The two volumes set LNCS 10913-10914 of SCSM 2018 constitutes the proceedings of the 10th International Conference on Social Computing and Social Media, SCSM 2018, held as part of the International Conference on Human-Computer Interaction, HCII 2018, held in Las Vegas, NV, USA, in July 2018.
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Mobile Networks and Management, MONAMI 2017, held in Melbourne, Australia, in December 2017.
This book constitutes the proceedings of the 14th International Symposium on Functional and Logic Programming, FLOPS 2018, held in Nagoya, Japan, in May 2018.
This book examines the fundamental question of how legislators and other rule-makers should handle remembering and forgetting information (especially personally identifiable information) in the digital age.
The essays in this book clarify the technical, legal, ethical, and social aspects of the interaction between eHealth technologies and surveillance practices.
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.
This book constitutes the refereed proceedings of the 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018, held in Marrakesh, Morocco, in May 2018.
Social information access is defined as a stream of research that explores methods for organizing the past interactions of users in a community in order to provide future users with better access to information.
In 2016, Germany's government presented its third cybersecurity strategy, which aims to strengthen the national cyber defence architecture, cooperation between the state and industry, and individual users' agency.
This book stems from the desire to systematize and put down on paper essential historical facts about the Web, a system that has undoubtedly changed our lives in just a few decades.
Since the discovery of electromagnetic waves less than 150 years ago, the application of wireless communications technology has not only revolutionized our daily lives, but also fundamentally changed the course of world history.
Using both a theoretical argumentation and an empirical investigation, this book rationalizes the view that in order to understand people's privacy perceptions and behaviors, a situational perspective needs to be adopted.
This book constitutes the refereed proceedings of the 13th International Conference on Persuasive Technology, PERSUASIVE 2018, held in Waterloo, ON, Canada, in April 2018.
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.
This book constitutes the proceedings of the 13th International Conference on Transforming Digital Worlds, iConference 2018, held in Sheffield, UK, in March 2018.
This book constitutes the refereed proceedings of the Third International Conference on Love and Sex with Robots, LSR 2017, held in December 2017, in London, UK.
This book constitutes the refereed proceedings of the Third EAI International Conference on Smart Objects and Technologies for Social Good, GOODTECHS 2017, held in Pisa, Italy, November 29-30, 2017.
This engaging work provides a concise introduction to the exciting world of computing, encompassing the theory, technology, history, and societal impact of computer software and computing devices.
This book constitutes the revised selected papers from the 12th International Conference on Risk and Security of Internet and Systems, CRISIS 2017, held in Dinard, France, in September 2017.
This book constitutes the refereed post-conference proceedings of the First International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2017, held in Warsaw, Poland, in September 2017.
The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018.
The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018.
This book constitutes the proceedings of the 19th International Conference on Passive and Active Measurement, PAM 2018, held in Berlin, Germany, in March 2018.
This book constitutes revised selected papers from the 10th International Symposium on Foundations and Practice of Security, FPS 2017, held in Nancy, France in October 2017.
The idea of this volume originated from the need to have a book for students to support their training with several tutorials on different aspects of RV.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017.
This book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017.
This book constitutes revised selected papers from the five workshops collocated with the 15th International Conference on Software Engineering and Formal Methods, SEFM 2017.
This book constitutes the refereed post-conference proceedings of the 5th European Conference on Information Literacy, ECIL 2017, held in Saint Malo, France, in September 2017.
This book is a guide for managers, Scrum Masters and agile coaches who are interested in agile organizational methods and who are planning to introduce Scrum at their own company.
Adopting a student-centered approach, this book anticipates and addresses the common challenges that students face when learning abstract concepts like limits, continuity, and inequalities.
This book constitutes the refereed proceedings of the 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017, held in Prague, Czech Republic, in October 2017.
This book constitutes the refereed post-conference proceedings of the First International Workshop on Mobility Analytics for Spatio-Temporal and Social Data, MATES 2017, held in Munich, Germany, in September 2017.
This unique text/reference advocates a novel forgetful approach to dealing with personal multimedia content in the long run, which is inspired by the effectiveness of human forgetting as a mechanism for helping us to stay focused on important things.
This book constitutes the refereed post-conference proceedings of the First International Conference on Innovation and Interdisciplinary Solutions for Underserved Areas, InterSol 2017, and the 6th Collogue National sur la Recherche en Informatique et ses Applications (CNRIA), held in Dakar, Senegal, in April 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2017, and the First International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium on Research in Computer Security, ESORICS 2017.
This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017.
This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017.
This book constitutes the proceedings of the 14th International Conference on Distributed Computing and Internet Technology, ICDCIT 2018, held in Bhubaneswar, India, in January 2018.
This volume constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2017, held in Heidelberg, Germany, in July 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Personal Analytics and Privacy, PAP 2017, held in Skopje, Macedonia, in September 2017.
This book constitutes the refereed proceedings of the 10th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2017, held in Helsinki, Finland, in November 2017.
This book constitutes the post-conference proceedings of the 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016, held in Paris, France, in October 2016.
The three volume proceedings LNAI 10534 - 10536 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2017, held in Skopje, Macedonia, in September 2017.