This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 3rd International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Computer Security (ESORICS 2014).
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015.
The ever increasing use of computers, networks and the Internet has led to the need for regulation in the fields of cybercrime, cybersecurity and national security.
This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2014, held in Istanbul, Turkey, in September 2014.
This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, held in Florianopolis, Brazil, in September 2014.
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014.
This book constitutes the refereed proceedings of the 16th International Conference on Passive and Active Measurement, PAM 2015, held in New York, NY, USA, in March 2015.
This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues.
This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014.
This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Internet Technology, ICDCIT 2015, held in Bhubaneswar, India, in February 2015.
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.
This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2013, held in September 2013 in Moscow, Russia.
This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014.
This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014.
This SpringerBrief explores graphical password systems and examines novel drawing-based methods in terms of security, usability, and human computer-interactions.
This book constitutes the thoroughly refereed proceedings of the 6th International Conference on Ad Hoc Networks, ADHOCNETS 2014, held in Rhodes, Greece, in August 2014.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Wired/Wireless Internet Communication, WWIC 2014, held in Paris, France, during May 27-28, 2014.
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, in December 2014.
Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments, this volume focuses on congestion in systems where safety and security are at stake, devoting special attention to applying game theoretic analysis of congestion to: protocols in wired and wireless networks; power generation, air transportation and emergency department overcrowding.
This book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014.
This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications.
This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014.
This book constitutes the thoroughly refereed, selected papers on the Second Cyber Security and Privacy EU Forum, CSP 2014, held in Athens, Greece, in May 2014.
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012.
This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014.
This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013.
This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography Engineering held in Pune, India, in October 2014.
This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014.
This book constitutes the refereed proceedings of the 16 International Symposium on Stabilization, Safety and Security of Distributed Systems, SSS 2013, held in Osaka, Japan, in September/October 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Security, Privacy and Trust in a Digital World, e-Democracy 2013, held in Athens, Greece, December 2013.
This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014.