This book constitutes revised selected papers from the14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015,held in Tokyo, Japan, in October 2015.
Thisbook constitutes the refereed proceedings of the 11th Pacific Asia Workshop onIntelligence and Security Informatics, PAISI 2016, held in Auckland, NewZealand, in April 2016 in conjunction with PAKDD 2016, the 20th Pacific-AsiaConference on Knowledge Discovery and Data Mining.
This bookconstitutes revised selected papers from the 9th International Conference onCritical Information Infrastructures Security, CRITIS 2014, held in Limassol,Cyprus, in October 2014.
This book constitutes therefereed proceedings of the 11th International Conference on PersuasiveTechnology, PERSUASIVE 2016, held in Salzburg, Austria, in April 2016.
This book constitutes the thoroughly refereedpost-conference proceedings of the Third Annual Privacy Forum, APF 2015, heldin Luxembourg, Luxembourg, in October 2015.
This book constitutes the thoroughly refereed post-conferenceproceedings of the 9th International Conference on Passwords, PASSWORDS2015, held in Cambridge, UK, in December 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015.
Computing devices havebecome ever more present in our everyday environments, however embedding thesetechnologies into our routines has remained a challenge.
This bookconstitutes the refereed proceedings of the 12th International Conference andSchool of Network Science, NetSci-X 2016, held in Wroclaw, Poland, in January2016.
This textbook raises thought-provoking questions regarding our rapidly-evolving computing technologies, highlighting the need for a strong ethical framework in our computer science education.
This volume constitutes the proceedings of the5th International Conference on Serious Games, Interaction, andSimulation, held in Novedrate, Italy, in September 2015.
This book constitutes the proceedings of the 7thInternational Conference on Mobile Computing, Applications, and Services(MobiCASE 2015) held in Berlin, Germany, in November 2015.
Thisvolume constitutes the thoroughly refereed post-conference proceedings of the11th International Conference on Security and Privacy in CommunicationNetworks, SecureComm 2015, held in Dallas, TX, USA, in October 2015.
This bookconstitutes the refereed proceedings of the Second International Symposium onCyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015.
This bookconstitutes the refereed proceedings of the Third European Conference onInformation Literacy, ECIL 2015, held in Tallinn, Estonia, in October 2015.
This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015.
This book constitutes the thoroughly refereedproceedings of the 4th International Conference on Smart Cities and Green ICTSystems, SMARTGREENS 2015, and the 1st InternationalConference on Vehicle Technology and Intelligent Transport Systems, VEHITS2015, held in Lisbon, Portugal, in May 2015.
This book constitutes the thoroughly refereedproceedings of the International Conference on Communication Technologies forAgeing Well and e-Health, ICT4AgeingWell 2015, held in Lisbon, Portugal, in May2015.
This bookconstitutes revised selected papers from the First International Conference onInformation Systems Security and Privacy, ICISSP 2015, held in Angers, France,in February 2015.
This book constitutes the refereed proceedings of the SecondInternational Conference on Internet of Vehicles, IOV 2015, held inChengdu, China, in December 2015.
This book constitutes the refereed proceedings of the 6thInternational Conference on E-Democracy, E-Democracy 2015, held in Athens,Greece, in December 2015.
This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China.
This book constitutes the refereed proceedings of the 16th International Conference on Product-Focused Software Process Improvement, PROFES 2015, held in Bolzano, Italy, in December 2015.
This volume constitutes the refereed proceedings of the 8th International Conference on Multimedia Communications, Services and Security, MCSS 2015, held in Krakow, Poland, in November 2015.
This book constitutes the refereed proceedings of the 9th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2015, held in Puerto Varas, Chile, in December 2015.
This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015.
This book constitutes the refereed proceedings of the 12th European Conference on Ambient Intelligence, AmI 2015, held in Athens, Greece, in November 2015.
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2015, held Catania, Italy, in October 2015.
Theinformation infrastructure---comprising computers, embedded devices, networksand software systems---is vital to day-to-day operations in every sector:information and telecommunications, banking and finance, energy, chemicals andhazardous materials, agriculture, food, water, public health, emergencyservices, transportation, postal and shipping, government and defense.
This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015.
This book constitutes the refereed proceedings of the 7th International Conference on Social Robotics, ICSR 2015, held in Paris, France, in October 2015.
This book constitutes the refereed proceedings of the 7th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2015, held in Seoul, South Korea, in October 2015.
This book constitutes the refereed proceedings of the 8th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2015, held in Ljubljana, Slovenia, in September/October 2015.
This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015.
This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015.
This book constitutes the proceedings of the 15th International Conference on Transport Systems Telematics, TST 2015, held in Wroclaw, Poland, in April 2015.
This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014.
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.
This book constitutes the refereed proceedings of the 8th International Workshop on Multiple Access Communications, MACOM 2015, held in Helsinki, Finland, in September 2015.
This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015.