You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth case studies relating to Craigslist scams and Business Email Compromise Scams. This book provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the currently deployed email security tools, with a focus on understanding the metrics of scams. Both professionals working in security and advanced-level students interested in privacy or applications of computer science will find this book a useful reference.
Anything that can be automated, will be. The "magic" that digital technology has brought us - self-driving cars, Bitcoin, high frequency trading, the internet of things, social networking, mass surveillance, the 2009 housing bubble - has not been considered from an ideological perspective. The Critique of Digital Capitalism identifies how digital technology has captured contemporary society in a reification of capitalist priorities, and also describes digital capitalism as an ideologically "invisible" framework that is realized in technology. Written as a series of articles between 2003 and 2015, the book provides a broad critical scope for understanding the inherent demands of capitalist pr...
This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.
This volume of Frontiers of Engineering presents papers on the topics covered at the National Academy of Engineering's 2019 US Frontiers of Engineering Symposium, hosted by Boeing in North Charleston, South Carolina, September 25-27. At the annual 2 1/2-day event, 100 of this country's best and brightest early-career engineers - from academia, industry, and government and a variety of engineering disciplines - learn from their peers about pioneering work in different areas of engineering. Frontiers of Engineering conveys the excitement of this unique meeting and highlights innovative developments in engineering research and technical work.
This book constitutes the refereed proceedings of three workshops heldat the 20th International Conference on Financial Cryptography and DataSecurity, FC 2016, in Christ Church, Barbados, in February 2016. The 22 full papers presented were carefully reviewed and selected from 49 submissions. They feature the outcome of the Second Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, the First Workshop on Secure Voting Systems, VOTING 2016, and the 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016.
This book constitutes the refereed proceedings of the IFIP-TC6 11th International Conference on Personal Wireless Communications, PWC 2006. The book presents 25 revised full papers and 13 revised short papers, carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on mobile and wireless networking, QoS, ad-hoc, security, wireless LAN, cross-layer design, wireless sensor networks, physical layer, and mobile and wireless applications.
Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector. Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics.
The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
Blockchain and cryptocurrencies have recently captured the interest of academics and those in industry. Cryptocurrencies are essentially digital currencies that use blockchain technology and cryptography to facilitate secure and anonymous transactions. The cryptocurrency market is currently worth over $500 billion. Many institutions and countries are starting to understand and implement the idea of cryptocurrencies in their business models. This Special Issue will provide a collection of papers from leading experts in the area of blockchain and cryptocurrencies. The topics covered in this Special Issue will include but are not limited to the following: academic research on blockchain and cryptocurrencies; industrial applications of blockchain and cryptocurrencies; applications of fintech in academia and industry; the economics of blockchain technology, and the financial analysis and risk management with cryptocurrencies.
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.