This book constitutes the refereed proceedings of the 4th International Conference on Serious Games Development and Applications, SGDA 2013, held in Trondheim, Norway, in September 2013.
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012.
This book constitutes the refereed proceedings of the 10 th International Conference on Mobile Web Information Systems, MobiWIS 2013, held in Paphos, Cyprus, in August 2013.
This book constitutes the proceedings of the 19th Collaboration Researchers' International Working Group Conference on Collaboration and Technology, held in Wellington, New Zealand, in October/November 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012.
This book constitutes the refereed post-proceedings of the 7th International Workshop on Information Search, Integration and Personalization, ISIP 2012, held in Sapporo, Japan, in October 2012.
This book constitutes the refereed proceedings of the Second Joint International Conference on Electronic Government and the Information Systems Perspective, and Electronic Democracy, EGOVIS/EDEM 2013, held in Prague, Czech Republic, in August 2013, in conjunction with DEXA 2013.
This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2012, held in October 2012 in Lafayette, Indiana, USA.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013.
This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013.
The five-volume set LNCS 8004--8008 constitutes the refereed proceedings of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, NV, USA in July 2013.
The five-volume set LNCS 8004--8008 constitutes the refereed proceedings of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, NV, USA in July 2013.
This book constitutes the refereed proceedings of the 14th International Conference on Product-Focused Software Process Improvement, PROFES 2013, held in Paphos, Cyprus, in June 2013.
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, China, in August 2013 in conjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013).
This volume constitutes the refereed proceedings of the 6th International Conference on Multimedia Communications, Services and Security, MCSS 2013, held in Krakow, Poland, in June 2013.
This book constitutes the refereed proceedings of the 6th International Conference on Hybrid Learning, ICHL 2013, held in Toronto, ON, Canada, in August 2013.
This book constitutes the refereed proceedings of the Fourth International Symposium on End-User Development, IS-EUD 2013, held in Copenhagen, Denmark, in June 2013.
The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions.
This book constitutes the refereed proceedings of the Third International Conference on Wireless Mobile Communication and Healthcare, MobiHealth 2012, and of the two workshops: Workshop on Advances in Personalized Healthcare Services, Wearable Mobile Monitoring, and Social Media Pervasive Technologies (APHS 2012), and Workshop on Advances in Wireless Physical Layer Communications for Emerging Healthcare Applications (IWAWPLC 2012), all held in Paris, France, in November 2012.
This book constitutes the thoroughly refereed proceedings of the Second International Conference, GreeNets 2012, held in Gaudia, Spain, in October 2012.
This book constitutes the refereed proceedings of the 8th International Conference on Persuasive Technology, PERSUASIVE 2013, held in Sydney, NSW, Australia, in April 2013.
This book constitutes the refereed proceedings of the international competition aimed at the evaluation and assessment of Ambient Assisted Living, EvAAL 2012, which was organized in three major events: the Second International Competition on Indoor Localization and Tracking for Ambient Assisted Living, which took place in Madrid, Spain, in July 2012, the First International Competition on Activity Recognition for Ambient Assisted Living, which took place in Valencia, Spain, in July 2012, and the Final Workshop, which was held in Eindhoven, The Netherlands, in September 2012.
This book constitutes the proceedings of the 6th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, SBP 2013, held in Washington, DC, USA in April 2013.
This book constitutes the thoroughly refereed post-workshop proceedings of the First IAPR TC3 Workshop on Pattern Recognition of Social Signals in Human-Computer-Interaction (MPRSS2012), held in Tsukuba, Japan in November 2012, in collaboration with the NLGD Festival of Games.
This is the second part of the two-volume set (LNCS 8023-8024) that constitutes the refereed proceedings of the 5th International Conference on Cross-Cultural Design, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences.
This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences.
This book constitutes the thoroughly refereed post-conference proceedings of the Fourth International Conference on Mobile Computing, Applications, and Services (MobiCASE 2012) held in Seattle, Washington, USA, in October 2012.
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013.
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire.
This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, UK, in April 2012.
This book constitutes the refereed proceedings of the two workshops held at the 14th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2011, held in Wollongong, Australia, in November.
This book constitutes the thoroughly reviewed joint post-conference proceedings of two international workshops on Coordination, Organization, Institutions and Norms in Agent Systems, COIN@AAMAS 2011, held in Taipei, Taiwan in May 2011 and COIN@WI-IAT 2011, held in Lyon, France in August 2011.
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland.
This book constitutes the refereed proceedings of the third International Joint Conference an Ambient Intelligence, AmI 2012, held in Pisa, Italy, in November 2012.
This book constitutes the refereed proceedings of the 6th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2012, held in Vitoria-Gasteiz, Spain, in December 2012.
This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012.
This book constitutes the refereed proceedings of the 4th International Conference on Human-Centered Software Engineering, HCSE 2012, held in Toulouse, France, in October 2012.
This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012.