Public Key Infrastructure


Book Description

This book constitutes the refereed proceedings of the Third European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2006, held in Torino, Italy, in June 2006. The 18 revised full papers and 4 short papers presented were carefully reviewed and selected from about 50 submissions. The papers are organized in topical sections on PKI management, authentication, cryptography, applications, and short contributions.




Social Informatics


Book Description

The two-volume set LNCS 10539 and 10540 constitutes the proceedings of the 9th International Conference on Social Informatics, SocInfo 2017, held in Oxford, UK, in September 2017. The 37 full papers and 43 poster papers presented in this volume were carefully reviewed and selected from 142 submissions. The papers are organized in topical sections named: economics, science of success, and education; network science; news, misinformation, and collective sensemaking; opinions, behavior, and social media mining; proximity, location, mobility, and urban analytics; security, privacy, and trust; tools and methods; and health and behaviour.




Applied Cryptography and Network Security


Book Description

This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.




Information and Communications Security


Book Description

Annotation. This book constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security, ICICS 2010, held in Barcelona, Spain, in December 2010. The 31 revised full papers presented together with an invited talk were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on access control, public key cryptography and cryptanalysis, security in distributed and mobile systems, cryptanalysis, authentication, fair exchange protocols, anonymity and privacy, software security, proxy cryptosystems, and intrusion detection systems.




Trusted Systems


Book Description

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Trusted Systems, INTRUST 2015, held in Beijing, China, in December 2015. The revised 12 full papers presented have been carefully reviewed and selected from 29 submissions. They are devoted to all aspects of trusted computing systems, including trusted modules, platforms; networks, services and applications. The papers are organized in the following sections: encryptions and signatures; security model; trusted technologies; software and system security.




Network and System Security


Book Description

This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.




Trust Management


Book Description

This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised full papers and 4 revised short papers are presented together with 1 keynote paper and 7 trust management tool and systems demonstration reports. Besides technical issues in distributed computing and open systems, topics from law, social sciences, business, and philosophy are addressed.







Advances in Information and Computer Security


Book Description

This book constitutes the refereed proceedings of the First International Workshop on Security, IWSEC 2006, held in Kyoto, Japan in October 2006. The 30 revised full papers presented were carefully reviewed and selected from 147 submissions.




Information Security


Book Description

This book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 86 submissions. The papers were organized in topical sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security; Crypto II: Zero-Knowledge Proofs; Defenses; Web Security; Side Channels; Malware Analysis; Crypto III: Signatures and Authentication.