Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. zero knowledge and secure computations;
This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical sections on randomness and its use; computer-assisted cryptographic proofs; outsourcing and delegatin computation; symmetric cryptanalysis and constructions; secure computation: leakage and side channels; quantum cryptography; lattices and knapsacks; public-key encryption; symmetric schemes; signatures; obilvious transfer and secret sharing; and multivariate and coding-based schemes.
They are organized in the following topics: software security, intrusion detection, systems security, android security, cybercrime, cloud security, network security.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions.
This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. malware analysis;
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. obfuscation and functional encryption; provable security for symmetric cryptography;
This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016. The papers are organized in topical sections such as network security, threat analysis, application security, cryptographic.
This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017.
This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions.
This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. They cover multiple topics in information security, from technologies to systems and applications.
This book constitutes the proceedings of the 21st Nordic Conference on Secure IT Systems, held in Oulu, Finland, in November 2016. The 16 full papers presented in this volume were carefully reviewed and selected from 43 submissions.The focus of the conference is on following topics: Security, System Security, Network Security, Software Security, and Information Security.
This book constitutes the refereed proceedings oft he 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, held in Evry, France, in September 2016. The 21 full papers presented were carefully reviewed and selected from 85 submissions. They are organized around the following topics: systems security;
This book constitutes the refereed proceedings of the 11th International Workshop on Security, IWSEC 2016, held in Tokyo, Japan, in September 2016. The 15 regular papers and 4 short papers presented in this volume were carefully reviewed and selected from 53 submissions. They were organized in topical sections named: system security;
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK.
This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2015, held in Zurich, Switzerland, in October 2015. its objective is to present and discuss open problems and new research directions on all aspects related to network security.
This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015.
This book constitutes revised selected papers from the14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015,held in Tokyo, Japan, in October 2015. The 35 papers presented in this volume were carefullyreviewed and selected from 54 submissions.
This book constitutes the thoroughly refereedpost-workshop proceedings of the 16th International Workshop on InformationSecurity Applications, WISA 2015, held on Jeju Island, Korea, in August 2015. The 35 revised full papers presented in this volume werecarefully reviewed and selected from 78 submissions.
This bookconstitutes revised selected papers from the 9th International Conference onCritical Information Infrastructures Security, CRITIS 2014, held in Limassol,Cyprus, in October 2014. security of water systems; powerand energy system security; security and recovery policies, cyber security; andsecurity tools and protocols.
This book constitutes the thoroughly refereedpost-conference proceedings of the 7th International Conference on TrustedSystems, INTRUST 2015, held in Beijing, China, in December 2015. The revised 12 full papers presented have beencarefully reviewed and selected from 29 submissions.
Thisbook constitutes the refereed proceedings of the Cryptographer''s Track at theRSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March2016.The26 papers presented in this volume were carefully reviewed and selected from 76submissions. The focus of the track is on following subjects: secure keyexchange schemes, authenticated encryption, searchable symmetric encryption,digital signatures with new functionality, secure multi party computation, howto verify procedures, side-channel attacks on elliptic curve cryptography, hardwareattacks and security, structure-preserving signatures, lattice cryptography, cryptanalysisof symmetric key encryption, message authentication code and PRF-security, and securityof public key encryption.
This book constitutes the thoroughly refereedpost-conference proceedings of the 8th International Conference on Security forInformation Technology and Communications, SECITC 2015, held in Bucharest, Romania,in June 2015. The 17 revised full papers were carefully reviewed andselected from 36 submissions.
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions.
This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory and Practices, WISTP 2015, held in Heraklion, Crete, Greece, in August 2015.
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. trust and privacy issues in mobile environments; and privacy requirements and privacy audit.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The papers provide the latest results in research, development and applications in the field of information security and cryptology.
This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.