A report offering a review of existing intellectual property protection for computer softwear, protection of copyright, patents and trade secrets, a statement of current problems and the extent to which US legislature might solve them, and the view of industry and others in the computer community.
The two-volume set LNCS 12765-12766 constitutes the refereed proceedings of the thematic area Human Interface and the Management of Information, HIMI 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.
The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024.
This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020.
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016.
In uralten Spielen wie Schach oder Go können sich die brillantesten Spieler verbessern, indem sie die von einer Maschine produzierten Strategien studieren.
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023.
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity.
This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in October 2016.
This book constitutes the refereed proceedings of the 11th International Symposium on Algorithmic Game Theory, SAGT 2018, held in Beijing, China, in September 2018.
This book constitutes the proceedings of the 9th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2023, which took place in Canterbury, UK, in August 2023.
This two-volume set constitutes the post-conference proceedings of the 5th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2021, held in October 2021.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2023, CT-RSA 2023, held in San Francisco, CA, USA, in April 2023.
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle.
This volume constitutes the proceedings presented at the 4th International Conference on Emerging Information Security and Applications, EISA 2023, held in Hangzhou, China, in December 2023.
The two-volume set LNCS 12794-12795 constitutes the refereed proceedings of the 9th International Conference on Culture and Computing, C&C 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks.
Cryptology, for millennia a "e;secret science"e;, is rapidly gaining in practical importance for the protection of communication channels, databases, and software.
Simplified Python programming for Bitcoin and blockchainKey FeaturesBuild Bitcoin applications in Python with the help of simple examplesMine Bitcoins, program Bitcoin-enabled APIs and transaction graphs, and build trading botsAnalyze Bitcoin transactions and produce visualizations using Python data analysis toolsBook DescriptionBitcoin is a cryptocurrency that's changing the face of online payments.
This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022.
This book constitutes the proceedings of the 9th International Symposium on Cyberspace Safety and Security, CSS 2017, held in Xi'an, China in October 2017.
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security.
Dieses Buch beschreibt, unter welchen Bedingungen das in der DDR am weitesten verbreitete Fernschreibchiffriergerät sowie der dazugehörige Algorithmus vor etwa 50 Jahren zum Schutz von Staatsgeheimnissen entwickelt wurden.
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014.
This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016.
This book constitutes the refereed proceedings of the 20th International Conference on Cryptology and Network Security, CANS 2021, which was held during December 13-15, 2021.
This book CCIS 2497 constitutes the refereed proceedings of the 7th CCF China Blockchain Summit on Blockchain Technology and Application, CBCC 2024, held in Shanghai, China, during December 13–15, 2024.
This volume constitutes the refereed proceedings of the Second International Conference on Computational Intelligence, Security and Internet of Things, ICCISIoT 2019, held in Agartala, India, in December 2019.
Introduction to Modern Cryptography, the most relied-upon textbook in the field, provides a mathematically rigorous yet accessible treatment of this fascinating subject.
This book constitutes the refereed proceedings of the First International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability, ARTIIS 2021, held in La Libertad, Ecuador, in November 2021.
This book constitutes the proceedings of the 19th IMA International Conference, IMACC 2023, held in London, UK, during December 12-14, 2023The 14 full papers included in this volume were carefully reviewed and selected from 36 submissions.
Introduction to Convolutional Codes with Applications is an introduction to the basic concepts of convolutional codes, their structure and classification, various error correction and decoding techniques for convolutionally encoded data, and some of the most common applications.
The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023.
This two-volume set constitutes the proceedings of the Third Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2019, held in Volgograd, Russia, in September 2019.