This book is a machine-generated literature overview of the legal and ethical debates over privacy and data protection measures in the last three decades, showcasing the expectations vis-à-vis realities of their presence and application in different sectors.
This book provides an overview of software security analysis in a DevOps cycle including requirements formalisation, verification and continuous monitoring.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book is a machine-generated literature overview of the legal and ethical debates over privacy and data protection measures in the last three decades, showcasing the expectations vis-à-vis realities of their presence and application in different sectors.
The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023.
This book constitutes the refereed proceedings of two long-running events held along with the CAiSE conference and related to the areas of enterprise, business-process and information systems modeling: - the 26th International Conference on Business Process Modeling, Development and Support, BPMDS 2025 and - the 30th International Conference on Exploring Modeling Methods for Systems Analysis and Development, EMMSAD 2025.
This book constitutes the proceedings of the 20th International Conference on Grid, Cloud, and Cluster Computing, GCC 2024, the Third International Conference on Quantum Technologies, ICEQT 2024, and the 21st International Conference on Modeling, Simulation and Visualization Methods, MSV 2024, held as part of the 2024 World Congress in Computer Science, Computer Engineering and Applied Computing, in Las Vegas, USA, during July 22 to July 25, 2024.
This book is the 1st volume of proceedings of the 1st Smart Nuclear Power Technology Forum and the 8th China Nuclear Power Plant Digital Technology and Application Seminar held in Shenzhen, China in June 2024.
The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023.
This book is the 2nd volume of proceedings of the 1st Smart Nuclear Power Technology Forum and the 8th China Nuclear Power Plant Digital Technology and Application Seminar held in Shenzhen, China in June 2024.
This book constitutes the proceedings of the 28th International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2024, and the 23rd International Conference on Information and Knowledge Engineering, IKE 2024, held as part of the 2024 World Congress in Computer Science, Computer Engineering and Applied Computing, in Las Vegas, USA, during July 22 to July 25, 2024.
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 37th International Conference on Advanced Information Systems Engineering, CAiSE 2025, which was held in Vienna, Austria, during June 16-20, 2025.
This book explores the complex domain of personal data valuation, uncovering how individuals perceive the worth of their privacy in an era dominated by digital information exchange.
The two-volume set LNBIP 547 + LNBIP 548 constitutes the proceedings of the 19th International Conference on Research Challenges in Information Sciences, RCIS 2025, which took place in Seville, Spain, in May 2025.
This two-volume set LNCS 15263 and LNCS 15264 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
This two-volume set LNCS 15263 and LNCS 15264 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book offers a comprehensive dive into the rapidly evolving world of autonomous vehicles and their pivotal role in modern data collection and mission-critical operations.
This Festschrift, dedicated to Wolfgang Reif on the occasion of his 65th birthday, collects contributions written by many of his closest research colleagues and many of his former students.
This book constitutes the referred proceedings of the 7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024, held as an hybrid event, in Hangzhou, China, during December 13–14, 2024.
In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management.
This book describes the landscape of cloud computing from first principles, leading the reader step-by-step through the process of building and configuring a cloud environment.
Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression.
When you first hear the term Information Assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it.
In this book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes.
The current rapid development in both computing power and the ability to present and mine complex data sets in useful ways provides the backdrop to Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime.
The safe operation of computer systems continues to be a key issue in many applications where people, environment, investment, or goodwill can be at risk.
Recent and well-publicised disasters have highlighted the fact that organisations of all kinds - from healthcare to aerospace - are critically dependent on Information Technology systems.