The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015.
This book constitutes the refereed proceedings of the 6th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2017, held in Lyon, France, in August 2017.
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020.
This book constitutes the refereed proceedings of the 26th Nordic Conference on Secure IT Systems, NordSec 2021, which was held online during November 2021.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in October 2016.
The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017.
This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition towards the quantum computing application in various sectors.
The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022.
This book constitutes the proceedings of the 17th International Workshop on Security and Trust Management, STM 2021, co-located with the 26th European Symposium on Research in Computer Security, ESORICS 2021.
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Mobile Networks and Management, MONAMI 2017, held in Melbourne, Australia, in December 2017.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, which was held virtually in November 2021.
This book constitutes the refereed post-conference proceedings of the First International Conference Edge Computing and IoT, ICECI 2020, held in November 2020 in Changsha, China.
This book constitutes the proceedings of the 5th International Conference on Smart Computing and Communication, SmartCom 2020, which took place in Paris, France, during December 29-31, 2020.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
This book constitutes the proceedings of the 4th International Conference on 6G for Future Wireless Networks, 6GN 2021, held in Huizhou, China, in October 2021.
The textbook presents basic concepts of signals and systems in a clear manner, based on the author's 15+ years of teaching the undergraduate course for engineering students.
This book constitutes the refereed proceedings of the 6th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2022, held in Be'er Sheva, Israel, in June - July 2022.
This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021.
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS 2020, held in Vienna, Austria, in December 2020.
This book constitutes the proceedings of the 16th IMA International Conference on Cryptography and Coding, IMACC 2017, held at Oxford, UK, in December 2017.
This book constitutes the refereed proceedings of the 5th International Castle Meeting on Coding Theory and Applications, ICMCTA 2017, held in Vihula, Estonia, in August 2017.
This book constitutes the proceedings of the 4th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2021, held in Darmstadt, Germany, on October 8, 2021.
This book constitutes thoroughly refereed and revised selected papers from the proceedings of 19th European Conference on Multi-Agent Systems, EUMAS 2022, held in Dusseldorf, Germany, during September 14-16, 2022.
This book constitutes the refereed proceedings of the Third International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2021, held as part of the 23rd International Conference, HCI International 2021, which took place virtually in July 2021.
This book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020.
This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches.
This book constitutes thoroughly reviewed, revised and selected papers from the 6th International Conference on Human Centered Computing, HCC 2020, held in virtually, due to COVID- 19, in December 2020.
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017.
The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018.
This book constitutes the proceedings of the 5th International Conference on Electronic Voting, E-Vote-ID 2020, held online -due to COVID -19- in Bregenz, Austria, in October 2020.
This book constitutes the refereed proceedings of the 15th IFIP TC 9 International Conference on Human Choice and Computers, HCC15 2022, in Tokyo, Japan, in September 2022.
This book constitutes the refereed proceedings of the Third International Conference on Design, Operation and Evaluation of Mobile Communications, MOBILE 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022.
This book constitutes the refereed proceedings of the 16th World Congress on Services, SERVICES 2020, held as part of the Services Conference Federation, SCF 2020, in Honolulu, HI, USA, in September 2020.
The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017.
The motivation of this edited book is to generate an understanding about information, related concepts and the roles they play in the modern, technology permeated world.
This book constitutes the refereed proceedings of the 8th EAI International Conference on Industrial Networks and Intelligent Systems, INISCOM 2022, held in April 2022.
This book constitutes the proceedings of the 9th International Conference on Wireless and Satellite Services, WiSATS 2017, held in Oxford, UK, in September 2017.
This book presents covert, semi-covert and overt techniques for communication over printed media by modifying images, texts or barcodes within the document.