The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.
This book constitutes the refereed proceedings of the 5thInternational Conference on Security, Privacy, and Applied CryptographyEngineering, SPACE 2015, held in Jaipur, India, in October 2015.
Infotext: This book constitutes the refereed proceedings of the 4th European Conference on Service-Oriented and Cloud computing, ESOCC 2015, held in Taormina, Sicily, Italy, in September 2015.
This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014.
This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014.
This handbook covers Electronic Medical Record (EMR) systems, which enable the storage, management, and sharing of massive amounts of demographic, diagnosis, medication, and genomic information.
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers.
This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades.
This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015.
This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in London, UK, in September 2015.
This book constitutes the refereed proceedings of the 8th International Conference on Internet and Distributed Computing Systems, IDCS 2015, held in Windsor, UK, in September 2015.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015.
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015.
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015.
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on E-Voting and Identity, VoteID 2015, held in Bern, Switzerland, in September 2015.
This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security in Latin America, LatinCrypt 2015, held in Guadalajara, Mexico, in August 2015.
This book constitutes the proceedings of the 6th International Conference on Interactive Theorem Proving, ITP 2015, held in Nanjing, China, in August 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014.
This book constitutes the refereed proceedings of the 17 International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2015, held in Edmonton, AB, Canada, in August 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop, COSADE 2015, held in Berlin, Germany, in April 2015.
This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014.
This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015.
This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014.
This book constitutes the thoroughly refereed proceedings of seven international workshops held in Stockholm, Sweden, in conjunction with the 27th International Conference on Advanced Information Systems Engineering, CAiSE 2015, in June 2015.
This book constitutes the refereed proceedings of the International Conference on Future Network Systems and Security, FNSS 2015, held in Paris, France, in June 2015.
This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015.
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining.
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.
This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015.
This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey.
This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held in Lugano, Switzerland, in May 2015.
From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans.
This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014.
This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014.