Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11635)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ICAIS 2019.
Buy print copy
About this book
The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows:
Part I: cloud computing;
Part II: artificial intelligence; big data; and cloud computing and security;
Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity;
Part IV: encryption and cybersecurity.
Similar content being viewed by others
Keywords
- artificial intelligence
- authentication
- computer crime
- computer networks
- cryptography
- data security
- encryption
- image coding
- image processing
- internet
- privacy
- privacy preserving
- private key
- public key cryptography
- Public keys (PK)
- software engineering
- software evaluation
- telecommunication networks
- telecommunication traffic
- World Wide Web
Table of contents (58 papers)
-
Encryption and Cybersecurity
Other volumes
-
Artificial Intelligence and Security
-
Artificial Intelligence and Security
-
Artificial Intelligence and Security
-
Artificial Intelligence and Security
Editors and Affiliations
Bibliographic Information
Book Title: Artificial Intelligence and Security
Book Subtitle: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV
Editors: Xingming Sun, Zhaoqing Pan, Elisa Bertino
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-24268-8
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2019
Softcover ISBN: 978-3-030-24267-1Published: 11 July 2019
eBook ISBN: 978-3-030-24268-8Published: 18 July 2019
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVII, 651
Number of Illustrations: 118 b/w illustrations, 134 illustrations in colour
Topics: Systems and Data Security, Cryptology, Computer Communication Networks, Information Systems Applications (incl. Internet), Software Engineering, Legal Aspects of Computing