This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial Cryptography and Data Security, FC 2008, held in Cozumel, Mexico, in January 2008.
This book constitutes the thoroughly refereed post-conference proceedings of the Second IFIP TC 2 Central and East Conference on Software Engineering Techniques, CEE-SET 2007, held in Poznan, Poland, in October 2007.
This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008.
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008, held in Washington, D.
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008.
This book constitutes the refereed proceedings of the 8th International Algorithmic Number Theory Symposium, ANTS 2008, held in Banff, Canada, in May 2008.
The postcolonial compendium aims at a compilation and brief explication of key terms used in the multidisciplinary field of forced migration and refugee studies.
This volume contains the post-proceedings of the Second International Workshop on Critical Information Infrastructure Security (CRITIS 2007), that was held during October 3-5, 2007 in Benalmadena-Costa (Malaga), Spain, and was hosted by the University of Malaga, Computer Science Department.
These are the proceedings of IPTComm 2008 - the Second Conference on Pr- ciples,Systems andApplications ofIP Telecommunications-heldinHeidelberg, Germany, July 1-2, 2008.
It is a pleasure to welcome you to the proceedings of the second International Castle Meeting on Coding Theory and its Applications, held at La Mota Castle in Medina del Campo.
The Visual Information Systems International Conference series is designed to provide a forum for researchers and practitioners from diverse areas of computing including computer vision, databases, human-computer interaction, information security, image processing, information visualization and mining, as well as knowledge and information management to exchange ideas, discuss challenges, present their latest results and to advance research and development in the construction and application of visual information systems.
This book contains the proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2008), held in Turin, Italy on 4-5 September 2008.
This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 28-31, 2007 in Barcelona, Spain.
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), which took place in Cambridge, Massachusetts, USA on September 15-17.
This book is a compilation of the best papers presented at the 2024 edition of the Singapore Conference of Applied Psychology (SCAP) and the Malaysia Conference on Applied Psychology (MCAP), led by East Asia Research in Singapore in collaboration with the Singapore University of Technology and Design, Charles Sturt University in Australia, and Monash University Malaysia.
This volume contains the best papers presented at the 12th East-European Conference on Advances in Databases and Information Systems (ADBIS 2008) held during S- tember 5-9, 2008, in Pori, Finland.