This book analyses the doctrinal structure and content of secondary liability rules that hold internet service providers liable for the conduct of others, including the safe harbours (or immunities) of which they may take advantage, and the range of remedies that can be secured against such providers.
This book constitutes the refereed proceedings of the 16th International Conference on Critical Information Infrastructures Security, CRITIS 2021, which took place in Lausanne, Switzerland, during September 27-29, 2021.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2017, and the First International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium on Research in Computer Security, ESORICS 2017.
The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021.
This book constitutes the refereed proceedings of the 12th International Workshop on Security, IWSEC 2017, held in Hiroshima, Japan, in August/September 2017.
This book constitutes the thoroughly refereed proceedings of the CAiSE Forum 2021 which was held as part of the 33rd International Conference on Advanced Information Systems Engineering, CAiSE 2021, in June 2021.
This book constitutes the refereed proceedings of the Third International Conference on Geometric Science of Information, GSI 2017, held in Paris, France, in November 2017.
This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2021, held in Lugano, Switzerland, in October 2021.
This book constitutes the refereed post-conference proceedings of the 5th International Conference on Computational Modeling of Objects Presented in Images, CompIMAGE 2016, held in Niagara Falls, NY, USA, in September 2016.
This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016.
This book constitutes the thoroughly refereed conference proceedings of the Fourth International Workshop on Risk Assessment and Risk-Driven Quality Assurance, RISK 2016, held in conjunction with ICTSS 2016, in Graz, Austria, in October 2016.
The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021.
This book constitutes the refereed proceedings of the 9th International Conference on Data-Driven Innovation, ICT Innovations 2017, held in Skopje, Macedonia, in September 2017.
This book contributes to the body of scholarly knowledge by exploring the main ideas of wireless networks of past, present, and future, trends in the field of networking, the capabilities of 5G and technologies that are potential enablers of 6G, potential 6G applications and requirements, as well as unique challenges and opportunities that 6G research is going to offer over the next decade.
The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021.
This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020.
This book constitutes the refereed proceedings of the 9th International Conference on Ad Hoc Networks, AdHocNets 2017, held in Niagara Falls, Ontario, USA, in September 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Smart Card Research and Advanced Applications, CARDIS 2016, held in Cannes, France, in November 2016.
This volume constitutes the proceedings of the 20th International Workshop on Digital Forensics and Watermarking, IWDW 2021, held in Beijing, China, in November 2021.
This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Design and Architecture for Signal and Image Processing, DASIP 2022, held in Budaypest, Hungary in June 2022.
This book constitutes the proceedings of the Third Workshop on Video Analytics for Audience Measurement, VAAM 2016, and the Second International Workshop on Face and Facial Expression Recognition from Real World Videos, FFER 2016, held at the 23rd International Conference on Pattern Recognition, ICPR 2016, in Cancun, Mexico, in December 2016.
This book constitutes revised selected papers of the Second International Conference on Computing Science, Communication and Security, COMS2 2021, held in Gandhinagar, India, in February 2021.
This book constitutes the refereed proceedings of the 13th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2016, held in Athens.
This book provides extensive insights on blockchain systems, starting from a historical perspective and moving towards building foundational knowledge, with focus on communication networks.
This book constitutes the refereed proceedings of the First International EAI Conference on Emerging Technologies for Developing Countries, AFRICATEK 2017, held in Marrakech, Morocco, in March 2017.
This book constitutes the refereed proceedings of the 10th International Conference on Culture and Computing, C&C 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022.
This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017.
This book constitutes the refereed post-conference proceedings of the 28th International Workshopon Combinatorial Algorithms, IWOCA 2017, held in Newcastle, NSW, Australia, in July 2017.
This book constitutes the proceedings of the 28th International Tyrrhenian Workshop on Digital Communication, TIWDC 2017, which took place in Palermo, Italy, in September 2017.
This book constitutes the thoroughly refereed conference proceedings of the First International Joint Conference on Electronic Voting, E-Vote-ID 2016, held in Bregenz, Austria, in October 2016.
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022.
This book constitutes seven refereed workshops and symposiums, SpaCCS Workshops 2020, which are held jointly with the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, in Nanjing, China, in December 2020.
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020.
This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016, held in Can Tho City, Vietnam, in November 2016.
This book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, held in Leuven, Belgium, in April 2022.
This book constitutes the proceedings of the 10th International Conference on Artificial Intelligence and Mobile Services, AIMS 2021, held as a virtual conference as part of SCF 2021, during December 10-14, 2021.
This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Aspects of Computer and Information Sciences, MACIS 2017, held in Vienna, Austria, in November 2017.
This book aims to gather the insight of leading experts on corruption and anti-corruption studies working at the scientific frontier of this phenomenon using the multidisciplinary tools of data and network science, in order to present current theoretical, empirical, and operational efforts being performed in order to curb this problem.