The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany.
This book constitutes the refereed proceedings of the 47th Annual Conference of the Southern African Computer Lecturers' Association on ICT Education, SACLA 2018, held in Gordon's Bay, South Africa, in June 2018.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016.
This book constitutes the refereed proceedings of the 10th EAI International Conference on INISCOM 2024, held in Da Nang, Vietnam, during February 20-21, 2024.
This book constitutes the revised selected proceedings of Second International Symposium on Biomedical and Computational Biology, BECB 2022, held as a virtual event in August 2022.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
This book CCIS 2498 constitutes the refereed proceedings of the 7th CCF China Blockchain Summit on Blockchain Technology and Application, CBCC 2024, held in Shanghai, China, during December 13–15, 2024.
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023.
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle.
This conference proceedings LNCS 12782 constitutes the refereed proceedings of the 9 th International Conference on Distributed, Ambient and Pervasive Interactions, DAPI 2021, held as part of the 23rd International Conference, HCI International 2021, which took place in July 2021.
This book constitutes the refereed proceedings of the 7th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 27th International Conference, HCI International 2025, in Gothenburg, Sweden, during June 22–27, 2025.
This book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Coordination, Organizations, Institutions, and Norms for Governance of Multi-Agent Systems, COIN 2017, co-located with AAMAS 2017, and the International Workshop on Coordination, Organizations, Institutions, Norms and Ethics for Governance of Multi-Agent Systems, COINE 2020, co-located with AAMAS 2020.
This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs).
This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First International Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the Second International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019.
This book introduces readers to the fundamentals of and recent advances in federated learning, focusing on reducing communication costs, improving computational efficiency, and enhancing the security level.
The two-volume set LNCS 12615 + 12616 constitutes the refereed proceedings of the 12th International Conference on Intelligent Human Computer Interaction, IHCI 2020, which took place in Daegu, South Korea, during November 24-26, 2020.
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations.
This book offers the reader a formalization, characterization and quantification of the real threat level posed by side-channel leaks from devices implementing cryptography.
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018.
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by PSIT, Kanpur, India during 27-29 October 2023.
This book constitutes the thoroughly refereed proceedings of the 8th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, IC3K 2016, held in Porto, Portugal, in November 2016.
This two-volume proceedings set LNCS 15056-15057 constitutes the proceedings of 26th International Conference on Information and Communications Security, ICICS 2024, in Mytilene, Greece, during August 26-28, 2024.
This book focuses on the application and development of information geometric methods in the analysis, classification and retrieval of images and signals.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in June 2017.
This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024.
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024.
The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022.
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.
The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks.
This book constitutes revised selected papers from the 22nd International Conference on Information Security and Cryptology, ICISC 2019, held in Seoul, South Korea, in December 2019.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017.
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015.
This money-saving collection covers every objective for the CompTIA Security+ exam and contains exclusive bonus contentThis fully updated test preparation bundle covers every topic on the current version of the CompTIA Security+ exam.
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data.
This book LNCS 15565 constitutes the referred proceedings of the 10th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2024, held in Abu Dhabi, United Arab Emirates, during November 20–22, 2024.
This text is a light technical introduction to the three technical foundations for multimedia applications across the Internet: communications (principles, technologies and networking), compressive encoding of digital media, and Internet protocol and services.
This book constitutes the proceedings of the 8th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2024, held in Be'er Sheva, Israel, during December 19-20, 2024.
Fintech veteran and venture capitalist, Arunkumar Krishnakumar, cuts through the hype to bring us a first-hand look into how quantum computing and Blockchain together could redefine industries and life as we know it.
This book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019.
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.