Security and Privacy in Communication Networks
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th...
EAN: 9783031649530
Advanced Network Technologies and Computational Intelligence
EAN: 9783031860683
Applications and Techniques in Information Security
This book constitutes the refereed proceedings of the 14th International Conference, on...
EAN: 9789819797424
Blockchain and Web3.0 Technology Innovation and Application
This book constitutes the refereed proceedings of the First Conference on Blockchain and Web3...
EAN: 9789819794119
Cloud Computing, Big Data and Emerging Topics
This volume CCIS 2189 constitutes the refereed proceedings of the 12th Conference, JCC-BD&ET...
EAN: 9783031708060
Advanced Network Technologies and Intelligent Computing
EAN: 9783031640667
Cryptology and Network Security
This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International...
EAN: 9789819780129
Information Security in a Connected World
EAN: 9783031834899
Selected Areas in Cryptography – SAC 2024
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International...
EAN: 9783031828515
Selected Areas in Cryptography – SAC 2024
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International...
EAN: 9783031828409
Anomaly Detection as a Service
Anomaly detection has been a long-standing security approach with versatile applications, ranging...
EAN: 9783031012266
Cyber-Physical Security and Privacy in the Electric Smart Grid
This book focuses on the combined cyber and physical security issues in advanced electric smart...
EAN: 9783031012259
Blocks and Chains
The new field of cryptographic currencies and consensus ledgers, commonly referred to as...
EAN: 9783031012242
Differential Privacy
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy...
EAN: 9783031012228
Automated Software Diversity
Whereas user-facing applications are often written in modern languages, the firmware, operating...
EAN: 9783031012181
Physically Unclonable Functions (PUFs)
Table of Contents: Preface / Introduction / Basics of Physically Unclonable Functions / Attacks...
EAN: 9783031012167
Private Information Retrieval
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve...
EAN: 9783031012099
Privacy for Location-based Services
Sharing of location data enables numerous exciting applications, such as location-based queries,...
EAN: 9783031012082
Taxobook
Table of Contents: List of Figures / Preface / Acknowledgments / Building a Case for Building a...
EAN: 9783031011603