This volume contains a record of some of the lectures and seminars delivered at the Second International School on Engineering Trustworthy Software Systems (SETSS 2016), held in March/April 2016 at Southwest University in Chongqing, China.
This book constitutes the refereed proceedings of the 12th International Conference on Persuasive Technology, PERSUASIVE 2017, held in Amsterdam, The Netherlands, in April 2017.
This Brief presents the overarching framework in which each nation is developing its own cyber-security policy, and the unique position adopted by France.
This book constitutes the thoroughly refereed post-conference proceedings of the First IFIP TC 3 International Conference on Stakeholders and Information Technology in Education, SaITE 2016, held in Guimaraes, Portugal, in July 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016.
This book constitutes the proceedings of the 23rd International Working Conference on Requirements Engineering - Foundation for Software Quality, REFSQ 2017, held in Essen, Germany, in February/March 2017.
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016.
This book constitutes the thoroughly refereed conference proceedings of the First International Joint Conference on Electronic Voting, E-Vote-ID 2016, held in Bregenz, Austria, in October 2016.
This book constitutes revised selected papers from the 4th European Conference on Information Literacy, ECIL 2016, held in Prague, Czech Republic, in October 2016.
This book constitutes the proceedings of the 9th International Workshop on Multiple Access Communications, MACOM 2016, held in Aalborg, Denmark, in November 2016.
This book constitutes the refereed proceedings of the 11th International Conference on Global Security, Safety and Sustainability, ICGS3 2017, held in London, UK, in January, 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Serious Games, Interaction and Simulation, SGAMES 2016, held in Porto, Portugal, in June 2016.
This book constitutes revised, selected, and invited papers from the 4th International Workshop on Engineering Multi-Agent Systems, EMAS 2016, held in Singapore, in May 2016, in conjunction with AAMAS.
This book constitutes the refereed proceedings of the First International Conference on Digital Transformation and Global Society, DTGS 2016, held in St.
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Transport Systems Telematics, TST 2016, held in Katowice-Ustron, Poland, in March 2016.
This book constitutes the refereed proceedings of the Third International Conference on Security Standardisation Research, SSR 2016, held in Gaithersburg, MD, USA, in December 2016.
This book constitutes the proceedings of the 17th International Conference on Product-Focused Software Process Improvement, PROFES 2016, held in Trondheim, Norway, in November 2016.
This LNCS double volume LNCS 10069-10070 constitutes the refereed proceedings of the 10th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2016, which includes the International Work Conference on Ambient Assisted Living (IWAAL), and the International Conference on Am-bient Intelligence for Health (AmIHEALTH), held in Las Palmas de Gran Canaria, Spain, in November/December 2016.
This LNCS double volume LNCS 10069-10070 constitutes the refereed proceedings of the 10th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2016, which includes the International Work Conference on Ambient Assisted Living (IWAAL), and the International Conference on Am-bient Intelligence for Health (AmIHEALTH), held in Las Palmas de Gran Canaria, Spain, in November/December 2016.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense.
This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016.
This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016.
The essays in this book clarify the technical, legal, ethical, and social aspects of the interaction between eHealth technologies and surveillance practices.
This book constitutes the refereed proceedings of the Second International Conference on Future Network Systems and Security, FNSS 2016, held in Paris, France, in November 2016.
This book constitutes the proceedings of the 16th International Conference on Intelligent Virtual Agents, IVA 2016, held in Los Angeles, CA, USA, in September 2016.
This book constitutes the refereed proceedings of the 8th International Conference on Social Robotics, ICSR 2016, held in Kansas City, MO, USA, in November 2016.
This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016.
This volume presents analyses of data protection systems and of 26 jurisdictions with data protection legislation in Africa, as well as additional selected countries without comprehensive data protection laws.
This book constitutes the refereed proceedings of the 9th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2016, held in Munster, Germany, in October 2015.
This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016.
This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in September 2016.
This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016.
This book constitutes the proceedings of the Second Joint International Conference on Serious Games, JCSG 2016, held in Brisbane, QLD, Australia, in September 2016.
The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.
The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.
This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2016, held in Dubrovnik, Croatia in September 2016 under the sponsorship of the UNESCO chair in Data Privacy.
This book constitutes the proceedings of the 14th International Conference on Business Process Management, BPM 2016, held in Rio de Janeiro, Brazil, in September 2016.