You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings from the 20th Tyrrhenian Workshop on Digital Communications, held September 2009 in Pula, Sardinia, Italy and focused on the "Internet of Things."
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009. The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.
A number of recent studies of mobile wireless communication devices focus on use values, social implications, changing norms and ethics, conversation strategies and culture-dependent domestication. De Vries proposes to venture into a more historical and comparative direction to shed light on our preoccupation with them in the first place. He constructs an expanded archaeological view of the development, marketing, and reception of communication technologies over the past 200 years, providing a comprehensive account of how persistent paradoxical desires for sublime communication have come to gi.
Radio frequency identification (RFID) is a fascinating, fast developing and multidisciplinary domain with emerging technologies and applications. It is characterized by a variety of research topics, analytical methods, models, protocols, design principles and processing software. With a relatively large range of applications, RFID enjoys extensive investor confidence and is poised for growth. A number of RFID applications proposed or already used in technical and scientific fields are described in this book. Sustainable Radio Frequency Identification Solutions comprises 19 chapters written by RFID experts from all over the world. In investigating RFID solutions experts reveal some of the real-life issues and challenges in implementing RFID.
Explaining how ubiquitous computing is rapidly changing our private and professional lives, Ethical IT Innovation: A Value-Based System Design Approach stands at the intersection of computer science, philosophy, and management and integrates theories and frameworks from all three domains.The book explores the latest thinking on computer ethics, inc
Virtually all organisations collect, use, process and share personal data from their employees, customers and/or citizens. In doing so, they may be exposing themselves to risks, from threats and vulnerabilities, of that data being breached or compromised by negligent or wayward employees, hackers, the police, intelligence agencies or third-party service providers. A recent study by the Ponemon Institute found that 70 per cent of organisations surveyed had suffered a data breach in the previous year. Privacy impact assessment is a tool, a process, a methodology to identify, assess, mitigate or avoid privacy risks and, in collaboration with stakeholders, to identify solutions. Contributors to ...
With the growth in our reliance on information systems and computer science, information modeling and knowledge bases have become a focus for academic attention and research. The amount and complexity of information, the number of levels of abstraction and the size of databases and knowledge bases all continue to increase, and new challenges and problems arise every day. This book is part of the series Information Modelling and Knowledge Bases, which concentrates on a variety of themes such as the design and specification of information systems, software engineering and knowledge and process management. Attention is also paid to theoretical disciplines including cognitive science, artificial...
The four-volume set LNCS 3480-3483 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2005, held in Singapore in May 2005. The four volumes present a total of 540 papers selected from around 2700 submissions. The papers span the whole range of computational science, comprising advanced applications in virtually all sciences making use of computational techniques as well as foundations, techniques, and methodologies from computer science and mathematics, such as high performance computing and communication, networking, optimization, information systems and technologies, scientific visualization, graphics, image processing, data analysis, simulation and modelling, software systems, algorithms, security, multimedia etc.
Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be b...
Clemens Holzmann investigates the role of spatial contexts for autonomous embedded systems. The author presents concepts for recognizing, representing, and reasoning about qualitative spatial relations and their changes over time, as well as an appropriate architecture which has prototypically been implemented in a flexible software framework. His results show that the proposed concepts are suitable for developing spatially aware applications and that qualitatively abstracted relations can constitute an adequate basis for this purpose.