This volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography, PQCrypto 2020, held in Paris, France in April 2020.
This book constitutes the refereed proceedings of the 4th International Conference on Future Network Systems and Security, FNSS 2018, held in Paris, France, in July 2018.
This book constitutes the refereed proceedings of the 14th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2017, held in Biarritz, France, in September 2017.
This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017.
This two-volume set LNICST 357-358 constitutes the post-conference proceedings of the 11th EAI International Conference on Wireless and Satellite Services, WiSATS 2020, held in Nanjing, China, in September 2020.
The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017.
This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020.
This book constitutes the refereed proceedings of the 14th International Conference on Virtual Reality and Augmented Reality, EuroVR 2017, held in Laval, France, in December 2017.
This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017.
This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017.
This book constitutes the refereed proceedings of the 10th International Development Informatics Association Conference, IDIA 2018, held in Tshwane, South Africa, in August 2018.
This textbook presents a concise, accessible and engaging first introduction to deep learning, offering a wide range of connectionist models which represent the current state-of-the-art.
This book constitutes the refereed proceedings of the First International Conference on Ubiquitous Communications and Network Computing, UBICNET 2017, held in Bangalore, India, in August 2017.
This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018.
This book constitutes the refereed proceedings of the 15th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2018, held in Barcelona, Spain, in August 2018.
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
This book constitutes the refereed proceedings of the 11th International Symposium on Algorithmic Game Theory, SAGT 2018, held in Beijing, China, in September 2018.
This book constitutes the refereed proceedings of the 15th International Conference on Cognitive Radio-Oriented Wireless Networks, CROWNCOM 2020, held in Rome, Italy, in November 2020.
This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information and Communication Technologies in Agriculture, Food and Environment, HAICTA 2017, held in Chania, Crete, Greece, in September 2017.
This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.
This book constitutes the refereed proceedings of the 33rd IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018.
This book constitutes the proceedings of the 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, held in Como, Italy, in September 2018.
This book constitutes the refereed post-conference proceedings of the 5th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2017, held in Havana, Cuba, in September 2017.
This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021.
The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021.
This conference proceedings LNCS 12782 constitutes the refereed proceedings of the 9 th International Conference on Distributed, Ambient and Pervasive Interactions, DAPI 2021, held as part of the 23rd International Conference, HCI International 2021, which took place in July 2021.
The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021.
This book constitutes the refereed post-conference proceedings of the 10th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2020, held as a virtual event, in September 2020.
This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018.
This book provides a comprehensive introduction to quantum image processing, which focuses on extending conventional image processing tasks to the quantum computing frameworks.
This two-volume set constitutes the refereed proceedings of the 7th International Conference on Human Aspects of IT for the Aged Population, ITAP 2021, held as part of the 23rd International Conference, HCI International 2021, held as a virtual event, in July 2021.
This book constitutes the refereed proceedings of the 8th International Conference on Algebraic Informatics, CAI 2019, held in Nis, Serbia, in June/July 2019.
This book constitutes the refereed proceedings of the Second Conference on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2016, held in Crete, Greece, in September 2016 in conjunction with ESORICS 2016, the 21st annual European Symposium on Research in Computer Security.
This two-volume set LNCS 11662 and 11663 constitutes the refereed proceedings of the 16th International Conference on Image Analysis and Recognition, ICIAR 2019, held in Waterloo, ON, Canada, in August 2019.
This two-volume set LNCS 12205 and LNCS 12206 constitutes the proceedings of the 7th International Conference on Learning and Collaboration Technologies, LCT 2020, held as part of the 22nd International Conference, HCI International 2020, which took place in Copenhagen, Denmark, in July 2020.
This book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018.
This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC.