The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015.
This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015.
This book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Security, FC 2015, in San Juan, Puerto Rico, in January 2015.
The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015.
The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014.
This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, in London, UK, in April 2015.
This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015.
This book constitutes the refereed conference proceedings of the 12th International Conference on Service-Oriented Computing, ICSOC 2014, held in Paris, France, in November 2014.
This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, UK, in March 2010.
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014.
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014.
This book constitutes the refereed proceedings of the First International Workshop on Process-Aware Systems, PAS 2014, held in Shanghai, China, in October 2014.
This book contains the thoroughly refereed and revised best papers from the 9th International Conference on Web Information Systems and Technologies, WEBIST 2013, held in Aachen, Germany, in May 2013, organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), and co-organized by the RWTH Aachen University.
This book constitutes the proceedings of the 10th International Workshop on Enterprise and Organizational Modeling and Simulation, EOMAS 2014, held in conjunction with CAiSE 2014 in Thessaloniki, Greece, in June 2014.
This book contains the refereed proceedings of the 15th International Conference on Business Process Modeling, Development and Support (BPMDS 2014) and the 19th International Conference on Exploring Modeling Methods for Systems Analysis and Design (EMMSAD 2014), held together with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014) in Thessaloniki, Greece, in June 2014.
This book constitutes the revised selected papers of the combined workshops on Web Information Systems Engineering, WISE 2013, held in Nanjing, China, in October 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Energy Efficient Data Centers, E2DC 2013, held in Berkeley, CA, USA, in May 2013; co-located with SIGCOMM e-Energy 2013.
This book constitutes the proceedings of the 6th International Workshop on Traffic Monitoring and Analysis, TMA 2014, held in London, UK, in April 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013.
This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013).
This two-volume set of CCIS 391 and CCIS 392 constitutes the refereed proceedings of the Fourth International Conference on Information Computing and Applications, ICICA 2013, held in Singapore, in August 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on Trustworthy Global Computing, TGC 2012, held in Newcastle upon Tyne, UK, in September 2012.
This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014.
This two-volume set of CCIS 391 and CCIS 392 constitutes the refereed proceedings of the Fourth International Conference on Information Computing and Applications, ICICA 2013, held in Singapore, in August 2013.
This book constitutes the refereed proceedings of the 11th International Conference on Service-Oriented Computing, ICSOC 2012, held in Berlin, Germany, in December 2013.
This book contains the proceedings of the five high-quality workshops organized at the Second European Conference on Service-Oriented and Cloud Computing, ESOCC 2013, held in Malaga, Spain, in September 2013.
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013.
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013.
This book constitutes the refereed proceedings of the four workshops that were organized in conjunction with the International Conference on Business Information Systems, BIS 2013, which took place in Poznan, Poland, in June 2013.
This book constitutes the refereed proceedings of the 16th International Conference on Model Driven Engineering Languages and Systems, MODELS 2013, held in Miami, FL, USA, in September/October 2013.
This book constitutes the proceedings of the 9th International Workshop on Enterprise and Organizational Modeling and Simulation, EOMAS 2013, held in conjunction with CAiSE 2013 in Valencia, Spain, in June 2013.
This book constitutes the refereed proceedings of the Third International Conference on Model and Data Engineering, MEDI 2013, held in Amantea, Calabria, Italy, in September 2013.
This book contains extended and revised versions of a set of selected papers from two workshops organized by the Euro Working Group on Decision Support Systems (EWG-DSS), which were held in Liverpool, UK, and Vilnius, Lithuania, in April and July 2012.
This book constitutes the proceedings of the 6th Euro Symposium on Systems Analysis and Design, SIGSAND/PLAIS 2013, held in Gdansk, Poland, in September 2013.
This book constitutes a collection of selected contributions from the 12th International Conference on Perspectives in Business Informatics Research, BIR 2013, held in Warsaw, Poland, in September 2013.
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013.
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013.
This book constitutes the refereed proceedings of the Second European Conference on Service-Oriented and Cloud Computing, ESOCC 2013, held in Malaga, Spain, in September 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012.