Filter
Datakryptering
Filter
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic …
This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and …
Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical …
This proceedings volume convenes selected, revised papers presented at the 52nd Southeastern International Conference on Combinatorics, Graph Theory and Computing (SEICCGTC 2021), …
With the recent debacle surrounding the cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of grasping the security and regulation of Web3, …
This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and …
Trusted execution environments (TEEs) protect sensitive code and data on computing platforms, even when the primary operating system is compromised. Once a technical curiosity, …
This volume constitutes the refereed proceedings of the 14th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2024, held in Paris, France. …
This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held in Windsor, Canada, …
This book presents mathematical models of various renewable energy sources (RESs) such as wind energy systems, solar PV systems, battery energy storage systems, pumped-storage …