Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This book constitutes the refereed post-conference proceedings of the 4th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2015, held in Bochum, Germany, in September 2015.
This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions.
The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented were carefully reviewed and selected from 285 submissions.
The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented were carefully reviewed and selected from 285 submissions.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. Finally, the third chapter, "Privacy Policies in Practice", discusses privacy by design, privacy scores, privacy data management in healthcare and trade-offs between privacy and utility.
This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and Privacy for Big Data, TrustData 2016;
This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016. The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security;
This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017. The 13 papers presented in this book were carefully reviewed and selected from 40 submissions.
This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions.
This book constitutes the refereed proceedings of the 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, held in Bonn, Germany in July 2017. The 12 full papers presented together with 3 short papers were carefully reviewed and selected from 32 submissions.
This book constitutes the refereed proceedings of the 12th International Workshop on Security, IWSEC 2017, held in Hiroshima, Japan, in August/September 2017. The 11 regular papers and 3 short papers presented in this volume were carefully reviewed and selected from 37 submissions.
This book constitutes the proceedings of the 9th International Symposium on Cyberspace Safety and Security, CSS 2017, held in Xi'an, China in October 2017.
The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions.
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. Malicious Code Defense and Mobile Security;
The 22 full papers and 12 shorts papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are covering the following topics: deep learning for multimedia security; digital forensics and anti-forensics; digital watermarking; information hiding; authentication and security.
This book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St. Kitts, St. Kitts and Nevis, in February 2019.The 20 full papers and 4 short papers presented in this book were carefully reviewed and selected from 34 submissions.The papers feature the outcome of the 4th Workshop on Advances in Secure Electronic Voting, VOTING 2019 and the Third Workshop on Trusted Smart Contracts, WTSC 2019. VOTING covered topics like election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems.WTSC focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of (specialized) blockchains.
This book constitutes revised papers from the 6th International Workshop on Graphical Models for Security, GraMSec 2019, held in Hoboken, NJ, USA, in June 2019. The 8 full papers presented in this volume were carefully reviewed and selected from 15 submissions.
The papers are organized in topics on malware analysis and detection, IoT and CPS security enterprise network security, software security, system security, authentication, applied cryptograph internet security, machine learning security, machine learning privacy, Web security, steganography and steganalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions.
This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions.
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security;
This book constitutes the refereed proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016, held in Porto, Portugal, in September 2016 in conjunction with DEXA 2016. The papers are organized in the following topical sections: security, privacy and trust in eServices;
This book constitutes the refereed conference proceedings of the 4th Annual Privacy Forum, APF 2016, held in Frankfurt/Main, Germany, in September 2016. The 12 revised full papers presented in this volume were carefully reviewed and selected from 32 submissions. and privacy policies and privacy risk presentation.
This book constitutes the refereed proceedings from the Third International Workshop on Graphical Models for Security, GraMSec 2016, held in Lisbon, Portugal, in June 2016. GraMSec contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage.
This book constitutes the refereed proceedings of the 14th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2017, held in Lyon, France, in August 2017 in conjunction with DEXA 2017. Cloud - IoT Security and Privacy; Security Awareness and Social Engineering - Policy Languages.
This book constitutes the proceedings of the 11th International Conference on Network and System Security, NSS 2017, held in Helsinki, Finland, in August 2017. This volume also contains 35 contributions of the following workshops: Security Measurements of Cyber Networks (SMCN-2017);
This book constitutes the refereed proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009, held in Cologne, Germany, in April 2009.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.