You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.
This thoroughly revised second edition presents a comprehensive overview of the most important contemporary research in EU energy law and policy. The Research Handbook brings together a diverse array of experts, highlighting the multifaceted nature of this continually developing field.
This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems, DRMTICS 2005, held in Sydney, Australia, in October/November 2005. Presents 26 carefully reviewed full papers organized in topical sections on assurance and authentication issues, legal and related issues, expressing rights and management, watermarking, software issues, fingerprinting and image authentication, supporting cryptographic technology, P2P issues, implementations and architectures.
Who benefits from smart technology? Whose interests are served when we trade our personal data for convenience and connectivity? Smart technology is everywhere: smart umbrellas that light up when rain is in the forecast; smart cars that relieve drivers of the drudgery of driving; smart toothbrushes that send your dental hygiene details to the cloud. Nothing is safe from smartification. In Too Smart, Jathan Sadowski looks at the proliferation of smart stuff in our lives and asks whether the tradeoff—exchanging our personal data for convenience and connectivity—is worth it. Who benefits from smart technology? Sadowski explains how data, once the purview of researchers and policy wonks, has...
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies.
The two-volume set LNCS 7044 and 7045 constitutes the refereed proceedings of three confederated international conferences: Cooperative Information Systems (CoopIS 2011), Distributed Objects and Applications - Secure Virtual Infrastructures (DOA-SVI 2011), and Ontologies, DataBases and Applications of SEmantics (ODBASE 2011) held as part of OTM 2011 in October 2011 in Hersonissos on the island of Crete, Greece. The 55 revised full papers presented were carefully reviewed and selected from a total of 141 submissions. The 28 papers included in the second volume constitute the proceedings of DOA-SVI 2011 with 15 full papers organized in topical sections on performance measurement and optimization, instrumentation, monitoring, and provisioning, quality of service, security and privacy, and models and methods, and ODBASE 2011 with 9 full papers organized in topical sections on acquisition of semantic information, use of semantic information, and reuse of semantic information and 4 short papers.
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage...
Going beyond performing simple analyses, researchers involved in the highly dynamic field of computational intelligent data analysis design algorithms that solve increasingly complex data problems in changing environments, including economic, environmental, and social data. Computational Intelligent Data Analysis for Sustainable Development present
This book constitutes the refereed proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2005, held in Salzburg, Austria in September 2005. The 28 revised full papers and 13 two-page abstracts presented together with 4 invited papers were carefully reviewed and selected from 143 submissions. The papers are organized in topical sections on applied cryptography, DRM and e-commerce, media encryption, multimedia security, privacy, biometrics and access control, network security, mobile security, and XML security.
On 25 January 2012, the European Commission presented its long awaited new “Data protection package”. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the...