QUANTUMCOMM 2009--the International Conference on Quantum Communi- tion and Quantum Networking (from satellite to nanoscale)--took place in Vico Equense near Naples, Italy, during October 26-30, 2009.
This book constitutes the refereed proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS 2009, held in Seattle, WA, USA, in August 2009.
This book constitutes the refereed proceedings of the Third International Conference on Pairing-Based Cryptography, Pairing 2009, held in Palo Alto, CA, USA, in August 2009.
This volume contains the papers selected for presentation at the 4th Brazilian Sym- sium on Bioinformatics, BSB 2009, which was held in Porto Alegre, Brazil, during August 29-31, 2009.
This book constitutes the refereed proceedings of the 29th Annual International Cryptology Conference, CRYPTO 2009, held in Santa Barbara, CA, USA in August 2009.
ISDF 2009, the First International Conference on Information Security and Digital Forensics, was held at City University London during September 7-8, 2009.
The First ICST International Workshop on Security in Emerging Wireless Commu- cation and Networking Systems (SEWCN 2009) was held in Athens, Greece, Sept- ber 14, in conjunction with SecureComm 2009.
This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM 2009, the 4th International Workshop on Data Privacy Management, and SETOP 2009, the Second International Workshop on Autonomous and Spontaneous Security, collocated with the ESORICS 2009 symposium in St.
First established in August 1988, the Transaction Processing Performance Council (TPC) has shaped the landscape of modern transaction processing and database benchmarks over two decades.
Since its first edition in 2003, the XML Database Symposium series (XSym) has been a forum for academics, practitioners, users and vendors, allowing all to discuss the use of and synergy between database management systems and XML.
This book constitutes the refereed proceedings of the 21st International Conference on Scientific and Statistical Database Management, SSDBM 2009, held in New Orleans, LA, USA in June 2009.
This book constitutes the thoroughly refereed post-conference proceedings of the Fifth International Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics, CIBB 2008, held in Vietri sul Mare, Italy, in October 2008.
This book constitutes the refereed proceedings of the Fourth International Conference on Rough Sets and Knowledge Technology, RSKT 2009, held in Gold Coast, Australia, in July 2009.
This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009.
This third issue on "e;progress in turbulence"e; is based on the third ITI conference (ITI interdisciplinary turbulence initiative), which took place in Bertinoro, North Italy.
This book constitutes the refereed proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-18, held in Tarragona, Spain, in June 2009.
This book constitutes the thoroughly refereed postproceedings of the 9th International Workshop on Multi-Agent-based Simulation, MABS 2008, held in Estoril, Portugal, in May 2008.
This book constitutes the refereed proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009, held in Cologne, Germany, in April 2009.
This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.
The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within computer security in the Nordic countries - thereby establishing a forum for discussions and co-operation between universities, industry and computer societies.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008.
This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008.
This book constitutes the refereed proceedings of the 8th International Conference on Independent Component Analysis and Signal Separation, ICA 2009, held in Paraty, Brazil, in March 2009.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009.
This book constitutes the thoroughly refereed post-workshop proceedings of the 2008 Pacific Rim Knowledge Acquisition Workshop, PKAW 2008, held in Hanoi, Vietnam, in December 2008 as part of 10th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2008.
This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008.
SSTD 2009 was the 11th in a series of biannual events that discuss new and exciting research in spatio-temporal data management and related technologies.
This volume contains the proceedings of the 13th International Conference on Financial Cryptography and Data Security, held at the Accra Beach Hotel and Resort, Barbados, February 23-26, 2009.