Utvidet returrett til 31. januar 2025

Bøker i Security and Cryptology-serien

Filter
Filter
Sorter etterSorter Serierekkefølge
  • - Essays Dedicated to Catherine A. Meadows
     
    663,-

    This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019.Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributions authored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification.

  • - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part III
     
    1 545,-

    The three-volume set, LNCS 11692, LNCS 11693, and LNCS 11694, constitutes the refereed proceedings of the 39th Annual International Cryptology Conference, CRYPTO 2019, held in Santa Barbara, CA, USA, in August 2019. The 81 revised full papers presented were carefully reviewed and selected from 378 submissions.

  • - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings
     
    654,-

    This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. They stem from the following workshops:AIBlock 2019: First International Workshop on Application Intelligence and Blockchain SecurityAIoTS 2019:First International Workshop on Articial Intelligence and Industrial Internet-of-Things SecurityCloud S&P 2019:First International Workshop on Cloud Security and PrivacyPriDA 2019:First InternationalWorkshop on Privacy-preserving Distributed Data AnalysisSiMLA 2019: First International Workshop on Security in Machine Learning and its Applications

  • - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I
     
    654,-

    The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019. secure protocols; blockchain and smart contracts. Part II: software security;

  • - 22nd International Conference, ISC 2019, New York City, NY, USA, September 16-18, 2019, Proceedings
     
    654,-

    This book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 86 submissions. Crypto I: Secure Computation and Storage; Machine Learning and Security;

  • - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings
     
    736,-

    This book constitutes the proceedings of the 4th International Conference on Electronic Voting, E-Vote-ID 2019, held in Bregenz, Austria, in October 2019.

  • - Control- and Game-Theoretic Approaches to Cyber Security
     
    727,-

    The 10 papers included in this State-of-the Art Survey present recent advances made by a large team of researchers working on the same US Department of Defense Multidisciplinary University Research Initiative (MURI) project during 2013-2019.

  • - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings
     
    862,-

    This book constitutes the proceedings of the 6th International Conference on Cryptology and Security in Latin America, LATINCRYPT 2019, held in Santiago di Chile, Chile, in October 2019.

  • - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings
     
    654,-

    This book constitutes the refereed proceedings of the 13th International Conference on Provable Security, ProvSec 2019, held in Cairns, QLD, Australia, in October 2019. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives, including a special theme on "Practical Security."

  • - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings
     
    582,-

    This book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security, CANS 2019, held in Fuzhou, China, in October 2019. The 21 full papers and 8 short papers were carefully reviewed and selected from 55 submissions. The papers focus on topics such as homomorphic encryption;

  • - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part I
     
    647,-

  • - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part II
     
    647,-

  • - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers
     
    533,-

  • - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings
     
    647,-

    This book constitutes the refereed proceedings of the 24th Nordic Conference on Secure IT Systems, NordSec 2019, held in Aalborg, Denmark, in November 2019. The 17 full papers presented in this volume were carefully reviewed and selected from 32 submissions. network security; platform security and malware;

  • - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings
     
    654,-

  • - 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16-18, 2019, Proceedings
     
    647,-

    This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.

  • - 17th International Conference, TCC 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part I
     
    647,-

    The two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019.The 43 full papers presented were carefully reviewed and selected from 147 submissions.

  • - 17th International Conference, TCC 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part II
     
    647,-

    The two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019.The 43 full papers presented were carefully reviewed and selected from 147 submissions.

  • - 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part II
     
    647,-

    The two volumes LNCS 11982 and 11983 constitute the proceedings of the 11th International Symposium on Cyberspace Safety and Security, CSS 2019, held in Guangzhou, China, in December 2019. The 61 full papers and 40 short papers presented were carefully reviewed and selected from 235 submissions.

  • - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers
     
    654,-

    This book constitutes revised selected papers from the 22nd International Conference on Information Security and Cryptology, ICISC 2019, held in Seoul, South Korea, in December 2019. The total of 18 papers presented in this volume were carefully reviewed and selected from 43 submissions.

  • - 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I
     
    667,-

    The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed andselected from 137 submissions.

  • - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers
     
    654,-

    This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014.

  • - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers
     
    654,-

  • - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers
     
    654,-

    This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions.

  • - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers
     
    654,-

    the focus of this workshop was on following topics: side-channel attacks, FPGA countermeasures, timing attacks and countermeasures, fault attacks, countermeasures, and Hands-on Side-channel analysis.

  • - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings
     
    647,-

    This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security in Latin America, LatinCrypt 2015, held in Guadalajara, Mexico, in August 2015. The 20 papers presented were carefully reviewed and selected from 49 submissions.

  • - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings
     
    654,-

    This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures;

  • - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers
     
    511,-

    This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8 revised full papers presented together with 2 revised short papers were carefully reviewed and selected from 30 initial submissions.

  • - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings
     
    654,-

    This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions.

  • - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers
     
    647,-

    This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. They are organized in topical sections on secure computation: primitives and new models;

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.