Search
Search Results
-
Homomorphic Encryption for Financial Cryptography Recent Inventions and Challenges
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity,...
-
Physical Layer Security in Power Line Communications Fundamentals, Models and Applications
This book emerges as a seminal work, addressing the critical need for robust security for power line communications (PLC), during an era where...
-
Face De-identification: Safeguarding Identities in the Digital Era
This book provides state-of-the-art Face De-Identification techniques and privacy protection methods, while highlighting the challenges faced in...
-
Artificial Intelligence for Security Enhancing Protection in a Changing World
This book discusses the use of artificial intelligence (AI) for security purposes. It is divided into three parts: methodological fundamentals of AI,...
-
Classical and Modern Cryptography for Beginners
This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or...
-
The Business of Hacking Creating, Developing, and Maintaining an Effective Penetration Testing Team
There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with... -
Cyber Crisis Management Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation
Cyber-Attacken und IT-Pannen bedrohen jede Organisation. Die Zwischenfälle häufen sich und bilden oft den Auftakt zu komplexen, existenzgefährdenden... -
The Curious Case of Usable Privacy Challenges, Solutions, and Prospects
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a... -
Decentralized Privacy Preservation in Smart Cities
This book investigates decentralized trust-based privacy-preserving solutions in smart cities. The authors first present an overview of smart cities...
-
Secure and Resilient Digital Transformation of Healthcare First Workshop, SUNRISE 2023, Stavanger, Norway, November 30, 2023, Proceedings
This CCIS post conference volume constitutes the proceedings of First Workshop, SUNRISE 2023, in Stavanger, Norway, in November 2023. The 4 full... -
Recommender Systems in Fashion and Retail Proceedings of the Fourth Workshop at the Recommender Systems Conference (2022)
This book includes the proceedings of the fourth workshop on recommender systems in fashion and retail (2022), and it aims to present a...
-
Scaling Up: How Data Curation Can Help Address Key Issues in Qualitative Data Reuse and Big Social Research
This book explores the connections between qualitative data reuse, big social research, and data curation. A review of existing literature identifies... -
Decision Making and Security Risk Management for IoT Environments
This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The... -
Privacy Computing Theory and Technology
The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the...
-
Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3–5, 2023, Proceedings, Part II
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security...
-
Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3–5, 2023, Proceedings, Part I
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security...
-
Information Experience and Information Literacy 8th European Conference on Information Literacy, ECIL 2023, Kraków, Poland, October 9–12, 2023, Revised Selected Papers, Part I
The two-volume set CCIS 2042 and 2043 constitutes the refereed proceedings of the 8th European Conference on Information Literacy, ECIL 2023, held in... -
Information Security Planning A Practical Approach
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the...
-
Continuous Biometric Authentication Systems An Overview
This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from... -
Multimedia Watermarking Latest Developments and Trends
Multimedia watermarking is a key ingredient for integrity verification, transaction tracking, copyright protection, authentication, copy control, and...