Emerging Trends in Expert Applications and Security
The book covers current developments in the field of computer system security using cryptographic...
EAN: 9789819739905
Computer Performance Engineering
This book constitutes the refereed proceedings of the 20th European Workshop on Computer...
EAN: 9783031809316
Security and Privacy in Communication Networks
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th...
EAN: 9783031649530
Applications and Techniques in Information Security
This book constitutes the refereed proceedings of the 14th International Conference, on...
EAN: 9789819797424
Blockchain and Web3.0 Technology Innovation and Application
This book constitutes the refereed proceedings of the First Conference on Blockchain and Web3...
EAN: 9789819794119
Cryptology and Network Security
This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International...
EAN: 9789819780129
Information Security in a Connected World
EAN: 9783031834899
Selected Areas in Cryptography – SAC 2024
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International...
EAN: 9783031828515
Selected Areas in Cryptography – SAC 2024
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International...
EAN: 9783031828409
Anomaly Detection as a Service
Anomaly detection has been a long-standing security approach with versatile applications, ranging...
EAN: 9783031012266
Cyber-Physical Security and Privacy in the Electric Smart Grid
This book focuses on the combined cyber and physical security issues in advanced electric smart...
EAN: 9783031012259
Blocks and Chains
The new field of cryptographic currencies and consensus ledgers, commonly referred to as...
EAN: 9783031012242
Differential Privacy
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy...
EAN: 9783031012228
Automated Software Diversity
Whereas user-facing applications are often written in modern languages, the firmware, operating...
EAN: 9783031012181
Physically Unclonable Functions (PUFs)
Table of Contents: Preface / Introduction / Basics of Physically Unclonable Functions / Attacks...
EAN: 9783031012167
Private Information Retrieval
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve...
EAN: 9783031012099
Privacy for Location-based Services
Sharing of location data enables numerous exciting applications, such as location-based queries,...
EAN: 9783031012082
Universal Behavior Computing for Security and Safety
EAN: 9789819790135
Decision and Game Theory for Security
This book constitutes the refereed proceedings of the 15th International Conference on Decision...
EAN: 9783031748349
Security and Privacy in Communication Networks
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th...
EAN: 9783031649479