This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC 2008, held in Oslo, Norway, in June 2008, co-located with UIC 2008, the 5th International Conference on Ubiquitous Intelligence and Computing.
This volume contains the proceedings of UIC 2008, the 5th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces.
Theseproceedingscontainthepapersofthe3rdEuropeanWorkshoponSecurity and Privacy in Ad Hoc and Sensor Networks (ESAS 2006), which was held in Hamburg, Germany, September 20-21, 2006, in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006).
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.
This book constitutes the refereed proceedings of the 6th International Conference on Wired/Wireless Internet Communications, WWIC 2008, held in Tampere, Finland, in May 2008.
This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008.
VI realm between distributed computing and networking, namely, Modeling Biological Networks, Network Security, Algorithmic Issues in Wireless Sensor Networks, and Optical Networking.
It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4-7, 2006.
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences.
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous.
This book discusses the application of digital twin (DT) in condition monitoring of offshore and onshore wind turbines, including a pertinent framework to explain critical component Condition Monitoring and Fault Diagnosis.
This book discusses the application of digital twin (DT) in condition monitoring of offshore and onshore wind turbines, including a pertinent framework to explain critical component Condition Monitoring and Fault Diagnosis.
This book constitutes the refereed proceedings of the 21st International Conference on Information Systems Security, ICISS 2025, held in Indore, India, during December 16–20, 2025.
This book constitutes the refereed proceedings of the 21st International Conference on Information Systems Security, ICISS 2025, held in Indore, India, during December 16–20, 2025.
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines.
Explore the integration of nanotechnology with artificial intelligence (AI) and the Internet of Things (IoT), focusing on advancements, applications, and future prospects in the field.
This book constitutes the joint refereed proceedings of the 16th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2016, and the 9th Conference on Internet of Things and Smart Spaces, ruSMART 2016, held in St.
Explore the integration of nanotechnology with artificial intelligence (AI) and the Internet of Things (IoT), focusing on advancements, applications, and future prospects in the field.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Global Security, Safety, and Sustainability (ICDS3), and of the 4th e-Democracy Joint Conferences (e-Democracy 2011) which were held in Thessaloniki in August 2011.
Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants.
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.