You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.
Due to its transparency and dependability in secure online transactions, blockchain technology has grown in prominence in recent years. Several industries, including those of finance, healthcare, energy and utilities, manufacturing, retail marketing, entertainment and media, supply chains, e-commerce, and e-business, among others, use blockchain technology. In order to enable intelligent decision-making to prevent security assaults, particularly in permission-less blockchain platforms, artificial intelligence (AI) techniques and machine learning (ML) algorithms are used. By exploring the numerous use cases and security methods used in each of them, this book offers insight on the application of AI and ML in blockchain security principles. The book argues that it is crucial to include artificial intelligence and machine learning techniques in blockchain technology in order to increase security.
This book constitutes the refereed proceedings of the 15th International Conference on Network and System Security, NSS 2021, held in Tianjin, China, on October 23, 2021. The 16 full and 8 short papers presented in this book were carefully reviewed and selected from 62 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic. The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.
The three-volume set LNCS 12937 - 12939 constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021. The conference took place in Nanjing, China.The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. The following topics are covered in Part I of the set: network protocols, signal processing, wireless telecommunication systems, blockchain, IoT and edge computing, artificial intelligence, computer security, distributed computer systems, machine learning, and others.
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.
This book constitutes the refereed post-conference proceedings of the 18th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TridentCom 2023, which was held in Nanjing, China, during November 11-13, 2023. The 9 full papers were selected from 30 submissions and deal the emerging technologies of big data, cyber-physical systems and computer communications. The papers are grouped in thematical sessions on blockchain and its applications; emerging applications; AI and its security.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart...