This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 1416, 2025. The 54 full papers, 6 short papers an...Lasīt vairāk
Internet of Things and Machine Learning for Type I and Type II Diabetes: Use Cases provides a medium of exchange of expertise and addresses the concerns, needs, and problems associated with Type I and Type II diabetes. Expert contributions...Lasīt vairāk
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during Ju...Lasīt vairāk
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 1416, 2025.The 54 full papers, 6 short...Lasīt vairāk
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adver...Lasīt vairāk
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected...Lasīt vairāk
This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.The 21 full papers and 8 short papers presented in this...Lasīt vairāk
This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xian, China, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104...Lasīt vairāk
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adver...Lasīt vairāk
This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021.The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissi...Lasīt vairāk
This book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020. The 23 full papers presented in this volume were carefully reviewed and selected from 8...Lasīt vairāk
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightw...Lasīt vairāk
This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct secu...Lasīt vairāk
This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct secu...Lasīt vairāk
This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selec...Lasīt vairāk
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.The 41 revised full papers and 10 short pape...Lasīt vairāk
This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented i...Lasīt vairāk
(Izdošanas datums: 18-Sep-2013, Paperback / softback, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783642412264)
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and se...Lasīt vairāk
(Izdošanas datums: 27-Jun-2012, Paperback / softback, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783642314476)
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were ca...Lasīt vairāk