This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ICICS 2008, held in Birmingham, UK, in October 2008.
This book constitutes the refereed proceedings of the Second Western European Workshop on Research in Cryptology, WEWoRC 2007, held in Bochum, Germany, in July 2007 The 12 revised full papers were carefully reviewed and selected from a total of 36 submissions.
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial Cryptography and Data Security, FC 2008, held in Cozumel, Mexico, in January 2008.
This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008.
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008, held in Washington, D.
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008.
This book constitutes the refereed proceedings of the 8th International Algorithmic Number Theory Symposium, ANTS 2008, held in Banff, Canada, in May 2008.
This volume contains the set of revised selected papers presented at the 21st International Conference on Information Networking (ICOIN 2007), which was held in Estoril, Portugal, January 23-25, 2007.
This book constitutes the refereed proceedings of the 9th International Conference on Distributed Computing and Networking, ICDCN 2008 - formerly known as IWDC (International Workshop on Distributed Computing) - held in Kolkata, India, in January 2008.
people volunteer their time and energy and work in a dedicated fashion to pull everything together each year, including our very supportive Steering Comm- tee members led by Sukumar Ghosh.
This volume contains the post-proceedings of the Second International Workshop on Critical Information Infrastructure Security (CRITIS 2007), that was held during October 3-5, 2007 in Benalmadena-Costa (Malaga), Spain, and was hosted by the University of Malaga, Computer Science Department.
These are the proceedings of IPTComm 2008 - the Second Conference on Pr- ciples,Systems andApplications ofIP Telecommunications-heldinHeidelberg, Germany, July 1-2, 2008.
This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences on Cooperative Information Systems (CoopIS 2008), Distributed Objects and Applications (DOA 2008), Grid computing, high performAnce and Distributed Applications (GADA 2008), Information Security (IS 2008), and Ontologies, Databases and Applications of Semantics (ODBASE 2008), held as OTM 2008 in Monterrey, Mexico, in November 2008.
It is a pleasure to welcome you to the proceedings of the second International Castle Meeting on Coding Theory and its Applications, held at La Mota Castle in Medina del Campo.
This book contains the proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2008), held in Turin, Italy on 4-5 September 2008.
This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 28-31, 2007 in Barcelona, Spain.
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), which took place in Cambridge, Massachusetts, USA on September 15-17.