proceedings book gathers selected, peer-reviewed papers presented at the Fifth Scientific Days of the Doctoral School of Mathematics and Computer Sciences - S2DSMCS, held from December 20-22, 2023, at Cheikh Anta Diop University in Dakar, Senegal.