This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017.
There are connections between invariant theory and modular forms since the times of Felix Klein, in the 19th century, connections between codes and lattices since the 1960's.
CyberMedics: Navigating AI and Security in the Medical Field is a comprehensive exploration of the transformative role of artificial intelligence (AI) in healthcare and the critical importance of securing medical data in an increasingly digital world.
This book constitutes the refereed proceedings of the 22nd International TRIZ Future Conference on Automated Invention for Smart Industries, TFC 2022, which took place in Warsaw, Poland, in September 2022; the event was sponsored by IFIP WG 5.
This volume constitutes the proceedings of the 13th International Conference on post-quantum cryptography, PQCrypto 2022, held in as a Virtual Event in September 2022.
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model).
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022.
This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
This book constitutes the refereed proceedings of the 4th International Conference on Computational and Corpus-Based Phraseology, Europhras 2022, held in Malaga, Spain, in September 2022.
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.
This book constitutes the refereed proceedings of the 20th International Conference on Cryptology and Network Security, CANS 2021, which was held during December 13-15, 2021.
This book constitutes the proceedings of the 26th International Conference on Theory and Practice of Digital Libraries, TPDL 2022, which took place in Padua, Italy, in September 2022.
This two-volume set constitutes the post-conference proceedings of the 5th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2021, held in October 2021.
The three-volume set LNCS 13302, 13303 and 13304 constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 24th International Conference on Human-Computer Interaction, HCII 2022, which took place virtually in June-July 2022.
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022.
This book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication systems.
The four-volume set CCIS 1580, CCIS 1581, CCIS 1582, and CCIS 1583 contains the extended abstracts of the posters presented during the 24th International Conference on Human-Computer Interaction, HCII 2022, which was held virtually in June - July 2022.
This volume constitutes the papers of several workshops which were held in conjunction with the 27th International Conference on Database Systems for Advanced Applications, DASFAA 2022, held as virtual event in April 2022.
The LNCS 13172 constitute the proceedings of the 13th International Symposium on Cyberspace Safety and Security, CSS 2021, held online, in November 2021.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021.
The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022.
The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022.
This book constitutes the refereed proceedings and revised selected papers from the 16th International Workshop on Data Privacy Management, DPM 2021, and the 5th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2021, which were held online on October 8, 2021, in conjunction with ESORICS 2021.
The three volume set LNCS 13155, 13156, and 13157 constitutes the refereed proceedings of the 21st International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2021, which was held online during December 3-5, 2021.
This book constitutes the refereed proceedings of the 8th International Symposium, UNet 2022, held in Montreal, QC, Canada, during October 25-27, 2022.
This book constitutes the proceedings of the 21st International Conference on Smart Card Research and Advanced Applications, CARDIS 2022, which took place in November 2022.
This edited collection of essays brings together scholars across disciplines who consider the collaborative work of John Matthews Manly and Edith Rickert, philologists, medievalists and early modernists, cryptologists, and education reformers.
This book contains revised selected papers from the 28th International Conference on Selected Areas in Cryptography, SAC 2021, held as a virtual event September and October 2021.
This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2021, which took place during November 11-13, 2021.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India-Kolkata Chapter, India, during December 2-4, 2021.
This book constitutes the refereed proceedings of the 52nd International Simulation and Gaming Association Conference, ISAGA 2021, held in Indore, India, during September 6-10, 2021.
This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021.
This two-volume set constitutes the post-conference proceedings of the 5th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2021, held in October 2021.
This book constitutes the refereed proceedings of the 9th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2021, held in San Antonio, TX, USA, in 2021.
This book offers a structured algebraic and geometric approach to the classification and construction of quantum codes for topological quantum computation.
This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security.
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26-30, 2022.
This book constitutes the refereed proceedings of the 11th International Conference on Cloud Computing and Services Science, CLOSER 2021, Virtual Event, during April 28-30, 2021.
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022.