This book constitutes the thoroughly refereed post-proceedings of the International Conference on Information Networking, ICOIN 2003, held at Cheju Island, Korea in February 2003.
The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange of ideas.
Following the success of the International Symposium on Software Security 2002 (ISSS 2002), held in Keio University, Tokyo, November, 2002, ISSS 2003 was held in the Tokyo Institute of Technology, Tokyo, on November 4-6, 2003.
This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.
This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.
Embedded systems now include a very large proportion of the advanced products designed in the world, spanning transport (avionics, space, automotive, trains), electrical and electronic appliances (cameras, toys, televisions, home appliances, audio systems, and cellular phones), process control (energy production and distribution, factory automation and optimization), telecommunications (satellites, mobile phones and telecom networks), and security (e-commerce, smart cards), etc.
This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel Computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004.
The rapid growth of the Internet and related services is changing the way we work, act, and even think in a manner that far exceeds the prediction set by ?
This volume constitutes the proceedings of REFLECTION 2001, the Third Int- national Conference on Metalevel Architectures and Separation of Crosscutting Concerns, which was held in Kyoto, September 25-28, 2001.
This book constitutes the thoroughly refereed post-proceedings of the 4th International Information Hiding Workshop, IHW 2001, held in Pittsburgh, PA, USA, in April 2001.
This book constitutes the thoroughly refereed post-proceedings of the international conference NetObjectDays 2002, held in Erfurt, Germany, in October 2002.
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 7th Symposium on Recent Advances in Intrusion Detection (RAID 2004), which took place in Sophia-Antipolis, French Riviera, France, September 15-17, 2004.
The increasing complexity of systems and the growing uncertainty in their operational environments have created a critical need to develop systems able to improve their operation, adapt to change, and recover from failures autonomously.
Started by small group of well known scientists with the aim of sharing knowledge, experiences, and results on all aspects of cluster computing, the initiative of a workshop on cluster computing received more attention after IFIP WG 10.
Crypto 2001, the 21st Annual Crypto conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara.
UbiComp 2003, the 5th Annual Conference on Ubiquitous Computing, is the premier forum for presentation of research results in all areas relating to the - sign, implementation, deployment and evaluation of ubiquitous computing te- nologies.
This volume of the LNCS series contains the proceedings of the 5th Internat- nal Working Conference on Active Networks (IWAN 2003) held in the ancient cultural city of Kyoto, Japan.
Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara.
This book constitutes the refereed proceedings of the Third International Conference on Embedded Software, EMSOFT 2003, held in Philadelphia, PA, USA in October 2003.
This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Open Hypermedia Systems, OHS-6, and the 2nd International Workshop on Structural Computing, SC-2, held at the 11th ACM Conference on Hypertext and Hypermedia in San Antonio, Texas, USA in May/June 2000.