Chronologie aller Bände (1 - 16)

Die Reihenfolge beginnt mit dem "Information Security, Privacy and Digital Forensics". sollte mit diesem Band von Sukanta Kumar Sabut beginnen. Der zweite Teil der Reihe "Frontiers in Cyber Security" ist am 28.02.2022 erschienen. Mit insgesamt 16 Bänden wurde die Reihe über einen Zeitraum von ungefähr 5 Jahren fortgesetzt. Der neueste Band trägt den Titel "Information Security, Privacy and Digital Forensics".
- Anzahl der Bewertungen für die gesamte Reihe: 0
- Ø Bewertung der Reihe: 0
- Start der Reihe: 02.04.2021
- Neueste Folge: 18.12.2025
Diese Reihenfolge enthält 13 unterschiedliche Autoren.
- Autor: Gohil, Bhavesh N.
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 18.12.2025
- Genre: Sonstiges
Information Security, Privacy and Digital Forensics
This volume contains the selected proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2023). The content highlights novel contributions and recent developments in areas such as cyber-attacks and defenses, computer forensics, cybersecurity database forensics, cyber threat intelligence, data analytics for security, anonymity, penetration testing, incident response, Internet of Things security, malware and botnets, social media security, humanitarian forensics, software and media piracy, crime analysis, and hardware security, among others. This volume will serve as a valuable resource for researchers in both industry and academia who are working in the fields of security, privacy, and digital forensics from both technological and social perspectives.
- Band: 728
- Autor: Sabut, Sukanta Kumar
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 02.04.2021
- Genre: Sonstiges
Proceedings of International Conference on Communication, Circuits, and Systems
- Band: 1557
- Autor: Wang, Guojun
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 25.02.2022
- Genre: Krimi
Ubiquitous Security
The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks.
- Band: 1558
- Autor: Cao, Chunjie
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 28.02.2022
- Genre: Krimi
Frontiers in Cyber Security
The 20 full papers along with the 2 short papers presented were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on: intelligent security; system security; network security; multimedia security; privacy, risk and trust; data and application security.
- Band: 1680
- Autor: Su, Chunhua
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 27.01.2023
- Genre: Krimi
Science of Cyber Security - SciSec 2022 Workshops
- Band: 1768
- Autor: Wang, Guojun
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 15.02.2023
- Genre: Krimi
Ubiquitous Security
The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.
- Band: 1804
- Autor: Prabhu, Srikanth
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 19.06.2023
- Genre: Krimi
Applications and Techniques in Information Security
The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.
- Band: 2012
- Autor: Sun, Yuqing
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 04.01.2024
- Genre: Krimi
Computer Supported Cooperative Work and Social Computing
The 54 full papers and 28 short papers presented in these proceedings were carefully reviewed and selected from 221 submissions. The papers are organized in the following topical sections: Social Media and Online Communities; Collaborative Mechanisms, Models, Approaches, Algorithms and Systems; Crowd Intelligence and Crowd Cooperative Computing; Cooperative Evolutionary Computation and Human-like Intelligent Collaboration; Domain-Specific Collaborative Applications.
- Band: 2095
- Autor: You, Ilsun
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 11.07.2024
- Genre: Krimi
Mobile Internet Security
This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 19–21, 2023.
The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
- Band: 14252
- Autor: Wang, Ding
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 19.10.2023
- Genre: Krimi
Information and Communications Security
This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on Information and Communications Security, ICICS 2023, held in Tianjin, China, during November 18–20, 2023.
The 38 full papers presented together with 6 short papers were carefully reviewed and selected from 181 submissions. The conference focuses on: Symmetric-Key Cryptography; Public-Key Cryptography; Applied Cryptography; Authentication and Authorization; Privacy and Anonymity; Security and Privacy of AI; Blockchain and Cryptocurrencies; and System and Network Security.
- Band: 14402
- Autor: Kim, Howon
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 10.01.2024
- Genre: Krimi
Information Security Applications
The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantum cryptography and quantum cryptanalysis.
- Band: 14427
- Autor: Liu, Qingshan
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 23.12.2023
- Genre: Sonstiges
Pattern Recognition and Computer Vision
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2023, held in Xiamen, China, during October 13–15, 2023.
The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis.
- Band: 14440
- Autor: Guo, Jian
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 17.12.2023
- Genre: Sonstiges
Advances in Cryptology – ASIACRYPT 2023
The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows:
Part I: Secure Multi-party computation; threshold cryptography; .
Part II: proof systems - succinctness and foundations; anonymity;
Part III: quantum cryptanalysis; symmetric-key cryptanalysis;
Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model;
Part V: functional encryption, commitments and proofs; secure messaging and broadcast;
Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models;
Part VII: post-quantum cryptography;
Part VIII: quantum cryptography; key exchange; symmetric-key design.
- Band: 14444
- Autor: Guo, Jian
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 17.12.2023
- Genre: Sonstiges
Advances in Cryptology – ASIACRYPT 2023
The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows:
Part I: Secure Multi-party computation; threshold cryptography; .
Part II: proof systems - succinctness and foundations; anonymity;
Part III: quantum cryptanalysis; symmetric-key cryptanalysis;
Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model;
Part V: functional encryption, commitments and proofs; secure messaging and broadcast;
Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models;
Part VII: post-quantum cryptography;
Part VIII: quantum cryptography; key exchange; symmetric-key design.
- Band: 14445
- Autor: Guo, Jian
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 18.12.2023
- Genre: Sonstiges
Advances in Cryptology – ASIACRYPT 2023
The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows:
Part I: Secure Multi-party computation; threshold cryptography; .
Part II: proof systems - succinctness and foundations; anonymity;
Part III: quantum cryptanalysis; symmetric-key cryptanalysis;
Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model;
Part V: functional encryption, commitments and proofs; secure messaging and broadcast;
Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models;
Part VII: post-quantum cryptography;
Part VIII: quantum cryptography; key exchange; symmetric-key design.
- Band: 14562
- Autor: Seo, Hwajeong
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 07.03.2024
- Genre: Krimi
Information Security and Cryptology – ICISC 2023
The 31 full papers included in this book were carefully reviewed and selected from 78 submissions. They were organized in topical sections as follows:
Part I: Cryptanalysis and Quantum Cryptanalysis; Side Channel Attack; Signature Schemes.Part II: Cyber Security; Applied Cryptography; and Korean Post Quantum Cryptography.















