About this book series

This series changed its name, please follow this link: https://www.springer.com/series/17133 to get on the series with the updated name.

The series aims to develop and disseminate an understanding of innovations, paradigms, techniques, and technologies in the contexts of cyber security systems and networks related research and studies.

It publishes thorough and cohesive overviews of state-of-the-art topics in cyber security, as well as sophisticated techniques, original research presentations and in-depth case studies in cyber systems and networks. The series also provides a single point of coverage of advanced and timely emerging topics as well as a forum for core concepts that may not have reached a level of maturity to warrant a comprehensive textbook.

It addresses security, privacy, availability, and dependability issues for cyber systems and networks, and welcomes emerging technologies, such as artificial intelligence, cloud computing, cyber physical systems, and big data analytics related to cyber security research. The mainly focuses on the following research topics: 

Fundamentals and theories
  • Cryptography for cyber security
  • Theories of cyber security
  • Provable security

Cyber Systems and Networks
  • Cyber systems security
  • Network security
  • Security services
  • Social networks security and privacy
  • Cyber attacks and defense
  • Data-driven cyber security
  • Trusted computing and systems

Applications and others
  • Hardware and device security
  • Cyber application security
  • Human and social aspects of cyber security



Discontinued series: although this series no longer publishes new content, the published titles listed here remain available.
Electronic ISSN
2522-557X
Print ISSN
2522-5561
Editor-in-Chief
  • Yang Xiang
Series Editor
  • Liqun Chen,
  • Kim-Kwang Raymond Choo,
  • Sherman S. M. Chow,
  • Robert H. Deng,
  • Dieter Gollmann,
  • Kuan-Ching Li,
  • Javier Lopez,
  • Kui Ren,
  • Jianying Zhou

Book titles in this series

  1. Design and Cryptanalysis of ZUC

    A Stream Cipher in Mobile Telephony

    Authors:
    • Chandra Sekhar Mukherjee
    • Dibyendu Roy
    • Subhamoy Maitra
    • Copyright: 2021

    Available Renditions

    • Soft cover
    • eBook