The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024.
An adaptive cyber risk management guide from MIT scientist and Johns Hopkins professor Gregory Falco and "e;Cyber Czar"e; Eric RosenbachCyberattacks continue to grow in number, intensity, and sophistication.
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020.
This book constitutes the refereed proceedings of the 28th International Conference on Linking Theory and Practice of Digital Libraries, TPDL 2024, held in Ljubljana, Slovenia, during September 24-27.
This book constitutes the proceedings of the 23rd International TRIZ Future Conference on Towards AI-Aided Invention and Innovation, TFC 2023, which was held in Offenburg, Germany, during September 12-14, 2023.
This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022.
This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of digital signatures for certifying the integrity of messages and programs.
This book constitutes the refereed proceedings of the 28th International Conference on Linking Theory and Practice of Digital Libraries, TPDL 2024, held in Ljubljana, Slovenia, during September 24-27.
The three-volume set, LNCS 11692, LNCS 11693, and LNCS 11694, constitutes the refereed proceedings of the 39th Annual International Cryptology Conference, CRYPTO 2019, held in Santa Barbara, CA, USA, in August 2019.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany.
This book constitutes the refereed proceedings of the 47th Annual Conference of the Southern African Computer Lecturers' Association on ICT Education, SACLA 2018, held in Gordon's Bay, South Africa, in June 2018.
This book constitutes the refereed proceedings of the 10th EAI International Conference on INISCOM 2024, held in Da Nang, Vietnam, during February 20-21, 2024.
This book CCIS 2498 constitutes the refereed proceedings of the 7th CCF China Blockchain Summit on Blockchain Technology and Application, CBCC 2024, held in Shanghai, China, during December 13–15, 2024.
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023.
This conference proceedings LNCS 12782 constitutes the refereed proceedings of the 9 th International Conference on Distributed, Ambient and Pervasive Interactions, DAPI 2021, held as part of the 23rd International Conference, HCI International 2021, which took place in July 2021.
This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs).
This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First International Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the Second International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019.
The two-volume set LNCS 12615 + 12616 constitutes the refereed proceedings of the 12th International Conference on Intelligent Human Computer Interaction, IHCI 2020, which took place in Daegu, South Korea, during November 24-26, 2020.
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations.
This book offers the reader a formalization, characterization and quantification of the real threat level posed by side-channel leaks from devices implementing cryptography.
This two-volume proceedings set LNCS 15056-15057 constitutes the proceedings of 26th International Conference on Information and Communications Security, ICICS 2024, in Mytilene, Greece, during August 26-28, 2024.
This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024.
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024.
This book constitutes revised selected papers from the 22nd International Conference on Information Security and Cryptology, ICISC 2019, held in Seoul, South Korea, in December 2019.
This book LNCS 15565 constitutes the referred proceedings of the 10th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2024, held in Abu Dhabi, United Arab Emirates, during November 20–22, 2024.
This text is a light technical introduction to the three technical foundations for multimedia applications across the Internet: communications (principles, technologies and networking), compressive encoding of digital media, and Internet protocol and services.
This book constitutes the proceedings of the 8th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2024, held in Be'er Sheva, Israel, during December 19-20, 2024.
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.
When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it.
This book constitutes the refereed proceedings of the 7th Conference on Electronic Governance and Open Society: Challenges in Eurasia, EGOSE 2020, held in St.
This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, held in Abhu Dabhi, United Arab Emirates, during March 5-8, 2024.