This book contains the thoroughly refereed post-conference proceedings of the 14th Information Hiding Conference, IH 2012, held in Berkeley, CA, USA, in May 2012.
This book constitutes revised papers of the proceedings of the 7th International Workshop on System Analysis and Modeling, SAM 2012, held in Innsbruck, Austria, in October 2012.
This book constitutes the proceedings of the 5th International IFIP Working Conference on Enterprise Interoperability (IWEI 2013), held in Enschede, The Netherlands, during March 27-28, 2013.
This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013.
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Game Theory for Networks (GameNets 2012) held in Vancouver, Canada, May 24-26, 2012.
This book constitutes the revised selected papers of the 9th International Symposium on Formal Aspects of Component Software, FACS 2012, held in Mountain View, CA, USA in September 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire.
This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, UK, in April 2012.
This book constitutes the refereed proceedings of the 5th International Workshop on Multiple Access Communications, MACOM 2012, held in Maynooth, Ireland, in November 2012.
This volume constitutes the refereed proceedings of the International Conferences, BSBT, MulGraB and IUrC 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Gangneung, Korea, in December 2012.
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland.
This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012.
Proceedings of the 2012 International Conference on Information Technology and Software Engineering presents selected articles from this major event, which was held in Beijing, December 8-10, 2012.
This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012.
This book constitutes the refereed proceedings of the four workshops that were organized in conjunction with the International Conference on Business Information Systems, BIS 2012, which took place in Vilnius, Lithuania, May 21-23, 2012.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011.
This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012.
Proceedings of the 2012 International Conference on Information Technology and Software Engineering presents selected articles from this major event, which was held in Beijing, December 8-10, 2012.
Proceedings of the 2012 International Conference on Information Technology and Software Engineering presents selected articles from this major event, which was held in Beijing, December 8-10, 2012.
The two volume set LNCS 7439 and 7440 comprises the proceedings of the 12th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2012, as well as some workshop papers of the CDCN 2012 workshop which was held in conjunction with this conference.
This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012.
This book constitutes the conference proceedings of the 10th International Conference on Service-Oriented Computing, ICSOC 2012, held in Shanghai, China in November 2012.
This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012.
This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012.
This book constitutes the refereed proceedings of the 15th Brazilian Symposium on Formal Methods, SBMF 2012, held in Natal, Brazil, in September 2012; co-located with CBSoft 2012, the Third Brazilian Conference on Software: Theory and Practice.
This book constitutes the refereed proceedings of the Third International Conference on Information Computing and Applications, ICICA 2012, held in Chengde, China, in September 2012.
This book constitutes the revised selected papers of the 4th International Provenance and Annotation Workshop, IPAW 2012, held in Santa Barbara, CA, USA, in June 2012.
This book constitutes a collection of selected contributions from the 11th International Conference on Perspectives in Business Informatics Research, BIR 2012, held in Nizhny Novgorod, Russia, in September 2012.
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012.
This volume contains 9 thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce.
This book constitutes the proceedings of the 7th Mediterranean Conference on Information Systems, MCIS 2012, held in Guimaraes, Portugal, in September 2012.
This book constitutes the proceedings of the 4th workshop on Business Process Model and Notation, BPMN 2012, held in Vienna, Austria, in September 2012.
The two volume set LNCS 7439 and 7440 comprises the proceedings of the 12th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2012, as well as some workshop papers of the CDCN 2012 workshop which was held in conjunction with this conference.
This book constitutes the thoroughly refereed proceedings of the 16th East-European Conference on Advances in Databases and Information Systems (ADBIS 2012), held in Poznan, Poland, in September 2012.
This book constitutes the thoroughly refereed conference proceedings of the 5th International Workshop on Business Intelligence for the Real-Time Enterprise, BIRTE 2011, held in Seattle, WA, USA, in September 2011, in conjunction with VLDB 2011, the International Conference on Very Large Data Bases.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Energy Efficient Data Centers (E2DC 2012) held in Madrid, Spain, in May 2012.
This book constitutes the refereed proceedings of the 15th International Conference on Model Driven Engineering Languages and Systems, MODELS 2012, held in Innsbruck, Austria, in September/October 2012.
This book constitutes the refereed proceedings of the European Design Science Symposium, EDSS 2011, held in Leixlip, Ireland, in October 2011 held in conjunction with the Intel European Research and Innovation Conference, ERIC 2011.
This book constitutes the refereed proceedings of the 2nd International Conference on Model and Data Engineering, MEDI 2012, held in Poitiers, France, in October 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC, USA, in March 2012.
The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012.