This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy.
This book constitutes the thoroughly refereed proceedings of the 18th International Conference on Transport Systems Telematics, TST 2018, held in Krakow, Poland in March 2018.
This book constitutes the refereed proceedings of the 7th International Conference on Well-Being in the Information Society, WIS 2018, held in Turku, Finland, in August 2018.
As voice interfaces and virtual assistants have moved out of the industry research labs and into the pockets, desktops and living rooms of the general public, a demand for a new kind of user experience (UX) design is emerging.
This book constitutes the proceedings of the Third International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT, held in Auckland, New Zealand, in April 2018.
This book is a critical examination of the philosophical and moral issues in relation to human enhancement and the various related medical developments that are now rapidly moving from the laboratory into the clinical realm.
This book constitutes the refereed proceedings of the First International Conference on Blockchain, ICBC 2018, held as part of the Services Conference Federation, SCF 2018, in Seattle, USA, in June 2018.
This book constitutes the refereed proceedings of the 4th International Conference on Future Network Systems and Security, FNSS 2018, held in Paris, France, in July 2018.
This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018.
This book constitutes the thoroughly refereed proceedings of the third International Conference on Communication Technologies for Ageing Well and e-Health, ICT4AWE 2017, held in Porto, Portugal in April 2017.
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017.
This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018.
This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018.
This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Image Analysis and Recognition, ICIAR 2018, held in Povoa de Varzim, Portugal, in June 2018.
This two-volume set LNCS 10904 and 10905 constitutes the refereed proceedings of the 20th International Conference on Human Interface and the Management of Information, HIMI 2018, held as part of HCI International 2018 in Las Vegas, NV, USA, in July 2018.
This book constitutes the revised and selected papers from the 5th International Workshop on Engineering Multi-Agent Systems held in Sao Paulo, Brazil, in May 2018, in conjunction with AAMAS 2018.
This book constitutes the proceedings of the 6th International Workshop on Symbiotic Interaction, Symbiotic 2017, held in Eindhoven, The Netherlands in December 2017.
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Mobile Networks and Management, MONAMI 2017, held in Melbourne, Australia, in December 2017.
This book examines the fundamental question of how legislators and other rule-makers should handle remembering and forgetting information (especially personally identifiable information) in the digital age.
The essays in this book clarify the technical, legal, ethical, and social aspects of the interaction between eHealth technologies and surveillance practices.
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.
Social information access is defined as a stream of research that explores methods for organizing the past interactions of users in a community in order to provide future users with better access to information.
In 2016, Germany's government presented its third cybersecurity strategy, which aims to strengthen the national cyber defence architecture, cooperation between the state and industry, and individual users' agency.
This book stems from the desire to systematize and put down on paper essential historical facts about the Web, a system that has undoubtedly changed our lives in just a few decades.
Since the discovery of electromagnetic waves less than 150 years ago, the application of wireless communications technology has not only revolutionized our daily lives, but also fundamentally changed the course of world history.
Using both a theoretical argumentation and an empirical investigation, this book rationalizes the view that in order to understand people's privacy perceptions and behaviors, a situational perspective needs to be adopted.
This book constitutes the refereed proceedings of the 13th International Conference on Persuasive Technology, PERSUASIVE 2018, held in Waterloo, ON, Canada, in April 2018.
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.
This book constitutes the refereed proceedings of the Third EAI International Conference on Smart Objects and Technologies for Social Good, GOODTECHS 2017, held in Pisa, Italy, November 29-30, 2017.
This engaging work provides a concise introduction to the exciting world of computing, encompassing the theory, technology, history, and societal impact of computer software and computing devices.
This book constitutes the proceedings of the 19th International Conference on Passive and Active Measurement, PAM 2018, held in Berlin, Germany, in March 2018.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017.
This book constitutes the refereed post-conference proceedings of the 5th European Conference on Information Literacy, ECIL 2017, held in Saint Malo, France, in September 2017.
This book constitutes the refereed proceedings of the 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017, held in Prague, Czech Republic, in October 2017.
This book constitutes the refereed post-conference proceedings of the First International Workshop on Mobility Analytics for Spatio-Temporal and Social Data, MATES 2017, held in Munich, Germany, in September 2017.
This unique text/reference advocates a novel forgetful approach to dealing with personal multimedia content in the long run, which is inspired by the effectiveness of human forgetting as a mechanism for helping us to stay focused on important things.
This book constitutes the refereed post-conference proceedings of the First International Conference on Innovation and Interdisciplinary Solutions for Underserved Areas, InterSol 2017, and the 6th Collogue National sur la Recherche en Informatique et ses Applications (CNRIA), held in Dakar, Senegal, in April 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2017, and the First International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium on Research in Computer Security, ESORICS 2017.
This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017.
This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017.