This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This book constitutes the proceedings of the workshops held at the 29th International Conference on Theory and Practice of Digital Libraries, TPDL 2025, which took place in Tampere, Finland, during September 23-26, 2025.
This book constitutes the proceedings of the workshops held at the 29th International Conference on Theory and Practice of Digital Libraries, TPDL 2025, which took place in Tampere, Finland, during September 23-26, 2025.
Written from the perspective of an experienced IT expert, this book leverages a maturity model framework to guide organizations through each stage of adopting, securing, scaling, and tracking the value of low-code AI responsibly and efficiently.
Written from the perspective of an experienced IT expert, this book leverages a maturity model framework to guide organizations through each stage of adopting, securing, scaling, and tracking the value of low-code AI responsibly and efficiently.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
Dieses Lehrbuch prasentiert umfassend die Grundlagen der Kryptographie, beginnend mit symmetrischen Verfahren zur Sicherung von Vertraulichkeit, Integritat und Authentizitat bis hin zu aktuellen Public-Key-Verfahren und Post-Quantum-Kryptographie.
Dieses Lehrbuch prasentiert umfassend die Grundlagen der Kryptographie, beginnend mit symmetrischen Verfahren zur Sicherung von Vertraulichkeit, Integritat und Authentizitat bis hin zu aktuellen Public-Key-Verfahren und Post-Quantum-Kryptographie.
This book guides readers from the foundations of quantum mechanics through advanced quantum algorithms (such as Shor’s and Grover’s) and state-of-the-art machine learning methods.
This book guides readers from the foundations of quantum mechanics through advanced quantum algorithms (such as Shor’s and Grover’s) and state-of-the-art machine learning methods.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in Africa, AFRICACRYPT 2025, which took place in Rabat, Morocco in July 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in Africa, AFRICACRYPT 2025, which took place in Rabat, Morocco in July 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This book constitutes the proceedings of the 5th International Conference on Financial Technology, ICFT 2024, held in Singapore during September 23-25, 2024.
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025.
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025.