This book constitutes the refereed proceedings from the Third International Workshop on Graphical Models for Security, GraMSec 2016, held in Lisbon, Portugal, in June 2016.
This book constitutes the proceedings of the 9th International Conference on Internet and Distributed Computing Systems, IDCS 2016, held in Wuhan, China, in September 2016.
This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016.
The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.
The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.
This book constitutes the refereed proceedings oft he 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, held in Evry, France, in September 2016.
This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016.
This book constitutes the refereed proceedings of the 35th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2016, held in Dubrovnik, Croatia in September 2016 under the sponsorship of the UNESCO chair in Data Privacy.
This book provides a thorough treatment of privacy and security issues for researchers in the fields of smart grids, engineering, and computer science.
This book constitutes the refereed proceedings of the 12th IFIP TC 9 International Conference on Human Choice and Computers, HCC12 2016, held in Salford, UK, in September 2016.
This book constitutes the refereed conference proceedings of the 4th Annual Privacy Forum, APF 2016, held in Frankfurt/Main, Germany, in September 2016.
This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016.
This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS).
This book constitutes the refereed proceedings of the 5th European Conference on Service-Oriented and Cloud Computing, ESOCC 2016, held in Vienna, Austria, in September 2016.
This two volume set LNCS 9827 and LNCS 9828 constitutes the refereed proceedings of the 27th International Conference on Database and Expert Systems Applications, DEXA 2016, held in Porto, Portugal, September 2016.
This two volume set LNCS 9827 and LNCS 9828 constitutes the refereed proceedings of the 27th International Conference on Database and Expert Systems Applications, DEXA 2016, held in Porto, Portugal, September 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Industrial IoT Technologies and Applications, IoT 2016, held in GuangZhou, China, in March 2016.
This book constitutes the refereed proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016, held in Porto, Portugal, in September 2016 in conjunction with DEXA 2016.
This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016.
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks.
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Image Analysis and Recognition, ICIAR 2016, held in Povoa de Varzim, Portugal, in July 2016.
This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016.
This book constitutes the proceedings of the 15th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2016, held in Lille, France in July 2016.
This book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First Workshop on the Security of Cyber Physical Systems, WOS-CPS 2015, held in Vienna, Austria, in September 2015 in conjunction with ESORICS 2015, the 20th annual European Symposium on Research in Computer Security.
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.
This book reports on the results of an interdisciplinary and multidisciplinary workshop on provenance that brought together researchers and practitioners from different areas such as archival science, law, information science, computing, forensics and visual analytics that work at the frontiers of new knowledge on provenance.