We are improving our search experience.

As we work to add all features, to check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,076 results
  1. Secure IT Systems 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings

    This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16–17, 2023.

    The 18 full...

    Lothar Fritsch, Ismail Hassan, Ebenezer Paintsil in Lecture Notes in Computer Science
    Conference proceedings 2024
  2. Financial Cryptography and Data Security 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023, Revised Selected Papers, Part I

    The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference on Financial Cryptography and Data...
    Foteini Baldimtsi, Christian Cachin in Lecture Notes in Computer Science
    Conference proceedings 2024
  3. Introduction to Cybersecurity A Multidisciplinary Challenge

    This book provides an introduction to the basic ideas involved in cybersecurity, whose principal aim is protection of IT systems against unwanted...

    Textbook 2024
  4. Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I

    The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS...
    Christina Pöpper, Lejla Batina in Lecture Notes in Computer Science
    Conference proceedings 2024
  5. Passive and Active Measurement 25th International Conference, PAM 2024, Virtual Event, March 11–13, 2024, Proceedings, Part I

    This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, held as a virtual event from...
    Philipp Richter, Vaibhav Bajpai, Esteban Carisimo in Lecture Notes in Computer Science
    Conference proceedings 2024
  6. Public-Key Cryptography – PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part II

    The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and...

    Qiang Tang, Vanessa Teague in Lecture Notes in Computer Science
    Conference proceedings 2024
  7. Public-Key Cryptography – PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part I

    The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and...

    Qiang Tang, Vanessa Teague in Lecture Notes in Computer Science
    Conference proceedings 2024
  8. Selected Areas in Cryptography 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24–26, 2022, Revised Selected Papers

    This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held...

    Benjamin Smith, Huapeng Wu in Lecture Notes in Computer Science
    Conference proceedings 2024
  9. Advances in Cryptology – EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV

    The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and...

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science
    Conference proceedings 2024
  10. Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I

    The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...

    Gene Tsudik, Mauro Conti, ... Georgios Smaragdakis in Lecture Notes in Computer Science
    Conference proceedings 2024
  11. Selected Areas in Cryptography – SAC 2023 30th International Conference, Fredericton, Canada, August 14–18, 2023, Revised Selected Papers

    This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography, SAC 2023, held in Fredericton,...
    Claude Carlet, Kalikinkar Mandal, Vincent Rijmen in Lecture Notes in Computer Science
    Conference proceedings 2024
  12. Computer Security. ESORICS 2023 International Workshops CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part I

    This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction...

    Sokratis Katsikas, Frédéric Cuppens, ... Stefanos Gritzalis in Lecture Notes in Computer Science
    Conference proceedings 2024
  13. Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II

    This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction...

    Sokratis Katsikas, Habtamu Abie, ... Naoto Yanai in Lecture Notes in Computer Science
    Conference proceedings 2024
  14. Blockchains A Handbook on Fundamentals, Platforms and Applications

    This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The...
    Sushmita Ruj, Salil S. Kanhere, Mauro Conti in Advances in Information Security
    Book 2024
  15. Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II

    The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and...
    Chunpeng Ge, Moti Yung in Lecture Notes in Computer Science
    Conference proceedings 2024
  16. Financial Cryptography and Data Security. FC 2023 International Workshops Voting, CoDecFin, DeFi, WTSC, Bol, Brač, Croatia, May 5, 2023, Revised Selected Papers

    ​This book constitutes the revised selected papers from the workshops affiliated with the 27th International Conference on Financial Cryptography and...
    Aleksander Essex, Shin'ichiro Matsuo, ... Geoff Goodell in Lecture Notes in Computer Science
    Conference proceedings 2024
  17. Financial Cryptography and Data Security 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023, Revised Selected Papers, Part II

    The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference on Financial Cryptography and Data...
    Foteini Baldimtsi, Christian Cachin in Lecture Notes in Computer Science
    Conference proceedings 2024
  18. Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part III

    The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...

    Gene Tsudik, Mauro Conti, ... Georgios Smaragdakis in Lecture Notes in Computer Science
    Conference proceedings 2024
  19. Cryptocoding Based on Quasigroups

    This book presents the concept of cryptcoding which arises from the need to obtain secure and accurate transmission. Therefore, it is necessary to...

    Daniela Mechkaroska, Aleksandra Popovska-Mitrovikj, Verica Bakeva in SpringerBriefs in Information Security and Cryptography
    Book 2024
  20. Grundlagen der Kryptographie Einführung in die mathematischen und algorithmischen Grundlagen

    Die Kryptographie, wie sie in diesem Jahrhundert betrieben wird, ist stark mathematisch geprägt. Aber sie hat auch ihre Wurzeln in dem, was...
    Duncan Buell
    Textbook 2024