Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given its ability to collect information on quantities and situations so far unsusp
This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015.The 38 papers presented in th
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in Septembe
This book constitutes the refereed proceedings of the 24th IFIP TC 11 International Information Security Conference, SEC 2009,? held in Pafos, Cyprus, in May 2009. The?38 revised full papers presente
This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, held in Torremolinos, Spain, in October 2008.The 37 revised full papers pr
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two en
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the s
This book constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security, ICICS 2010, held in Barcelona, Spain, in December 2010. The 31 revised f
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not onl
This book constitutes the refereed proceedings of the Second International Conference on Trust and Privacy in Digital Business, TrustBus 2005, held in Copenhagen, Denmark, in August 2005.The 32 revise
This book constitutes the refereed proceedings of the 14th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2017, held in Lyon, France, in August 2017 in conjuncti
Written by an international team of security experts, this compact reference gives professionals comprehensive information on the newest types of threats and sufficient background to learn how to smel
The immune system offers the possibility of treating cancer and its metastasis without the toxicities of chemotherapy. Unfortunately, despite recent medical advances, overall survival of patients is s
This book constitutes the refereed proceedings of the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, held in Loutraki, Greece, in June 20
Positive psychology, the pursuit of understanding optimal human functioning, is reshaping the scholarly and public views of how we see the science of psychology. The Encyclopedia of Positive Psycholog
The Built Environment and Public HealthThe Built Environment and Public Health explores the impact on our health of the environments we build for ourselves, and how public health and urban planning c
Positive psychology, the pursuit of understanding optimal human functioning, is reshaping the scholarly and public views of how we see the science of psychology. The Encyclopedia of Positive Psycholog
The performance of an company depends both on its technological expertise and its managerial and organizational effectiveness. Production management is an important part of the process for manufacturi
Lopez (Rose-Hulman Institute of Technology) presents applied and engineering mathematics in traditional notation and language. The text contains examples drawn from a wide spectrum of physical and mat