This book constitutes revised selected papers from the 10th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, held in Darmstadt, Germany, in April 2019.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Smart Card Research and Advanced Applications, CARDIS 2018, held in Monpellier, France, in November 2018.
This text presents a careful introduction to methods of cryptology and error correction in wide use throughout the world and the concepts of abstract algebra and number theory that are essential for understanding these methods.
This book constitutes the proceedings of the 20th International Conference on Passive and Active Measurement, PAM 2019, held in Puerto Varas, Chile, in March 2019.
This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.
This book constitutes the refereed post-conference proceedings of the 23rd Iberoamerican Congress on Pattern Recognition, CIARP 2018, held in Madrid, Spain, in November 2018The 112 papers presented were carefully reviewed and selected from 187 submissions The program was comprised of 6 oral sessions on the following topics: machine learning, computer vision, classification, biometrics and medical applications, and brain signals, and also on: text and character analysis, human interaction, and sentiment analysis
This book constitutes the refereed proceedings of the 5th Conference on AElectronic Governance and Open Society: Challenges in Eurasia, EGOSE 2018, held in St.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information and Communication Technologies in Agriculture, Food and Environment, HAICTA 2017, held in Chania, Crete, Greece, in September 2017.
This book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2019, CT-RSA 2019, held in San Francisco, CA, USA, in March 2019.
This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018.
This book constitutes the refereed proceedings of the First International Workshop, IOSec 2018, sponsored by CIPSEC, held in Heraklion, Crete, Greece, in September 2018.
This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.
This must-read textbook presents an essential introduction to Kolmogorov complexity (KC), a central theory and powerful tool in information science that deals with the quantity of information in individual objects.
This book constitutes the refereed proceedings of the 10th International Development Informatics Association Conference, IDIA 2018, held in Tshwane, South Africa, in August 2018.
This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017.
This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018.
This book constitutes revised selected papers from the First International Workshop on Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment, DEVOPS 2018, hled at the hateau de Villebrumier, France, in March 2018.
This book constitutes the refereed proceedings of the 47th Annual Conference of the Southern African Computer Lecturers' Association on ICT Education, SACLA 2018, held in Gordon's Bay, South Africa, in June 2018.
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018.
This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Internet Technology, ICDCIT 2019, held in Bhubaneswar, India, in January 2019.
This book constitutes the workshop proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018.
This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on the Arithmetic of Finite Field, WAIFI 2018, held in Bergen, Norway, in June 2018.
This book constitutes the refereed proceedings of the 4th International Conference on Security Standardisation Research, SSR 2018, held in Darmstadt, Germany, in November 2018.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.
This book constitutes the refereed proceedings of the Second International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, ISDDC 2018, held in Vancouver, BC, Canada, in November 2018.
This book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018.
This book constitutes the thoroughly refereed post-workshop proceedings of the Third International Symposium, SETE 2018, held in conjunction with ICWL 2018, Chiang Mai, Thailand, in August 2018.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.
This book constitutes the proceedings of the First International Conference on Science of Cyber Security, SciSec 2018, held in Beijing, China, in August 2018.
This two volume set (CCIS 858 and CCIS 859) constitutes the refereed proceedings of the Third International Conference on Digital Transformation and Global Society, DTGS 2018, held in St.
This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017.
This book focuses on information geometry manifolds of structured data/information and their advanced applications featuring new and fruitful interactions between several branches of science: information science, mathematics and physics.
This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018.
This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018.
This book constitutes the joint refereed proceedings of the 18th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2018, the 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018.
This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First International Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the Second International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018.
This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018.
This book constitutes the thoroughly refereed proceedings of the 3rd International Conference on IoT as a service, IoTaaS 2017, held in Taichung, Taiwan, in September 2017.