You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates. The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and post-quantum cryptography.
This dissertation thesis presents an approach enabling the modelling and quality-of-service prediction of event-based systems at the architecture-level. Applying a two-step model refinement transformation, the approach integrates platform-specific performance influences of the underlying middleware while enabling the use of different existing analytical and simulation-based prediction techniques.
This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Information Security in Fiction and in Fact".
This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Collaborating with the Enemy".
This book constitutes the thoroughly refereed post-conference proceedings of the first International Workshop on Quality of Context, QuaCon 2009, held in Stuttgart, Germany, in June 2009. The 11 revised papers presented were carefully reviewed and selected from 19 submissions and included in the volume together with 5 invited papers. Discussed are interdisciplinary approaches to context quality, such as models for degradation and consistency of context data, spatial ontologies and spatial data mining, trust in context data, methods and calculi for context quality assessment, frameworks and metrics for context quality, uncertainty in sensor data processing, quality-aware algorithms for context management, quality-aware event and stream processing, uncertainty in reasoning on context data, application-specific context quality and case studies, and visualization of context quality.
This book constitutes the refereed proceedings of the Third IFIP-TC6 Networking Conference, NETWORKING 2004, held in Athens, Greece, in May 2004. The 103 revised full papers and 40 revised short papers were carefully reviewed and selected from 539 submissions. The papers are organized in topical sections on network security; TCP performance; ad-hoc networks; wavelength management; multicast; wireless network performance; inter-domain routing; packet classification and scheduling; services and monitoring; admission control; competition in networks; 3G/4G wireless systems; MPLS and related technologies; flow and congestion control; performance of IEEE 802.11; optical networks; TCP and congestion; key management; authentication and DOS prevention; energy aspects of wireless networks; optical network access; routing in ad-hoc networks; fault detection, restoration, and tolerance; QoS metrics, algorithms, and architecture; content distribution, caching, and replication; and routing theory and path computation.
This two-volume set LNCS 4805/4806 constitutes the refereed proceedings of 10 international workshops and papers of the OTM Academy Doctoral Consortium held as part of OTM 2007 in Vilamoura, Portugal, in November 2007. The 126 revised full papers presented were carefully reviewed and selected from a total of 241 submissions to the workshops. The first volume begins with 23 additional revised short or poster papers of the OTM 2007 main conferences.
This book constitutes the refereed proceedings of the 4th International IFIP-TC6 Networking Conference, NETWORKING 2005, held in Waterloo, Canada in May 2005. The 105 revised full papers and 36 posters were carefully reviewed and selected from 430 submissions. The papers are organized in topical sections on peer-to-peer networks, Internet protocols, wireless security, network security, wireless performance, network service support, network modeling and simulation, wireless LAN, optical networks, Internet performance and Web applications, ad-hoc networks, adaptive networks, radio resource management, Internet routing, queuing models, monitoring, network management, sensor networks, overlay multicast, QoS, wirless scheduling, multicast traffic management and engineering, mobility management, bandwith management, DCMA, and wireless resource management.
The volume LNCS 12287 constitutes the proceedings of the 27th International Workshop on Security Protocols, held in Cambridge, UK, in April 2019. The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was “Security Protocols for Humans" The topics covered included Designing for Humans and Understanding Humans, Human Limitations in Security, Secure sharing and collaboration and much more.
This book asks several critical questions relevant to those interested in public policy: What is a nudge? What are the ethical implications of and justifications for nudges? Are we able to have nudges without affecting one’s freedom to choose? In what institutional context are nudges likely to work well and in what context are they likely to fail? The text explores several real-world instances of government attempts at successful choice architecture across a wide range of policy topics: internet privacy laws, environmental policy, education policy, the sharing economy, and creating a national culture. This approach also highlights the spontaneous and evolutionary nature of social instituti...