Search
Search Results
-
Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS... -
Innovative Security Solutions for Information Technology and Communications 16th International Conference, SecITC 2023, Bucharest, Romania, November 23–24, 2023, Revised Selected Papers
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative...
-
Selected Areas in Cryptography 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24–26, 2022, Revised Selected Papers
This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held...
-
Advances in Cryptology – EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and...
-
Managing IT Service Security Methods and Recipes for User Organizations and Providers Along the Supply Chain
This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject...
-
Selected Areas in Cryptography – SAC 2023 30th International Conference, Fredericton, Canada, August 14–18, 2023, Revised Selected Papers
This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography, SAC 2023, held in Fredericton,... -
Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...
-
Blockchains A Handbook on Fundamentals, Platforms and Applications
This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The... -
Android Malware Detection and Adversarial Methods
The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on...
-
Computing and Informatics 9th International Conference, ICOCI 2023, Kuala Lumpur, Malaysia, September 13–14, 2023, Revised Selected Papers, Part I
This book constitutes the revised selected papers of the 9th International conference, ICOCI 2023, held in Kuala Lumpur, Malaysia, during September... -
Decentralized Identity Management and Blockchains: Design Patterns and Architectures
Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The... -
Cryptographic Primitives
Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research... -
Blockchain Technology Accelerating Industry 4.0
Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related... -
Blockchain Technology for E-Governance Applications
Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer... -
The Future Ring Confidential Transaction Protocols for Privacy-Preserving Blockchain
In this chapter, we are going to give some potential future enhancement on the privacy-preserving blockchain protocol, the Ring Confidential... -
Supply Chain Management Using Blockchain
Among many domains being disrupted by blockchains, supply chains are at the top, as they naturally involve multi-party collaboration and regulatory... -
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations
Modern e-voting systems provide what is called verifiability, i.e., voters are able to check that their votes have actually been counted despite... -
Cheap and Fast Iterative Matrix Inverse in Encrypted Domain
Homomorphic encryption (HE) is a promising technique for preserving the privacy of sensitive data by enabling computations to be performed on... -
Scaling Mobile Private Contact Discovery to Billions of Users
Mobile contact discovery is a convenience feature of messengers such as WhatsApp or Telegram that helps users to identify which of their existing... -
Optimally-Fair Multi-party Exchange Without Trusted Parties
We present a multi-party exchange protocol that achieves optimal partial fairness even in the presence of a dishonest majority. We demonstrate how...