Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Introduction to Cryptography: Principles and Applications

Posted By: AvaxGenius
Introduction to Cryptography: Principles and Applications

Introduction to Cryptography: Principles and Applications by Hans Delfs , Helmut Knebl
English | PDF | 2002 | 315 Pages | ISBN : N/A | 40.8 MB

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

Information Security Practice and Experience

Posted By: AvaxGenius
Information Security Practice and Experience

Information Security Practice and Experience: 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings by Weizhi Meng, Zheng Yan, Vincenzo Piuri
English | PDF (True) | 2023 | 628 Pages | ISBN : 9819970318 | 38.2 MB

This book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023.

Security and Privacy in New Computing Environments

Posted By: AvaxGenius
Security and Privacy in New Computing Environments

Security and Privacy in New Computing Environments: 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings by Wenbo Shi, Xiaofeng Chen, Kim-Kwang Raymond Choo
English | PDF (True) | 2022 | 408 Pages | ISBN : 3030967905 | 24.5 MB

This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually.

Advances in Cryptology – EUROCRYPT 2023

Posted By: AvaxGenius
Advances in Cryptology – EUROCRYPT 2023

Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II by Carmit Hazay, Martijn Stam
English | EPUB (True) | 2023 | 644 Pages | ISBN : 3031306163 | 72.9 MB

This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.
The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric Cryptology; and finally Multi-Party Computation and Zero-Knowledge.

Code-Based Cryptography

Posted By: AvaxGenius
Code-Based Cryptography

Code-Based Cryptography: 10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29–30, 2022, Revised Selected Papers by Jean-Christophe Deneuville
English | PDF | 2023 | 163 Pages | ISBN : 3031296885 | 3.3 MB

This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway.

Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Repost)

Posted By: AvaxGenius
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Repost)

Biometric User Authentication for IT Security: From Fundamentals to Handwriting by Claus Vielhauer
English | PDF(True) | 2006 | 288 Pages | ISBN : 038726194X | 18.3 MB

Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans.

Information and Communications Security

Posted By: AvaxGenius
Information and Communications Security

Information and Communications Security: 24th International Conference, ICICS 2022, Canterbury, UK, September 5–8, 2022, Proceedings by Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati
English | PDF | 2022 | 649 Pages | ISBN : 3031157761 | 15 MB

This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022.
The 34 revised full papers presented in the book were carefully selected from 150 submissions.

Advances in Cryptology – CRYPTO 2021

Posted By: AvaxGenius
Advances in Cryptology – CRYPTO 2021

Advances in Cryptology – CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II by Tal Malkin, Chris Peikert
English | PDF | 2021 | 834 Pages | ISBN : 3030842444 | 17.2 MB

The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it was an online event in 2021.

Smart Card Research and Advanced Applications

Posted By: AvaxGenius
Smart Card Research and Advanced Applications

Smart Card Research and Advanced Applications: 19th International Conference, CARDIS 2020, Virtual Event, November 18–19, 2020, Revised Selected Papers by Pierre-Yvan Liardet
English | EPUB | 2021 | 201 Pages | ISBN : 3030684865 | 15.4 MB

This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lübeck, Germany, and changed to an online format due to the COVID-19 pandemic.

Security, Privacy, and Anonymity in Computation, Communication, and Storage (Repost)

Posted By: AvaxGenius
Security, Privacy, and Anonymity in Computation, Communication, and Storage (Repost)

Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu
English | PDF | 2019 | 340 Pages | ISBN : 3030248992 | 21 MB

This book constitutes the refereed proceedings of six symposiums and two workshops co-located with SpaCCS 2019, the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage.

Privacy Technologies and Policy

Posted By: AvaxGenius
Privacy Technologies and Policy

Privacy Technologies and Policy: 9th Annual Privacy Forum, APF 2021, Oslo, Norway, June 17–18, 2021, Proceedings by Nils Gruschka, Luís Filipe Coelho Antunes, Kai Rannenberg, Prokopios Drogkaris
English | PDF | 2021 | 173 Pages | ISBN : 3030766624 | 10.7 MB

This book constitutes the refereed conference proceedings of the 9th Annual Privacy Forum, APF 2021. Due to COVID-19 pandemic the conference was held virtually.
The 9 revised full papers were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on Implementing Personal Data Processing Principles; Privacy Enhancing Technologies; Promoting Compliance with the GDPR.

Frontiers in Cyber Security (Repost)

Posted By: AvaxGenius
Frontiers in Cyber Security (Repost)

Frontiers in Cyber Security: First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings by Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang
English | PDF | 2018 | 306 Pages | ISBN : 9811330948 | 19.1 MB

This book constitutes the proceedings of the First International Conference on Frontiers in Cyber Security, held in Chengdu, China, in November 2018.
The 18 full papers along with the3 short papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections, namely: symmetric key cryptography, public key cryptography, post-quantum cryptography, cloud security and data deduplication, access control, attack and behavior detection, system and network security, security design.

Information Security and Privacy

Posted By: AvaxGenius
Information Security and Privacy

Information Security and Privacy: 26th Australasian Conference, ACISP 2021, Virtual Event, December 1–3, 2021, Proceedings by Joonsang Baek
English | EPUB | 2021 | 715 Pages | ISBN : 3030905667 | 70.8 MB

This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021.
The 35 full papers presented were carefully revised and selected from 157 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

Information Security and Privacy

Posted By: AvaxGenius
Information Security and Privacy

Information Security and Privacy: 26th Australasian Conference, ACISP 2021, Virtual Event, December 1–3, 2021, Proceedings by Joonsang Baek
English | PDF | 2021 | 715 Pages | ISBN : 3030905667 | 30.8 MB

This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021.
The 35 full papers presented were carefully revised and selected from 157 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

Advances in Cyber Security (Repost)

Posted By: AvaxGenius
Advances in Cyber Security (Repost)

Advances in Cyber Security: First International Conference, ACeS 2019, Penang, Malaysia, July 30 – August 1, 2019, Revised Selected Papers by Mohammed Anbar
English | PDF | 2020 | 382 Pages | ISBN : 9811526923 | 29 MB

The 25 full papers and 1 short paper were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on internet of things, industry and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and DDoS and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication.