This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011.
This book and its companion volume, LNCS 7282 and 7283, constitute the refereed proceedings of the 8th International Conference, EuroHaptics 2012, held in Tampere, Finland, in June 2012.
This book and its companion volume, LNCS 7282 and 7283, constitute the refereed proceedings of the 8th International Conference, EuroHaptics 2012, held in Tampere, Finland, in June 2012.
This book constitutes the refereed proceedings of the 10th International Conference on Pervasive Computing, Pervasive 2012, held in Newcastle, UK, in June 2012.
This book constitutes the refereed proceedings of the 7th International Conference on Theory and Application of Diagrams, Diagrams 2012, held in Canaterbury, UK, in July 2012.
This book constitutes the proceedings of the 7th International Conference on Persuasive Technology, PERSUASIVE 2012, held in Linkoping, Sweden, in June 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST on Auctions, Market Mechanisms and Their Applications (AMMA 2011) held in New York, USA, August 22-23, 2011.
This book constitutes the refereed proceedings of the 13 International Conference on Product-Focused Software Process Improvement, PROFES 2012, held in Madrid, Spain, in June 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management.
This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Broadband Communications, Networks and Systems (BROADNETS 2010) held in October 2010 in Athens, Greece.
This book constitutes the refereed proceedings of the 12th International Conference on Software Process Improvement and Capability Determination, SPICE 2012, held in Palma de Mallorca, Spain, in May 2012.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012).
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011.
This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012, held in Darmstadt, Germany, May 2012.
This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St.
This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011.
This book constitutes the refereed proceedings of the 18th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2012, held in Essen, Germany, in March 2012.
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2011, held in Zanzibar, Tansania, in November 2011.
This book constitutes the refereed proceedings of the 5th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, held in College Park, MD, USA, in April 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference, eHealth 2011, held in Malaga, Spain, in November 2011.
This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011.
This book constitutes the refereed proceedings of the 13th International Conference on Passive and Active Measurement, PAM 2012, held in Vienna, Austria, in March 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrucken, Germany, in March/April 2011, in association with ETAPS 2011.
This book constitutes the thoroughly refereed post-workshop proceedings of 5 workshops, held at the 10th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2011, in Taipei, Taiwan, May 2-6, 2011.
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 12th International Middleware Conference, held in Lisbon, Portugal, in December 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St.
This book constitutes the refereed proceedings of the Third International Conference on Social Robotics, ICSR 2011, held in Amsterdam, The Netherlands, in November 2011.
This book constitutes the refereed proceedings of the Second International Joint Conference on Ambient Intelligence, AmI 2011, held in Amsterdam, The Netherlands, in November 2011.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011.
This book constitutes selected papers from the lectures given at the workshops held in conjunction with the User Modeling, Adaptation and Personalization Conference, UMAP 2011, Girona, Spain, in July 2011.
This book constitutes the refereed proceedings of the 5th International Conference on Informatics in Schools: Situation, Evolution and Perspectives, ISSEP 2011, held in Bratislava, Slovakia, in October 2011.
This book constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, held in Naples, Italy, in September 2011.
This book constitutes the proceedings of the Second International Conference on Security-Enriched Urban Computing and Smart Grid, held in Hualien, Taiwan, in September 2011.
This book constitutes the refereed proceedings of the 8th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2011, held in Hong Kong, China, in September 2011.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOM 2010, held in Cape Town, South Africa, in November 2010.
This book constitutes the proceedings of the 17th Collaboration Researchers' International Working Group Conference on Collaboration and Technology, held in Paraty, Brazil, in October 2011.