We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,977 results
  1. Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I

    The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS...
    Christina Pöpper, Lejla Batina in Lecture Notes in Computer Science
    Conference proceedings 2024
  2. Innovative Security Solutions for Information Technology and Communications 16th International Conference, SecITC 2023, Bucharest, Romania, November 23–24, 2023, Revised Selected Papers

    This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative...

    Mark Manulis, Diana Maimuţ, George Teşeleanu in Lecture Notes in Computer Science
    Conference proceedings 2024
  3. Selected Areas in Cryptography 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24–26, 2022, Revised Selected Papers

    This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held...

    Benjamin Smith, Huapeng Wu in Lecture Notes in Computer Science
    Conference proceedings 2024
  4. Advances in Cryptology – EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV

    The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and...

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science
    Conference proceedings 2024
  5. Managing IT Service Security Methods and Recipes for User Organizations and Providers Along the Supply Chain

    This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject...

    Eberhard von Faber
    Book 2024
  6. Selected Areas in Cryptography – SAC 2023 30th International Conference, Fredericton, Canada, August 14–18, 2023, Revised Selected Papers

    This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography, SAC 2023, held in Fredericton,...
    Claude Carlet, Kalikinkar Mandal, Vincent Rijmen in Lecture Notes in Computer Science
    Conference proceedings 2024
  7. Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I

    The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...

    Gene Tsudik, Mauro Conti, ... Georgios Smaragdakis in Lecture Notes in Computer Science
    Conference proceedings 2024
  8. Blockchains A Handbook on Fundamentals, Platforms and Applications

    This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The...
    Sushmita Ruj, Salil S. Kanhere, Mauro Conti in Advances in Information Security
    Book 2024
  9. Android Malware Detection and Adversarial Methods

    The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on...

    Weina Niu, **aosong Zhang, ... Jiacheng Gong
    Book 2024
  10. Computing and Informatics 9th International Conference, ICOCI 2023, Kuala Lumpur, Malaysia, September 13–14, 2023, Revised Selected Papers, Part I

    This book constitutes the revised selected papers of the 9th International conference, ICOCI 2023, held in Kuala Lumpur, Malaysia, during September...
    Nur Haryani Zakaria, Nur Suhaili Mansor, ... Fathey Mohammed in Communications in Computer and Information Science
    Conference proceedings 2024
  11. Decentralized Identity Management and Blockchains: Design Patterns and Architectures

    Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The...
    Hye-young Paik, Yue Liu, ... Salil S. Kanhere in Blockchains
    Chapter 2024
  12. Cryptographic Primitives

    Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research...
    Mayank Raikwar, Shuang Wu in Blockchains
    Chapter 2024
  13. Blockchain Technology Accelerating Industry 4.0

    Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related...
    Jan Pennekamp, Lennart Bader, ... Klaus Wehrle in Blockchains
    Chapter 2024
  14. Blockchain Technology for E-Governance Applications

    Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer...
    Ras Dwivedi, Nilesh Vasita, ... Sandeep Shukla in Blockchains
    Chapter 2024
  15. The Future Ring Confidential Transaction Protocols for Privacy-Preserving Blockchain

    In this chapter, we are going to give some potential future enhancement on the privacy-preserving blockchain protocol, the Ring Confidential...
    Muhammed F. Esgin, Joseph K. Liu, ... Dimaz Ankaa Wijaya in Blockchains
    Chapter 2024
  16. Supply Chain Management Using Blockchain

    Among many domains being disrupted by blockchains, supply chains are at the top, as they naturally involve multi-party collaboration and regulatory...
    Christopher Klinkmueller, H. M. N. Dilum Bandara, ... Qinghua Lu in Blockchains
    Chapter 2024
  17. Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations

    Modern e-voting systems provide what is called verifiability, i.e., voters are able to check that their votes have actually been counted despite...
    Carmen Wabartha, Julian Liedtke, ... Ralf Küsters in Computer Security – ESORICS 2023
    Conference paper 2024
  18. Cheap and Fast Iterative Matrix Inverse in Encrypted Domain

    Homomorphic encryption (HE) is a promising technique for preserving the privacy of sensitive data by enabling computations to be performed on...
    Tae Min Ahn, Kang Hoon Lee, ... Ji Won Yoon in Computer Security – ESORICS 2023
    Conference paper 2024
  19. Scaling Mobile Private Contact Discovery to Billions of Users

    Mobile contact discovery is a convenience feature of messengers such as WhatsApp or Telegram that helps users to identify which of their existing...
    Laura Hetz, Thomas Schneider, Christian Weinert in Computer Security – ESORICS 2023
    Conference paper 2024
  20. Optimally-Fair Multi-party Exchange Without Trusted Parties

    We present a multi-party exchange protocol that achieves optimal partial fairness even in the presence of a dishonest majority. We demonstrate how...
    Ivo Maffei, A. W. Roscoe in Computer Security – ESORICS 2023
    Conference paper Open access 2024
Did you find what you were looking for? Share feedback.