This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deal...
The LNCS 13172 constitute the proceedings of the 13th International Symposium on Cyberspace Safety and Security, CSS 2021, held online, in November 2021.The 9...
This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in Sep...
byMauro Conti,Matthias Schunter,Ioannis Askoxylakis
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Gre...
byAli Dehghantanha,Mauro Conti,Tooska Dargahi
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat i...
byRadha Poovendran,Gaurav Somani,Mauro Conti
Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enter...
byMauro Conti,Marc Stevens,Stephan Krenn
This book constitutes the refereed proceedings of the 20th International Conference on Cryptology and Network Security, CANS 2021, which was held during Decembe...
bySushmita Ruj,Salil Kanhere,Mauro Conti
This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The first part ...
byMauro Conti,Jianying Zhou,Emiliano Casalicchio,Angelo Spognardi
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Securi...
byMauro Conti,Jianying Zhou,Emiliano Casalicchio,Angelo Spognardi
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Securi...
byGene Tsudik,Mauro Conti,Kaitai Liang,Georgios Smaragdakis
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which t...
byGene Tsudik,Mauro Conti,Kaitai Liang,Georgios Smaragdakis
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which t...
byGene Tsudik,Mauro Conti,Kaitai Liang,Georgios Smaragdakis
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which t...
byGene Tsudik,Mauro Conti,Kaitai Liang,Georgios Smaragdakis
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which t...
byIndrajit Ray,Manoj Gaur,Mauro Conti,Dheeraj Sanghi,V. Kamakoti
This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in Decem...