Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017.
Constitutes the refereed proceedings of the 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Application, CARDIS 2010, held in Passau, Germany, in April 2010.
Constitutes the refereed proceedings of the 6th International Conference on Information Systems Security, ICISS 2010, held in Gandhinagar, India, in December 2010.
This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019.
The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.
This book constitutes the carefully refereed and revised selected papers of the 5th Canada-France ETS Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012.
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions.
The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security.
The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016.
This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions.
This book constitutes the refereed proceedings of the 16th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2019, held in Linz, Austria, in August 2019 in conjunction with DEXA 2019. The 11 full papers presented were carefully reviewed and selected from 24 submissions.
This book constitutes the revised selected papers of the 12th International Symposium on Foundations and Practice of Security, FPS 2019, held in Toulouse, France, in November 2019.The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 50 submissions.
This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2014, held in Istanbul, Turkey, in September 2014. The 10 full papers presented were carefully reviewed and selected from 24 submissions.
This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions.
This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. provable security; secure protocol; systems security; and security in hardware.
This book constitutes the refereed proceedings of the 5thInternational Conference on Security, Privacy, and Applied CryptographyEngineering, SPACE 2015, held in Jaipur, India, in October 2015. The 17 full papers presented in this volume werecarefully reviewed and selected from 57 submissions.
This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015. The 28 full papers were carefully reviewed and selected from 119 submissions.
This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015. and security analysis, risk management and usability.
This bookconstitutes the refereed proceedings of the Second International Conference onSecurity Standardisation Research, SSR 2015, held in Tokyo, Japan, in December2015. The 13papers presented in this volume were carefully reviewed and selected from 18submissions. analysis on cryptographic algorithm; andtrust and formal analysis.
This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience.
This book constitutes the thoroughly refereedpost-conference proceedings of the 16th International Conference on InformationSecurity, ISC 2013, held in Dallas, Texas, in November 2013. The 16 revised full papers presented together with 14short papers were carefully reviewed and selected from 70 submissions.
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereedpost-conference proceedings of the 6th International Conference on TrustedSystems, INTRUST 2014, held in Beijing, China, in December 2014.The conference brings together academic and industrialresearchers, designers, and implementers with end-users of trusted systems, inorder to foster the exchange of ideas in this challenging and fruitful area.The revised full papers focus on the theory, technologies and applications oftrusted systems and cover all aspects of trusted computing systems, includingtrusted modules, platforms, networks, services and applications, from theirfundamental features and functionalities to design principles, architecture andimplementation technologies. /* Style Definitions */ table.MsoNormalTable{mso-style-name:"Table Normal";mso-tstyle-rowband-size:0;mso-tstyle-colband-size:0;mso-style-noshow:yes;mso-style-priority:99;mso-style-qformat:yes;mso-style-parent:"";mso-padding-alt:0in 5.4pt 0in 5.4pt;mso-para-margin:0in;mso-para-margin-bottom:.0001pt;mso-pagination:widow-orphan;font-size:11.0pt;font-family:"Calibri","sans-serif";mso-ascii-font-family:Calibri;mso-ascii-theme-font:minor-latin;mso-fareast-font-family:"Times New Roman";mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Times New Roman";mso-bidi-theme-font:minor-bidi;}
This book contains revised selected papers fromthe Second International Conference on Cryptology and Information Security inthe Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented inthis volume were carefully reviewed and selected from 27 submissions.
Thisbook constitutes the refereed proceedings of the 7th International Workshop onPost-Quantum Cryptography, PQCrypto 2016, held in Fukuoka, Japan, in February2016. The 16 revised full papers presented were carefully reviewed and selectedfrom 42 submissions.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015. The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions.
This book constitutes the refereed proceedings of the 8th International Symposium on Engineering Secure Software and Systems, ESSoS 2016, held in London, UK, in April 2016.
This bookcontains revised selected papers from the 22nd International Conference onSelected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada inAugust 2015. The 26 full papers and 3 short papers presented in this volume were carefullyreviewed and selected from 91 submissions. short papers;
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.