This book constitutes revised selected papers from the 12th International Conference on Critical Information Infrastructures Security, CRITIS 201, held in Lucca, Italy, in October 2017.
This book constitutes the refereed proceedings of the 33rd IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2018, held in Valencia, Spain, in September 2018 under the sponsorship of the UNESCO Chair in Data Privacy.
This book constitutes the refereed proceedings of the 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018.
ADVANCES IN DIGITAL FORENSICS XIVEdited by: Gilbert Peterson and Sujeet ShenoiDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.
This book constitutes the thoroughly refereed proceedings of the 9th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2017, held in Lagos, Nigeria, in December 2017.
This book constitutes the refereed proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2018, held in Regensburg, Germany, in September 2018 in conjunction with DEXA 2018.
This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2018, held in Regensburg, Germany, in September 2018.
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy.
This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy.
This book constitutes the thoroughly refereed proceedings of the 18th International Conference on Transport Systems Telematics, TST 2018, held in Krakow, Poland in March 2018.
This book constitutes the refereed proceedings of the 7th International Conference on Well-Being in the Information Society, WIS 2018, held in Turku, Finland, in August 2018.
As voice interfaces and virtual assistants have moved out of the industry research labs and into the pockets, desktops and living rooms of the general public, a demand for a new kind of user experience (UX) design is emerging.
This book constitutes the proceedings of the Third International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT, held in Auckland, New Zealand, in April 2018.
This book is a critical examination of the philosophical and moral issues in relation to human enhancement and the various related medical developments that are now rapidly moving from the laboratory into the clinical realm.
This book constitutes the refereed proceedings of the First International Conference on Blockchain, ICBC 2018, held as part of the Services Conference Federation, SCF 2018, in Seattle, USA, in June 2018.
This book constitutes the refereed proceedings of the 4th International Conference on Future Network Systems and Security, FNSS 2018, held in Paris, France, in July 2018.
This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018.
This book constitutes the thoroughly refereed proceedings of the third International Conference on Communication Technologies for Ageing Well and e-Health, ICT4AWE 2017, held in Porto, Portugal in April 2017.
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017.
This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018.
This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018.
This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Image Analysis and Recognition, ICIAR 2018, held in Povoa de Varzim, Portugal, in June 2018.
This two-volume set LNCS 10904 and 10905 constitutes the refereed proceedings of the 20th International Conference on Human Interface and the Management of Information, HIMI 2018, held as part of HCI International 2018 in Las Vegas, NV, USA, in July 2018.
This book constitutes the revised and selected papers from the 5th International Workshop on Engineering Multi-Agent Systems held in Sao Paulo, Brazil, in May 2018, in conjunction with AAMAS 2018.
This book constitutes the proceedings of the 6th International Workshop on Symbiotic Interaction, Symbiotic 2017, held in Eindhoven, The Netherlands in December 2017.
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Mobile Networks and Management, MONAMI 2017, held in Melbourne, Australia, in December 2017.
This book examines the fundamental question of how legislators and other rule-makers should handle remembering and forgetting information (especially personally identifiable information) in the digital age.
The essays in this book clarify the technical, legal, ethical, and social aspects of the interaction between eHealth technologies and surveillance practices.
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.
Social information access is defined as a stream of research that explores methods for organizing the past interactions of users in a community in order to provide future users with better access to information.
In 2016, Germany's government presented its third cybersecurity strategy, which aims to strengthen the national cyber defence architecture, cooperation between the state and industry, and individual users' agency.