this book constitutes the thoroughly refereed proceedings of the 5th International conference on Ad Hoc Networks, ADHOCNETS 2013, held in Barcelona, Spain, in October 2013. the 14 revised full papers presented were ca...
详细信息
ISBN:
(数字)9783319041056
ISBN:
(纸本)9783319041049
this book constitutes the thoroughly refereed proceedings of the 5th International conference on Ad Hoc Networks, ADHOCNETS 2013, held in Barcelona, Spain, in October 2013. the 14 revised full papers presented were carefully selected and reviewed from numerous submissions and cover a wide range of applications, commercial and military such as mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, underground networks, personal area networks, home networks and large-scale metropolitan networks for smart cities. they are organized in topical sections on wireless sensor networks, routing, applications and security.
this book constitutes the thoroughly refereed post-conferenceproceedings of the 5th International conference on security, privacy and Trust in a Digital World, e-Democracy 2013, held in Athens, Greece, December 2013....
详细信息
ISBN:
(数字)9783319117102
ISBN:
(纸本)9783319117096
this book constitutes the thoroughly refereed post-conferenceproceedings of the 5th International conference on security, privacy and Trust in a Digital World, e-Democracy 2013, held in Athens, Greece, December 2013. the 20 revised full papers presented were carefully selected from numerous submissions. the papers are organized in topical sections on security, privacy; e-governance; e-government applications, virtualizations; politics, legislation: European initiatives.
this book constitutes the refereed proceedings of the 5th International conference on Frontiers in Cyber security, FCS 2022, held in Kumasi, Ghana, during December 13–15, 2022.;the 26 full papers were included in thi...
详细信息
ISBN:
(数字)9789811984457
ISBN:
(纸本)9789811984440
this book constitutes the refereed proceedings of the 5th International conference on Frontiers in Cyber security, FCS 2022, held in Kumasi, Ghana, during December 13–15, 2022.;the 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. they were organized in topical sections as follows: ioT security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.
this book constitutes the refereed proceedings of the 5th International conference on Multimedia Communications, Services and security, MCSS 2012, held in Krakow, Poland, in May/June 2012.the 37 revised full papers pr...
详细信息
ISBN:
(数字)9783642307218
ISBN:
(纸本)9783642307201
this book constitutes the refereed proceedings of the 5th International conference on Multimedia Communications, Services and security, MCSS 2012, held in Krakow, Poland, in May/June 2012.
the 37 revised full papers presented were carefully reviewed and selected from numerous submissions. the papers address issues such as privacy and data protection using digital watermarking and other technologies; object and threat detection; data protection and distribution; human-centric multimedia analysis and synthesis; cybercrime detection and counteracting.
this book constitutes the refereed proceedings of the 5th International conference on Convergence and Hybrid Information Technology, ICHIT 2011, held in Daejeon, Korea, in September 2011.the 85 revised full papers pre...
详细信息
ISBN:
(数字)9783642241062
ISBN:
(纸本)9783642241055
this book constitutes the refereed proceedings of the 5th International conference on Convergence and Hybrid Information Technology, ICHIT 2011, held in Daejeon, Korea, in September 2011.
the 85 revised full papers presented were carefully reviewed and selected from 144 submissions. the papers are organized in topical sections on communications and networking; motion, video, image processing; security systems; cloud, RFID and robotics; industrial application of software systems; hardware and software engineering; healthcare, EEG and e-learning; HCI and data mining; software system and its applications.
this book constitutes the refereed proceedings of the 5th International conference on the theory and application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. the 24 p...
详细信息
ISBN:
(数字)9783642314100
ISBN:
(纸本)9783642314094
this book constitutes the refereed proceedings of the 5th International conference on the theory and application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012.
the 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. they are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.
this book constitutes the thoroughly refereed conferenceproceedings of the 5th International conference on E-Voting and Identity, VoteID 2015, held in Bern, Switzerland, in September 2015. the 10 revised full papers ...
详细信息
ISBN:
(数字)9783319222707
ISBN:
(纸本)9783319222691
this book constitutes the thoroughly refereed conferenceproceedings of the 5th International conference on E-Voting and Identity, VoteID 2015, held in Bern, Switzerland, in September 2015. the 10 revised full papers presented, including one keynote and three invited talks, were carefully selected from 26 submissions. the papers deal with real-world electronic systems; advanced voting protocols; document analysis, machine-checked reasoning, e-voting system in court.
this book constitutes the thoroughly refereed post-conferenceproceedings of the 5th Annual privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. the 12 revised full papers were carefully selected from ...
详细信息
ISBN:
(数字)9783319672809
ISBN:
(纸本)9783319672793
this book constitutes the thoroughly refereed post-conferenceproceedings of the 5th Annual privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. the 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. these selected papers are organized in three different chapters corresponding to the conference sessions. the first chapter, “data Protection Regulation”, discusses topics concerning big genetic data, a privacy-preserving European identity ecosystem, the right to be forgotten und the re-use of privacy risk analysis. the second chapter, “Neutralisation and Anonymization”, discusses neutralisation of threat actors, privacy by design data exchange between CSIRTs, differential privacy and database anonymization. Finally, the third chapter, “privacy Policies in Practice”, discusses privacy by design, privacy scores, privacydata management in healthcare and trade-offs between privacy and utility.
this book contains the proceedings of the 5th International conference on Trust, privacy and security in Digital Business (TrustBus 2008), held in Turin, Italy on 4–5 September 2008. Previous events in the TrustBus s...
详细信息
ISBN:
(数字)9783540857358
ISBN:
(纸本)9783540857341
this book contains the proceedings of the 5th International conference on Trust, privacy and security in Digital Business (TrustBus 2008), held in Turin, Italy on 4–5 September 2008. Previous events in the TrustBus series were held in Zaragoza, Spain (2004), Copenhagen, Denmark (2005), Krakow, Poland (2006), and Regensburg, Germany (2007). TrustBus 2008 brought together academic researchers and industrial developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Turin to parti- pate and debate upon the latest advances in this area. the conference program included one keynote presentation and six technical paper sessions. the keynote speech was delivered by Andreas Pfitzmann from the Technical University of Dresden, Germany, on the topic of “Biometrics – How to Put to Use and How Not at All”. the reviewed paper sessions covered a broad range of topics, - cluding trust and reputation systems, security policies and identity management, p- vacy, intrusion detection and authentication, authorization and access control. Each of the submitted papers was assigned to five referees for review. the program committee ultimately accepted 18 papers for inclusion in the proceedings.
this book constitutes the thoroughly refereed post-conferenceproceedings of the 5th International ICST conference, SecureComm 2009, held in September 2009 in Athens, Greece. the 19 revised full papers and 7 revised s...
详细信息
ISBN:
(数字)9783642052842
ISBN:
(纸本)9783642052835
this book constitutes the thoroughly refereed post-conferenceproceedings of the 5th International ICST conference, SecureComm 2009, held in September 2009 in Athens, Greece. the 19 revised full papers and 7 revised short papers were carefully reviewed and selected from 76 submissions. the papers cover various topics such as wireless network security, network intrusion detection, security and privacy for the general internet, malware and misbehavior, sensor networks, key management, credentials and authentications, as well as secure multicast and emerging technologies.
暂无评论