Author:
Publisher:
ISBN:
Category :
Languages : en
Pages :
Book Description
Socio-Technical Aspects in Security and Trust (STAST), 2015 Workshop on
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust
Author: Zinaida Benenson
Publisher:
ISBN: 9781450348263
Category :
Languages : en
Pages : 101
Book Description
Publisher:
ISBN: 9781450348263
Category :
Languages : en
Pages : 101
Book Description
8th Workshop on Socio-Technical Aspects in Security and Trust
Author: Giampaolo Bella
Publisher:
ISBN:
Category : Computer crimes
Languages : en
Pages :
Book Description
Publisher:
ISBN:
Category : Computer crimes
Languages : en
Pages :
Book Description
Augmented Cognition
Author: Dylan D. Schmorrow
Publisher: Springer Nature
ISBN: 3031054571
Category : Computers
Languages : en
Pages : 431
Book Description
This book constitutes the refereed proceedings of the 16th International Conference on Augmented Cognition, AC 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022. The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The AC 2022 proceedings aims to develop adaptive systems capable of extending the information management capacity of individuals through computing technologies and offers a broad range of theoretical and applied issues related to Augmented Cognition and its applications.
Publisher: Springer Nature
ISBN: 3031054571
Category : Computers
Languages : en
Pages : 431
Book Description
This book constitutes the refereed proceedings of the 16th International Conference on Augmented Cognition, AC 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022. The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The AC 2022 proceedings aims to develop adaptive systems capable of extending the information management capacity of individuals through computing technologies and offers a broad range of theoretical and applied issues related to Augmented Cognition and its applications.
Human Factors in Cybersecurity
Author: Abbas Moallem
Publisher: AHFE Conference
ISBN: 1964867037
Category : Technology & Engineering
Languages : en
Pages : 254
Book Description
Proceedings of the 15th International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences, Nice, France, 24-27 July 2024.
Publisher: AHFE Conference
ISBN: 1964867037
Category : Technology & Engineering
Languages : en
Pages : 254
Book Description
Proceedings of the 15th International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences, Nice, France, 24-27 July 2024.
Human Aspects of Information Security, Privacy, and Trust
Author: Theo Tryfonas
Publisher: Springer
ISBN: 3319203762
Category : Computers
Languages : en
Pages : 730
Book Description
This book constitutes the proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 62 papers presented in the HAS 2015 proceedings are organized in topical sections as follows: authentication, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies.
Publisher: Springer
ISBN: 3319203762
Category : Computers
Languages : en
Pages : 730
Book Description
This book constitutes the proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 62 papers presented in the HAS 2015 proceedings are organized in topical sections as follows: authentication, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies.
Security and Cryptography for Networks
Author: Michel Abdalla
Publisher: Springer
ISBN: 3319108794
Category : Computers
Languages : en
Pages : 625
Book Description
This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key encryption.
Publisher: Springer
ISBN: 3319108794
Category : Computers
Languages : en
Pages : 625
Book Description
This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key encryption.
Financial Cryptography and Data Security
Author: Nikita Borisov
Publisher: Springer Nature
ISBN: 3662643227
Category : Computers
Languages : en
Pages : 529
Book Description
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021. The 47 revised full papers and 4 short papers together with 3 as Systematization of Knowledge (SoK) papers were carefully selected and reviewed from 223 submissions. The accepted papers were organized according to their topics in 12 sessions: Smart Contracts, Anonymity and Privacy in Cryptocurrencies, Secure Multi-Party Computation, System and Application Security, Zero-Knowledge Proofs, Blockchain Protocols, Payment Channels, Mining, Scaling Blockchains, Authentication and Usability, Measurement, and Cryptography.
Publisher: Springer Nature
ISBN: 3662643227
Category : Computers
Languages : en
Pages : 529
Book Description
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021. The 47 revised full papers and 4 short papers together with 3 as Systematization of Knowledge (SoK) papers were carefully selected and reviewed from 223 submissions. The accepted papers were organized according to their topics in 12 sessions: Smart Contracts, Anonymity and Privacy in Cryptocurrencies, Secure Multi-Party Computation, System and Application Security, Zero-Knowledge Proofs, Blockchain Protocols, Payment Channels, Mining, Scaling Blockchains, Authentication and Usability, Measurement, and Cryptography.
Privacy and Identity Management. The Smart Revolution
Author: Marit Hansen
Publisher: Springer
ISBN: 3319929259
Category : Computers
Languages : en
Pages : 373
Book Description
This book contains selected papers presented at the 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Ispra, Italy, in September 2017. The 12 revised full papers, 5 invited papers and 4 workshop papers included in this volume were carefully selected from a total of 48 submissions and were subject to a three-phase review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. They are organized in the following topical sections: privacy engineering; privacy in the era of the smart revolution; improving privacy and security in the era of smart environments; safeguarding personal data and mitigating risks; assistive robots; and mobility and privacy.
Publisher: Springer
ISBN: 3319929259
Category : Computers
Languages : en
Pages : 373
Book Description
This book contains selected papers presented at the 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Ispra, Italy, in September 2017. The 12 revised full papers, 5 invited papers and 4 workshop papers included in this volume were carefully selected from a total of 48 submissions and were subject to a three-phase review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. They are organized in the following topical sections: privacy engineering; privacy in the era of the smart revolution; improving privacy and security in the era of smart environments; safeguarding personal data and mitigating risks; assistive robots; and mobility and privacy.
Psychological and Behavioral Examinations in Cyber Security
Author: McAlaney, John
Publisher: IGI Global
ISBN: 1522540547
Category : Computers
Languages : en
Pages : 358
Book Description
Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.
Publisher: IGI Global
ISBN: 1522540547
Category : Computers
Languages : en
Pages : 358
Book Description
Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.