We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 152 results
  1. Homomorphic Encryption for Financial Cryptography Recent Inventions and Challenges

    This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity,...

    V. Seethalakshmi, Rajesh Kumar Dhanaraj, ... Mariya Ouaissa
    Book 2024
  2. Physical Layer Security in Power Line Communications Fundamentals, Models and Applications

    This book emerges as a seminal work, addressing the critical need for robust security for power line communications (PLC), during an era where...

    Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro in Advances in Information Security
    Book 2024
  3. Face De-identification: Safeguarding Identities in the Digital Era

    This book provides state-of-the-art Face De-Identification techniques and privacy protection methods, while highlighting the challenges faced in...

    Yunqian Wen, Bo Liu, ... Rong Xie
    Book 2024
  4. Artificial Intelligence for Security Enhancing Protection in a Changing World

    This book discusses the use of artificial intelligence (AI) for security purposes. It is divided into three parts: methodological fundamentals of AI,...

    Tuomo Sipola, Janne Alatalo, ... Tero Kokkonen
    Book 2024
  5. Classical and Modern Cryptography for Beginners

    This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or...

    Rajkumar Banoth, Rekha Regar
    Textbook 2024
  6. The Business of Hacking Creating, Developing, and Maintaining an Effective Penetration Testing Team

    There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with...
    Michael Butler, Jacob G. Oakley
    Book 2024
  7. Cyber Crisis Management Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

    Cyber-Attacken und IT-Pannen bedrohen jede Organisation. Die Zwischenfälle häufen sich und bilden oft den Auftakt zu komplexen, existenzgefährdenden...
    Holger Kaschner
    Book 2024
  8. The Curious Case of Usable Privacy Challenges, Solutions, and Prospects

    This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a...
    Simone Fischer-Hübner, Farzaneh Karegar in Synthesis Lectures on Information Security, Privacy, and Trust
    Book 2024
  9. Decentralized Privacy Preservation in Smart Cities

    This book investigates decentralized trust-based privacy-preserving solutions in smart cities. The authors first present an overview of smart cities...

    Cheng Huang, Xuemin (Sherman) Shen in Wireless Networks
    Book 2024
  10. Secure and Resilient Digital Transformation of Healthcare First Workshop, SUNRISE 2023, Stavanger, Norway, November 30, 2023, Proceedings

    This CCIS post conference volume constitutes the proceedings of First Workshop, SUNRISE 2023, in Stavanger, Norway, in November 2023. The 4 full...
    Habtamu Abie, Vasileios Gkioulos, ... Sandeep Pirbhulal in Communications in Computer and Information Science
    Conference proceedings 2024
  11. Recommender Systems in Fashion and Retail Proceedings of the Fourth Workshop at the Recommender Systems Conference (2022)

    This book includes the proceedings of the fourth workshop on recommender systems in fashion and retail (2022), and it aims to present a...

    Humberto Jesús Corona Pampín, Reza Shirvany in Lecture Notes in Electrical Engineering
    Conference proceedings 2024
  12. Scaling Up: How Data Curation Can Help Address Key Issues in Qualitative Data Reuse and Big Social Research

    This book explores the connections between qualitative data reuse, big social research, and data curation. A review of existing literature identifies...
    Book 2025
  13. Decision Making and Security Risk Management for IoT Environments

    This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The...
    Wadii Boulila, Jawad Ahmad, ... Imed Riadh Farah in Advances in Information Security
    Book 2024
  14. Privacy Computing Theory and Technology

    The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the...

    Fenghua Li, Hui Li, Ben Niu
    Book 2024
  15. Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3–5, 2023, Proceedings, Part II

    This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security...

    Jaideep Vaidya, Moncef Gabbouj, Jin Li in Lecture Notes in Computer Science
    Conference proceedings 2024
  16. Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3–5, 2023, Proceedings, Part I

    This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security...

    Jaideep Vaidya, Moncef Gabbouj, Jin Li in Lecture Notes in Computer Science
    Conference proceedings 2024
  17. Information Experience and Information Literacy 8th European Conference on Information Literacy, ECIL 2023, Kraków, Poland, October 9–12, 2023, Revised Selected Papers, Part I

    The two-volume set CCIS 2042 and 2043 constitutes the refereed proceedings of the 8th European Conference on Information Literacy, ECIL 2023, held in...
    Serap Kurbanoğlu, Sonja Špiranec, ... Loriene Roy in Communications in Computer and Information Science
    Conference proceedings 2024
  18. Information Security Planning A Practical Approach

    This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the...

    Susan Lincke
    Book 2024
  19. Continuous Biometric Authentication Systems An Overview

    This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from...
    Max Smith-Creasey in SpringerBriefs in Computer Science
    Book 2024
  20. Multimedia Watermarking Latest Developments and Trends

    Multimedia watermarking is a key ingredient for integrity verification, transaction tracking, copyright protection, authentication, copy control, and...

    Aditya Kumar Sahu
    Book 2025
Did you find what you were looking for? Share feedback.