This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27-March 1, 2012.
This book constitutes the refereed proceedings of the 12 th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 2012.
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2012.
This volume constitutes the proceedings of the 4th Working Conference on Practice-Driven Research on Enterprise Transformation (PRET), held in Gdansk, Poland, on June 27, 2012, as the industrial track of the 24th International Conference on Advanced Information Systems Engineering (CAiSE 2012).
This book contains the refereed proceedings of the 13th International Conference on Business Process Modeling, Development and Support (BPMDS 2012) and the 17th International Conference on Exploring Modeling Methods for Systems Analysis and Design (EMMSAD 2012), held together with the 24th International Conference on Advanced Information Systems Engineering (CAiSE 2012) in Gdansk, Poland, in June 2012.
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012.
This book constitutes the proceedings of the CAiSE Forum from the 23rd International Conference on Advanced Information Systems Engineering (CAiSE 2011), held in London, UK, June 2011.
The ATOP (Agent-Based Technologies and Applications for Enterprise Interoperability) workshop series focuses on technologies that support interoperability in networked organizations, on successful applications of these technologies, and on lessons learned.
This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012.
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011.
This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011.
This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011.
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011.
This book constitutes the thoroughly refereed post-worksop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues.
The two-volume set LNCS 7044 and 7045 constitutes the refereed proceedings of three confederated international conferences: Cooperative Information Systems (CoopIS 2011), Distributed Objects and Applications - Secure Virtual Infrastructures (DOA-SVI 2011), and Ontologies, DataBases and Applications of SEmantics (ODBASE 2011) held as part of OTM 2011 in October 2011 in Hersonissos on the island of Crete, Greece.
The two-volume set LNCS 7044 and 7045 constitutes the refereed proceedings of three confederated international conferences: Cooperative Information Systems (CoopIS 2011), Distributed Objects and Applications - Secure Virtual Infrastructures (DOA-SVI 2011), and Ontologies, DataBases and Applications of SEmantics (ODBASE 2011) held as part of OTM 2011 in October 2011 in Hersonissos on the island of Crete, Greece.
This book constitutes the thoroughly refereed post-conference proceedings of the 14th Brazilian Symposium on Formal Methods, SBMF 2011, held in Sao Paulo, Brazil, in September 2011; co-located with CBSoft 2011, the second Brazilian Conference on Software: Theory and Practice.
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense.
This book constitutes the refereed proceedings of the 9th International Conference on Service-Oriented Computing, ICSOC 2011, held in Paphos, Cyprus, in December 2011.
This book constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011, held in Leuven, Belgium, in September 2011.
This book constitutes the refereed proceedings of the 15th International Conference on Advances in Databases and Information Systems, ADBIS 2011, held in Vienna, Austria, in September 2011.
This volume constitutes the refereed proceedings of the 3rd International Conference on Advanced Communication and Networking, ACN 2011, held in Brno, Czech Republik, in June 2011.
This book constitutes the refereed proceedings of the 10th International Conference, EGOV 2011, held in Delft, The Netherlands, in August/September 2011.
This book constitutes the refereed proceedings of the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, held in Loutraki, Greece, in June 2011.
This book constitutes the refereed proceedings of the 4th International Conference on Online Communities and Social Computing, OCSC 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011 with 10 other thematically similar conferences.
This two-volume set LNCS 6771 and 6772 constitutes the refereed proceedings of the Symposium on Human Interface 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011 with 10 other thematically similar conferences.
This book contains the refereed proceedings of the 12th International Conference on Business Process Modeling, Development and Support (BPMDS 2011) and the 16th International Conference on Exploring Modeling Methods for Systems Analysis and Design (EMMSAD 2011), held together with the 23rd International Conference on Advanced Information Systems Engineering (CAiSE 2011) in London, UK, in June 2011.
This two-volume set LNCS 6771 and 6772 constitutes the refereed proceedings of the Symposium on Human Interface 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011 with 10 other thematically similar conferences.
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011.
This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Malaga, in June 2011 as a satellite event of IWANN 2011, the International Work-conference on Artificial and Natural Neural Networks.
This book contains the refereed proceedings of the 12th International Conference on Agile Software Development, XP 2011, held in Madrid, Spain, in May 2011.
This book constitutes the thoroughly refereed post-conferenceproceedings of the 13th Brazilian Symposium on Formal Methods, SBMF2010, held in Natal, Brazil, in November 2010.
This book constitutes the refereed proceedings of the 14th International Conference on Fundamental Approaches to Software Engineering, FASE 2011, held in Saarbrucken, Germany, March 26-April 3, 2011, as part of ETAPS 2011, the European Joint Conferences on Theory and Practice of Software.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010.
This book constitutes the postproceedings of the First International Conference on Energy-Efficient Computing and Networking, E-Energy, held in Passau, Germany in April 2010.
Ad hoc networks, which include a variety of autonomous networks for specific purposes, promise a broad range of civilian, commercial, and military applications.