This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Smart Card Research and Advanced Applications, CARDIS 2019, held in Prague, Czech Republic, in November 2019.
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Information & Operational Technology (IT & OT) security systems, IOSec 2019 , the First International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the First International Workshop on Security for Financial Critical Infrastructures and Services, FINSEC 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019.
This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First International Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the Second International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019.
This book analyzes the security of critical infrastructures such as road, rail, water, health, and electricity networks that are vital for a nation's society and economy, and assesses the resilience of these networks to intentional attacks.
This Springer brief provides the necessary foundations to understand differential privacy and describes practical algorithms enforcing this concept for the publication of real-time statistics based on sensitive data.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Security for Information Technology and Communications, SecITC 2019, held in Bucharest, Romania, in November 2019.
This book constitutes revised selected papers from the 22nd International Conference on Information Security and Cryptology, ICISC 2019, held in Seoul, South Korea, in December 2019.
This book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019.
This book tells the story of government-sponsored wiretapping in Britain and the United States from the rise of telephony in the 1870s until the terrorist attacks of 9/11.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019.
This practical and accessible textbook/reference describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice.
This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2019, held in Shenzhen, China, in November 2019.
This book constitutes the revised selected papers of the 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, held in Linkoping, Sweden, in September 2019.
This book constitutes the refereed proceedings of the 8th International Conference on E-Democracy, E-Democracy 2019, held in Athens, Greece, in December 2019.
The two volumes LNCS 11982 and 11983 constitute the proceedings of the 11th International Symposium on Cyberspace Safety and Security, CSS 2019, held in Guangzhou, China, in December 2019.
This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019.
This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field.
Earth at Risk in the 21st Century offers critical interdisciplinary reflections on peace, security, gender relations, migration and the environment, all of which are threatened by climate change, with women and children affected most.
This book constitutes the proceedings of the 6th International Conference on the Internet of Vehicles, IOV 2019, which took place in Kaohsiung, Taiwan, in November 2019.
The two volumes LNCS 11982 and 11983 constitute the proceedings of the 11th International Symposium on Cyberspace Safety and Security, CSS 2019, held in Guangzhou, China, in December 2019.
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019.
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019.
This book constitutes the proceedings of the 16th International Conference on Distributed Computing and Internet Technology, ICDCIT 2020, held in Bhubaneswar, India, in January 2020.
This book constitutes the proceedings of the 15th International Conference on Information Systems Security, ICISS 2019, held in Hyderabad, India, in December 2019.
This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019.
This book provides a detailed "e;how-to"e; guide, addressing aspects ranging from analysis and design to the implementation of applications, which need to be integrated within legacy applications and databases.
This book constitutes the refereed proceedings of the 9th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2019, held in Gandhinagar, India, in December 2019.
This book constitutes the proceedings of the 6th International Conference on Future Data and Security Engineering, FDSE 2019, held in Nha Trang City, Vietnam, in November 2019.
This book addresses the key security challenges in the big data centric computing and network systems, and discusses how to tackle them using a mix of conventional and state-of-the-art techniques.
This book constitutes revised papers from the 6th International Workshop on Graphical Models for Security, GraMSec 2019, held in Hoboken, NJ, USA, in June 2019.
This two-volume set LNICST 301 -302 constitutes the post-conference proceedings of the Third EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2019, held in Nanjing, China, in September 2019.
This book constitutes the refereed proceedings of the First International Conference on Intelligent Cloud Computing, ICC 2019, held in Riyadh, Saudi Arabia, in December 2019.
This book presents refereed proceedings of the First International Conference on Algebra, Codes and Cryptology, A2C 2019, held in Dakar, Senegal, in December 2019.
This book presents an overview of the latest smart transportation systems, IoV connectivity frameworks, issues of security and safety in VANETs, future developments in the IoV, technical solutions to address key challenges, and other related topics.
The two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019.
The two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019.
This book constitutes the refereed proceedings of the 22nd International Conference on Distributed and Computer and Communication Networks, DCCN 2019, held in Moscow, Russia, in September 2019.
This book constitutes revised papers from the nine workshops and one accompanying event which took place at the 22nd International Conference on Business Information Systems, BIS 2019, held in Seville, Spain, in June 2019.
This book constitutes the refereed proceedings of the 20th International Conference on Cryptology in India, INDOCRYPT 2019, held in Hyderabad, India, in December 2019.
This book constitutes the refereed proceedings of the 11th International Conference on Intelligent Data Processing, IDP 2016, held in Barcelona, Spain, in October 2016.
This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019.
This book constitutes the refereed proceedings of the 24th Nordic Conference on Secure IT Systems, NordSec 2019, held in Aalborg, Denmark, in November 2019.
This book constitutes the refereed proceedings of the 8th International Conference on Computational Data and Social Networks, CSoNet 2019, held in Ho Chi Minh City, Vietnam, in November 2019.
This book constitutes the refereed proceedings of the 15th International Joint Conference on E-Business and Telecommunications, ICETE 2018, held in Porto, Portugal, in July 2018.
This book constitutes the refereed post-conference proceedings of the Third EAI International Conference on Innovations and Interdisciplinary Solutions for Underserved Areas, InterSol 2019, and the 8th Conference on Research in Computer Science and its Applications, CNRIA 2019, held in Saint-Louis, Senegal, in April 2019.