This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Web and Internet Economics, WINE 2016, held in Montreal, QC, Canada, in December 2016.
This book constitutes the refereed proceedings of three workshops heldat the 20th International Conference on Financial Cryptography and DataSecurity, FC 2016, in Christ Church, Barbados, in February 2016.
This book constitutes the refereed proceedings of the Second International Multidisciplinary Social Networks Conference, MISNC 2015, held in Matsuyama, Japan, in September 2015.
This book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Security, FC 2015, in San Juan, Puerto Rico, in January 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014.
This book constitutes the refereed proceedings of the 2014 Multidisciplinary International Social Networks Research, MISNC 2014, held in Kaohsiung, Taiwan, in September 2014.
This book contains the thoroughly refereed and revised best papers from the 9th International Conference on Web Information Systems and Technologies, WEBIST 2013, held in Aachen, Germany, in May 2013, organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), and co-organized by the RWTH Aachen University.
This book constitutes the refereed proceedings of the 7th International Symposium on Algorithmic Game Theory, SAGT 2014, held in Haifa, Israel, in October 2014.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2014, held in Delhi, India, in September 2013.
This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014.
This book constitutes the refereed proceedings of the 16th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2013, held in Dunedin, New Zealand, in December 2013.
This book constitutes the thoroughly refereed conference proceedings of the 9th International Conference on Web and Internet Economics, WINE 2013, held in Cambridge, MA, USA, in December 2013.
This book constitutes the proceedings of the 6th International Symposium on Algorithmic Game Theory, SAGT 2013, held in Aachen, Germany, in October 2013.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013.
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013.
This book constitutes the refereed proceedings of the 10 th International Conference on Mobile Web Information Systems, MobiWIS 2013, held in Paphos, Cyprus, in August 2013.
This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St.
This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2012, held in October 2012 in Lafayette, Indiana, USA.
This book constitutes the refereed proceedings of the 14th International Conference on Electronic Commerce and Web Technologies (EC-Web) held in Prague, Czech Republic, in August 2013.
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013.
This book constitutes the refereed proceedings of the 15th International Conference on Electronic Commerce, ICEC 2013, held in Turku, Finland, in August 2013.
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on User Modeling, Adaption, and Personalization, held in Rome, Italy, in June 2013.
This volume contains 11 thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce.
This book constitutes the refereed post-proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2012, held in Heraklion, Crete, Greece, in July 2012.
This book constitutes the proceedings of the 6th International Workshop on Enterprise Applications and Services in the Finance Industry, FinanceCom 2012, held in Barcelona, Spain, on June 10, 2012.
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013.
This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences.
This book contains the thoroughly refereed and revised best papers from the 8th International Conference on Web Information Systems and Technologies, WEBIST 2012, held in Porto, Portugal, in April 2012, and organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), in collaboration with ACM SIGMIS.
This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on Agents and Data Mining Interaction, ADMI 2012, held in Valencia, Spain, in June 2012.
This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Game Theory for Networks (GameNets 2012) held in Vancouver, Canada, May 24-26, 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire.
This book constitutes the refereed proceedings of the two workshops held at the 14th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2011, held in Wollongong, Australia, in November.
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland.
This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012.
This volume contains 9 thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce.
This book constitutes the proceedings of the 7th Mediterranean Conference on Information Systems, MCIS 2012, held in Guimaraes, Portugal, in September 2012.
This book constitutes the refereed proceedings of the 7th Security Research Conference, Future Security 2012, held in Bonn, Germany, in September 2012.
The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012.
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012.
This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012.