This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Image Analysis and Recognition, ICIAR 2016, held in Povoa de Varzim, Portugal, in July 2016.
This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016.
This book constitutes the proceedings of the 15th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2016, held in Lille, France in July 2016.
This book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First Workshop on the Security of Cyber Physical Systems, WOS-CPS 2015, held in Vienna, Austria, in September 2015 in conjunction with ESORICS 2015, the 20th annual European Symposium on Research in Computer Security.
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.
This book reports on the results of an interdisciplinary and multidisciplinary workshop on provenance that brought together researchers and practitioners from different areas such as archival science, law, information science, computing, forensics and visual analytics that work at the frontiers of new knowledge on provenance.
This book constitutes the thoroughly refereed proceedings of five international workshops held in Ljubljana, Slovenia, in conjunction with the 28th International Conference on Advanced Information Systems Engineering, CAiSE 2016, in June 2016.
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK.
This book constitutes the proceedings of the 4th International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2016, held as part of the 18th International Conference on Human-Computer Interaction, HCII 2016, held in Toronto, ON, Canada, in July 2016 and received a total of 4354 submissions, of which 1287 papers were accepted for publication after a careful reviewing process.
This book constitutes the thoroughly refereed proceedings of the 23rd International Conference on Computer Networks, CN 2016, held in Brunow, Poland, in June 2016.
This book constitutes the proceedings of the 6th International Conference on Cloud Computing, CloudComp 2015, held in Daejeon, South Korea, in October 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015.
This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017.
This book constitutes the refereed proceedings of the FirstInternational Conference on Reliability, Safety, and Security of RailwaySystems, RSSRail 2016, held in Paris, France, in June 2016.
This book constitutes the refereed proceedings of the 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2016, held in Ghent, Belgium, in May/June 2016.
This book constitutesrevised selected papers from the 10th International Conference on CriticalInformation Infrastructures Security, CRITIS 2015, held in Berlin, Germany, inOctober 2015.
This book describes the design, development, and testing of a novel digital watermarking technique for color images using Magic Square and Ridgelet transforms.
This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security - IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romania.
This book collectsarticles presented at the 13th International Conference on Information Technology- New Generations,April, 2016, in Las Vegas, NV USA.
The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications.
This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general.
This book constitutes revised selected papers from the14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015,held in Tokyo, Japan, in October 2015.
This book constitutes the thoroughly refereedpost-workshop proceedings of the 16th International Workshop on InformationSecurity Applications, WISA 2015, held on Jeju Island, Korea, in August 2015.
Thisbook constitutes the refereed proceedings of the 11th Pacific Asia Workshop onIntelligence and Security Informatics, PAISI 2016, held in Auckland, NewZealand, in April 2016 in conjunction with PAKDD 2016, the 20th Pacific-AsiaConference on Knowledge Discovery and Data Mining.
This book constitutes the thoroughly refereedpost-conference proceedings of the 10th International Conference on Risks andSecurity of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island,Greece, in July 2015.
This bookconstitutes revised selected papers from the 9th International Conference onCritical Information Infrastructures Security, CRITIS 2014, held in Limassol,Cyprus, in October 2014.
This bookconstitutes the thoroughly refereed proceedings of the 8th International Conference on theTheory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2016,held in Fes, Morooco, in April 2016.
This book constitutes the thoroughly refereedpost-conference proceedings of the Third Annual Privacy Forum, APF 2015, heldin Luxembourg, Luxembourg, in October 2015.
This bookcontains revised selected papers from the 22nd International Conference onSelected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada inAugust 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Smart Card Research and Advanced Applications, CARDIS 2015, held in Bochum, Germany, in November 2015.