This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016.
This book constitutes the revised selected papers from the 11th International Conference on Risk and Security of Internet and Systems, CRISIS 2016, held in Roscoff, France, in September 2016.
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016.
This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016.
This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016.
This book constitutes the refereed post-conference proceedings of the 8th International Conference on Mobile Networks and Management, MONAMI 2016, held in Abu Dhabi, United Arab Emirates, in October 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial Networks and Intelligent Systems, INISCOM 2016 held in Leicester, UK, October 31 - November 1, 2016.
This book constitutes the refereed post-conference proceedings of the 21st Iberoamerican Congress on Pattern Recognition, CIARP 2016, held in Lima, Peru, in November 2016.
This book constitutes the thoroughly refereed conference proceedings of the First International Joint Conference on Electronic Voting, E-Vote-ID 2016, held in Bregenz, Austria, in October 2016.
This book constitutes revised selected papers from the 4th European Conference on Information Literacy, ECIL 2016, held in Prague, Czech Republic, in October 2016.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017.
This book constitutes the proceedings of the First International Conference on Smart Computing and Communication, SmartCom 2016, held in Shenzhen, China, in December 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in October 2016.
Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints.
This book constitutes the refereed proceedings of the First International Conference on Future Intelligent Vehicular Technologies, Future 5V 2016, held in Porto, Portugal, in September 2016.
This book constitutes the proceedings of the 8th International Conference on Ad Hoc Networks, ADHOCNETS 2016, held in Ottawa, Canada, September 26-17, 2016.
This book constitutes the refereed proceedings of the 11th International Conference on Global Security, Safety and Sustainability, ICGS3 2017, held in London, UK, in January, 2017.
The two volume set LNCS 10072 and LNCS 10073 constitutes the refereed proceedings of the 12th International Symposium on Visual Computing, ISVC 2016, held in Las Vegas, NV, USA in December 2016.
The two volume set LNCS 10072 and LNCS 10073 constitutes the refereed proceedings of the 12th International Symposium on Visual Computing, ISVC 2016, held in Las Vegas, NV, USA in December 2016.
This book constitutes the proceedings of the 13th International Conference on Distributed Computing and Internet Technology, ICDCIT 2017, held in Bhubaneswar, India, in January 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in June 2016.
This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016.
This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016.
This book constitutes the refereed proceedings of the International Summit on Applications for Future Internet, AFI 2016, held in Puebla, Mexico, in May 2016.
This book constitutes the refereed proceedings of the 11th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2016, held in Hangzhou, China, in June 2016.
This book constitutes the refereed proceedings of the 16th International Conference on Innovations for Community Services, I4CS 2016, held in Vienna, Austria, in June 2016.
This book constitutes the refereed proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016, held in Hyderabad, India, in December 2016.
This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held in Tacoma, WA, USA, in August 2016.
This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016.
This book constitutes the refereed proceedings of the 9th International Conference on on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016.
This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and Privacy for Big Data, TrustData 2016; the 6th International Symposium on Trust, Security and Privacy for Emerging Applications, TSP 2016; the 4th International Workshop on Network Optimization and Performance Evaluation, NOPE 2016; the Second International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys 2016; the Annual Big Data Security, Privacy and Trust Workshop, BigDataSPT 2016; and the First International Workshop on Cloud Storage Service and Computing, WCSSC 2016.
This book constitutes the refereed proceedings of the Third International Conference on Security Standardisation Research, SSR 2016, held in Gaithersburg, MD, USA, in December 2016.
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.
This book constitutes the refereed proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2016, held in Lyon, France, in November 2016.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense.
This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016.
This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016.
This volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2016, Ontologies, Databases, and Applications of Semantics, ODBASE 2016, and Cloud and Trusted Computing, C&TC, held as part of OTM 2016 in October 2016 in Rhodes, Greece.
This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016, held in Can Tho City, Vietnam, in November 2016.