Thisvolume constitutes the thoroughly refereed post-conference proceedings of the11th International Conference on Security and Privacy in CommunicationNetworks, SecureComm 2015, held in Dallas, TX, USA, in October 2015.
This book constitutes the thoroughlyrefereed post-conference proceedings of the 10th International Symposium onTrustworthy Global Computing, TGC 2015, held in Madrid, Spain, in August/September2015.
Thisbook constitutes the refereed proceedings of the 7th International Workshop onPost-Quantum Cryptography, PQCrypto 2016, held in Fukuoka, Japan, in February2016.
This bookconstitutes the refereed proceedings of the Second International Symposium onCyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015.
This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015.
This bookconstitutes the proceedings of the 12th International Conference on DistributedComputing and Internet Technology, ICDCIT 2016, held in Bhubaneswar, India, inJanuary 2016.
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereedpost-conference proceedings of the 6th International Conference on TrustedSystems, INTRUST 2014, held in Beijing, China, in December 2014.
This bookconstitutes revised selected papers from the First International Conference onInformation Systems Security and Privacy, ICISSP 2015, held in Angers, France,in February 2015.
This book constitutes the refereed proceedings of the SecondInternational Conference on Internet of Vehicles, IOV 2015, held inChengdu, China, in December 2015.
This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015.
This book constitutes the thoroughly refereedpost-conference proceedings of the 8th International Conference on Security forInformation Technology and Communications, SECITC 2015, held in Bucharest, Romania,in June 2015.
This book constitutes the refereed proceedings of the 6thInternational Conference on E-Democracy, E-Democracy 2015, held in Athens,Greece, in December 2015.
This bookconstitutes the refereed proceedings of the Second International Conference onSecurity Standardisation Research, SSR 2015, held in Tokyo, Japan, in December2015.
This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.
This book constitutes the refereed proceedingsof the 14th International Conference on Cryptology and Network Security, CANS2015, held in Marrakesh, Morocco, in December 2015.
This book constitutes the thoroughly refereed conferenceproceedings of the Third International Workshop on Risk Assessment andRisk-driven Testing, RISK 2015, held in conjunction with the OMG TechnicalMeeting in Berlin, Germany, in June 2015.
This volume constitutes the refereed proceedings of the 8th International Conference on Multimedia Communications, Services and Security, MCSS 2015, held in Krakow, Poland, in November 2015.
This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015.
This book contains a selection of papers from The 2015 International Conference on Software Process Improvement (CIMPS'15), held between the 28th and 30th of October in Mazatlan, Sinaloa, Mexico.
This volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2015, Ontologies, Databases, and Applications of Semantics, ODBASE 2015, and Cloud and Trusted Computing, C&TC, held as part of OTM 2015 in October 2015 in Rhodes, Greece.
This book constitutes the refereed proceedings of the Second International Conference on Future Data and Security Engineering, FDSE 2015, held in Ho Chi Minh City, Vietnam, in November 2015.
This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015.
This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015.
This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field.
This book constitutes the refereed proceedings of the 11th International Joint Conference on E-Business and Telecommunications, ICETE 2014, held in Vienna, Austria, in August 2014.
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2015, held Catania, Italy, in October 2015.
This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography.
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Mobile, Secure, and Programmable Networking, MSPN 2015, held in Paris, France, in June 2015.
This bookconstitutes the refereed proceedings of the 16th International Conference onCryptology in India, INDOCRYPT 2015, held in Bangalore, India, in December 2015.
Theinformation infrastructure---comprising computers, embedded devices, networksand software systems---is vital to day-to-day operations in every sector:information and telecommunications, banking and finance, energy, chemicals andhazardous materials, agriculture, food, water, public health, emergencyservices, transportation, postal and shipping, government and defense.
This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015.
This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015.
This book constitutes the refereed proceedings of the 7th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2015, held in Seoul, South Korea, in October 2015.
This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015.
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions.
This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015.
This book constitutes the thoroughly refereedpost-conference proceedings of the 11th International Workshop on RadioFrequency Identification held in New York, USA, in June 2015.
This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.
This book constitutes the refereed proceedings of the 34th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2015, held in Delft, The Netherlands, in September 2014.
This book constitutes the refereed proceedings of 5 workshops co-located with SAFECOMP 2015, the 34th International Conference on Computer Safety, Reliability, and Security, held in Delft, The Netherlands, in September 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014.