Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Information Theoretic Security, ICITS 2007, held in Madrid, Spain, in May 2007. There were one invited keynote speech and 3 invited talks to the conference.
This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009. The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 109 submissions.
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008.
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.
Covers the proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India. This book includes such topics as access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, and operating system security.
This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008.
Constitutes the proceedings of the 17th International Workshop on Fast Software Encryption, held in Seoul, Korea, in February 2010.
ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Information Theoretic Security. Needless to say, information t- oretically secure cryptosystems are secure even if the factoring assumption or the discrete log assumption is broken.
This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010. The 19 papers presented together with four invited talks were carefully reviewed and selected from 62 submissions.
Constitutes the proceedings of the 15th European Symposium on Computer Security held in Athens, Greece in September 2010.
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010. The 17 papers presented were carefully reviewed and selected from 47 submissions.
IH 2010 was the 12th Information Hiding Conference, held in Calgary, Canada, June 28-30, 2010.
Constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2009, held in Pisa, Italy, in September 2009.
This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016.
The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.
This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions.
This book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Workshop on Quantitative Aspects in Security Assurance, QASA 2016, held in Heraklion, Crete, Greece, in September 2016.
This book constitutes the thoroughly refereed conference proceedings of the First International Joint Conference on Electronic Voting, E-Vote-ID 2016, held in Bregenz, Austria, in October 2016. The 14 full papers presented were carefully reviewed and selected from 57 submissions.
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016. The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions.
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems;
The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions.
The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions.
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010.
This book constitutes the refereed and revised post-conference proceedings of the 7th International Workshop on Code-Based Cryptography, CBC 2019, held in Darmstadt, Germany, in May 2019. The eight papers presented in this book were carefully reviewed and selected from numerous submissions.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011.
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. efficient two-party and multi-party computation;
This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.