You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.
Applications of information hiding are fundamental to copyright protection of images, data, passport control, CDs, videos and more. This book offers the latest research and successful applications of advanced artificial intelligence paradigms in data hiding.
This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA 2011, held in Jeju Island, Korea, in August 2011. The 21 revised full papers presented were carefully reviewed and selected from 74 submissions. The workshop serves as a forum for new results from the academic research community as well as from the industry; the papers are focusing on all technical and practical aspects of cryptographic and non-cryptographic security applications.
The purpose of the 13th International Conference on Computer and Information Science (SNPD 2012) held on August 8-10, 2012 in Kyoto, Japan was to bring together researchers and scientists, businessmen and entrepreneurs, teachers and students to discuss the numerous fields of computer science, and to share ideas and information in a meaningful way. Our conference officers selected the best 17 papers from those papers accepted for presentation at the conference in order to publish them in this volume. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rounds of rigorous review. The conference organizers selected 17 outstanding papers from SNPD 2012, all of which you will find in this volume of Springer’s Studies in Computational Intelligence.
This book constitutes the proceedings of the 18th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2019, held in Trondheim, Norway, in September 2019. The total of 61 full and 4 short papers presented in this volume were carefully reviewed and selected from 138 submissions. The papers were organized in topical sections named: e-business; big data analytics, open science and open data; artificial intelligence and internet of things; smart cities and smart homes, social media and analytics; digital governance; digital divide and social inclusion; learning and education; security in digital environments; modelling and managing the digital enterprise; digital innovation and business transformation; and online communities.
This book constitutes the thoroughly refereed postproceedings of the Second International Workshop on Digital Watermarking, IWDW 2003, held in Seoul, Korea, in October 2004. The 44 revised full papers presented together with 4 invited articles were carefully selected during two rounds of reviewing and improvement from more than 90 submissions. The papers address all current aspects of digital watermarking, in particular theoretical modeling, robustness, capacity, imperceptibility and the human perceptual system, security and attacks, watermarking systems and implementations, and integration of digital watermarking in digital rights management.
Welcome to the proceedings of the 2010 International Conference on u- and e-Service, Science and Technology (UNESST 2010) – one of the partnering events of the Second International Mega-Conference on Future Generation Information Te- nology (FGIT 2010). UNESST brings together researchers from academia and industry as well as prac- tioners to share ideas, problems and solutions relating to the multifaceted aspects of u- and e-services and their applications, with links to computational sciences, mat- matics and information technology. In total, 1,630 papers were submitted to FGIT 2010 from 30 countries, which - cludes 223 papers submitted to UNESST 2010. The submitted papers went through a ...
This comprehensive Commentary provides the first fully up-to-date analysis and interpretation of the Council of Europe Convention on Action against Trafficking in Human Beings. It offers a concise yet thorough article-by-article guide to the Convention’s anti-trafficking standards and corresponding human rights obligations.
This book constitutes the refereed conference proceedings of the 13th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2014, held in Sanya, China, in November 2014. The 32 revised full papers presented were carefully reviewed and selected from 42 submissions. They are organized in the following topical sections: digital services, digital society, and digital business.
This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs, anti-virus, and other security products, internet and web services security, cyber-attack and cyber-terrorism, other security research, together with the articles from the workshops MoWiN 2009, NASSUE 2009, IAWSN 2009, WNGS 2009 & CGMS 2009, SHCI-ISA 2009.