This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017.
This book constitutes the refereed proceedings of the 13th European Conference on Ambient Intelligence, AmI 2017, held in Malaga, Spain, in April 2017.
This book constitutes the proceedings of the Third Workshop on Video Analytics for Audience Measurement, VAAM 2016, and the Second International Workshop on Face and Facial Expression Recognition from Real World Videos, FFER 2016, held at the 23rd International Conference on Pattern Recognition, ICPR 2016, in Cancun, Mexico, in December 2016.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016.
This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016.
This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017.
This book analyses the doctrinal structure and content of secondary liability rules that hold internet service providers liable for the conduct of others, including the safe harbours (or immunities) of which they may take advantage, and the range of remedies that can be secured against such providers.
This book covers many aspects of cyberspace, emphasizing not only its possible 'negative' challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production.
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Smart Card Research and Advanced Applications, CARDIS 2016, held in Cannes, France, in November 2016.
This book constitutes the refereed post-conference proceedings of the 5th International Conference on Computational Modeling of Objects Presented in Images, CompIMAGE 2016, held in Niagara Falls, NY, USA, in September 2016.
This book presents a comprehensive overview of the computerized core monitoring techniques currently employed at pressurized water reactor (PWR) and boiling water reactor (BWR) nuclear power plants.
The three-volume set, consisting of LNCS 10116, 10117, and 10118, contains carefully reviewed and selected papers presented at 17 workshops held in conjunction with the 13th Asian Conference on Computer Vision, ACCV 2016, in Taipei, Taiwan in November 2016.
This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and Privacy, ICISSP 2016, held in Rome, Italy, in February 2016.
The three-volume set, consisting of LNCS 10116, 10117, and 10118, contains carefully reviewed and selected papers presented at 17 workshops held in conjunction with the 13th Asian Conference on Computer Vision, ACCV 2016, in Taipei, Taiwan in November 2016.
The three-volume set, consisting of LNCS 10116, 10117, and 10118, contains carefully reviewed and selected papers presented at 17 workshops held in conjunction with the 13th Asian Conference on Computer Vision, ACCV 2016, in Taipei, Taiwan in November 2016.
Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications.
This book constitutes the proceedings of the 18th International Conference on Passive and Active Measurement, PAM 2017, held in Sydney, Australia, in March 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016.
This book constitutes the revised selected papers from the 11th International Conference on Risk and Security of Internet and Systems, CRISIS 2016, held in Roscoff, France, in September 2016.
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016.
This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016.
This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016.
This book constitutes the refereed post-conference proceedings of the 8th International Conference on Mobile Networks and Management, MONAMI 2016, held in Abu Dhabi, United Arab Emirates, in October 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial Networks and Intelligent Systems, INISCOM 2016 held in Leicester, UK, October 31 - November 1, 2016.
This book constitutes the refereed post-conference proceedings of the 21st Iberoamerican Congress on Pattern Recognition, CIARP 2016, held in Lima, Peru, in November 2016.
This book constitutes the thoroughly refereed conference proceedings of the First International Joint Conference on Electronic Voting, E-Vote-ID 2016, held in Bregenz, Austria, in October 2016.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in October 2016.
Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints.
This book constitutes the refereed proceedings of the First International Conference on Future Intelligent Vehicular Technologies, Future 5V 2016, held in Porto, Portugal, in September 2016.
This book constitutes the proceedings of the 8th International Conference on Ad Hoc Networks, ADHOCNETS 2016, held in Ottawa, Canada, September 26-17, 2016.
This book constitutes the refereed proceedings of the 11th International Conference on Global Security, Safety and Sustainability, ICGS3 2017, held in London, UK, in January, 2017.
The two volume set LNCS 10072 and LNCS 10073 constitutes the refereed proceedings of the 12th International Symposium on Visual Computing, ISVC 2016, held in Las Vegas, NV, USA in December 2016.
The two volume set LNCS 10072 and LNCS 10073 constitutes the refereed proceedings of the 12th International Symposium on Visual Computing, ISVC 2016, held in Las Vegas, NV, USA in December 2016.
This book constitutes the proceedings of the 13th International Conference on Distributed Computing and Internet Technology, ICDCIT 2017, held in Bhubaneswar, India, in January 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in June 2016.
This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016.
This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016.