This book constitutes the thoroughly refereed post-conference proceedings of the Second IFIP TC 2 Central and East-European Conference on Software Engineering Techniques, CEE-SET 2008, held in Brno, Czech Republic, in October 2008.
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, held in Beijing, China, in July 2011.
This book constitutes the thoroughly refereed proceedings of ten international workshops held in London, UK, in conjunction with the 23rd International Conference on Advanced Information Systems Engineering, CAiSE 2011, in June 2011.
This book constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Dakar, Senegal, in July 2011.
This book contains the refereed proceedings of the 14th International Conference on Business Information Systems, BIS 2011, held in Poznan, Poland, in June 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011.
This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011.
This book contains the refereed proceedings of the Second International Conference on Software Business (ICSOB) held in Brussels, Belgium, in June 2011.
This book constitutes the refereed proceedings of the International Conference on Ergonomics and Health Aspects of Work with Computers, EHAWC 2011, held within the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011, incorporating 12 thematically similar conferences.
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information Infrastructure Security, CRITIS 2010, held in Athens, Greece in September 2010.
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.
This book constitutes the refereed proceedings of the 17th International Symposium on Formal Methods, FM 2011, held in Limerick, Ireland, in June 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010.
This book constitutes the refereed proceedings of the Third International Symposium on End-User Development, IS-EUD 2011, held in Torre Canne, Italy, in June 2011.
This book constitutes the refereed proceedings of the 7th European Conference on Modelling Foundations and Applications, held in Birmingham, UK, in June 2011.
This book constitutes the refereed proceedings of the International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, PSDML 2010, held in Barcelona, Spain, in September 2010.
This book constitutes the joint refereed proceedings of the 5th International Frontiers of Algorithmics Workshop, FAW 2011, and the 7th International Conference on Algorithmic Aspects in Information and Management, AAIM 2011, jointly held in Jinhua, China, in May 2011.
This book constitutes the refereed proceedings of the 11th International Conference on Software Process Improvement and Capability Determination, SPICE 2011, held in Dublin, Ireland, in May/June 2011.
This book constitutes the refereed proceedings of the Third International Conference on Wireless, Mobile Networks and Applications, WiMoA 2011, and the First International Conference on Computer Science, Engineering and Applications, ICCSEA 2011, held in Dubai, United Arab Emirates, in May 2011.
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
This book presents a comprehensive documentation of the scientific outcome of 14 satellite events held at the 13th International Conference on Model-Driven Engineering, Languages and Systems, MODELS 2010, held in Oslo, Norway, in October 2010.
This book constitutes the proceedings of the Third International Workshop on Traffic Monitoring and Analysis, TMA 2011, held in Vienna, Austria, on April 27, 2011 - co-located with EW 2011, the 17th European Wireless Conference.
This book constitutes the thoroughly refereed post-workshop proceedings of nine international workshops held in Hoboken, NJ, USA, in conjunction with the 8th International Conference on Business Process Management, BPM 2010, in September 2010.
This book constitutes the refereed proceedings of the 17th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2011, held in Essen, Germany, in March 2011.
The two-volume set LNCS 6640 and 6641 constitutes the refereed proceedings of the 10th International IFIP TC 6 Networking Conference held in Valencia, Spain, in May 2011.
The two-volume set LNCS 6640 and 6641 constitutes the refereed proceedings of the 10th International IFIP TC 6 Networking Conference held in Valencia, Spain, in May 2011.
This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlands, in May 2011.
This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011.
This book constitutes the proceedings of the Third International IFIP Working Conference on Enterprise Interoperability (IWEI 2011) , held in Stockholm, Sweden, March 23-24, 2011.
This volume constitutes the proceedings of the 5th International Conference on E-Technologies, MCETECH 2011, held in Les Diablerets, Switzerland, January 23-26, 2011.
This book contains substantially extended and revised versions of the best papers from the 12th International Conference on Enterprise Information Systems (ICEIS 2010), held in Funchal, Madeira, Portugal, June 8-12, 2010.
This book constitutes the joint refereed proceedings of the Third International Workshop on Communication Technologies for Vehicles, Nets4Cars 2011and the First International Workshop on Communication Technologies for Vehicles in the Railway Transportation, Nets4Trains 2011, held in Oberpfaffenhofen, Germany, in March 2011.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010.
This book constitutes the refereed proceedings of two workshops held in conjunction with the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, in Crete, Greece, in June 2011.
This book constitutes the refereed proceedings of the 4th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, held in College Park, MD, USA, March 29-31, 2011.
This book constitutes the refereed proceedings of the 12th International Conference on Passive and Active Measurement, PAM 2011, held in Atlanta, GA, USA, in March 2011.
This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on Web Services and Formal Methods, WS-FM 2010, held in Hoboken, NJ, USA, in September 2010.
This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2010, held October 4-6, 2010 in Abu Dhabi, United Arab Emirates.
This book constitutes the joint post-proceedings of four topical workshops heldas satellite meetings of the 8th International Conference on service-orientedcomputing, ICSOC 2010, held in San Francisco, CA, USA in December 2010.
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011.
The increasing costs of creating and maintaining infrastructures for delivering services to consumers have led to the emergence of cloud based third party service providers renting networks, computation power, storage, and even entire software application suites.
This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010.