This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented...
详细信息
ISBN:
(数字)9783642044311
ISBN:
(纸本)9783642044304
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.
This book constitutes the proceedings of the First International Conference on Frontiers in Cyber security, held in Chengdu, China, in November 2018. The 18 full papers along with the3 short papers presented were...
详细信息
ISBN:
(数字)9789811330957
ISBN:
(纸本)9789811330940
This book constitutes the proceedings of the First International Conference on Frontiers in Cyber security, held in Chengdu, China, in November 2018. The 18 full papers along with the3 short papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections, namely: symmetric key cryptography, public key cryptography, post-quantum cryptography, cloud security and data deduplication, access control, attack and behavior detection, system and network security, security design.
Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interak...
详细信息
ISBN:
(数字)9783658327958
ISBN:
(纸本)9783658327941
Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Fachleute/Personen aus Wissenschaft, Design, Entwicklung und Anwendung.
This book constitutes the proceedings of the 11th International Conference on Network and System security, NSS 2017, held in Helsinki, Finland, in August 2017. The 24 revised full papers presented in this book were ca...
详细信息
ISBN:
(数字)9783319647012
ISBN:
(纸本)9783319647005
This book constitutes the proceedings of the 11th International Conference on Network and System security, NSS 2017, held in Helsinki, Finland, in August 2017. The 24 revised full papers presented in this book were carefully reviewed and selected from 83 initial submissions. The papers are organized in topical sections on Cloud and IoT security; Network security; Platform and Hardware security; Crypto and Others; and Authentication and Key Management. This volume also contains 35 contributions of the following workshops: security Measurements of Cyber Networks (SMCN-2017); security in Big data (SECBD-2017); 5G security and Machine Learning (IW5GS-2017); of the Internet of Everything (SECIOE-2017).
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented we...
详细信息
ISBN:
(数字)9783319184678
ISBN:
(纸本)9783319184661;9783319387079
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
暂无评论