You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Sensor Systems and Software, S-Cube 2014, held in Coventry, UK, in October 2014. The 12 revised full papers presented were selected from 16 submissions and cover technologies for wireless sensor networks, including security protocols, middleware, analysis tools and frameworks.
This book constitutes the refereed proceedings of the IFIP-TC6 8th International Conference on Personal Wireless Communications, PWC 2003, held in Venice, Italy in September 2003. The 49 revised papers presented together with 6 special track papers, 1 invited paper, 11 project descriptions, 7 work in progress reports, and 8 novel ideas reports were carefully reviewed and selected from 115 submissions. The papers are organized in topical sections on mobile computing, wireless access, sensor networks, transport protocols, performance models, WCDMA, ad-hoc networks, wireless and mobile systems, cellular networks, IPv6, Bluetooth, and security and cooperations in ad-hoc networks.
The Ninth International Workshop on Persistent Object Systems (POS 9) took place at the SAS Radisson Hotel in Lillehammer, Norway, from 6th to 8th September 2000. Previous workshops in the series have been held in Scotland (1 and 2), Australia (3), the USA (4), Italy (5), France (6), and the USA (7 and 8). In keeping with those workshops, POS 9 was short but intensive, fitting 28 papers and panel sessions, a boat 1 excursion, and some memorable meals into two and a half days. The participants’ concentration was no doubt helped by the Northern European weather that prevailed for most of the workshop. Continuing a trend experienced over the previous few workshops, POS 9 had difficulty attrac...
This book constitutes the refereed proceedings of the 5th European Workshop on Wireless Sensor Networks, EWSN 2008, held in Bologna, Italy, in January/February 2008. The 23 revised full papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on localization, detection of space/time correlated events, network coding, ZigBee, topology, software, as well as deployment and application development.
This book constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2009, held in Pisa, Italy, in September 2009. The 18 revised full papers presented together with an invited speech were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on certificate less encryption, certificates and revocation, cryptographic protocols, PKI in practice, encryption and auctions, reputation and user aspects, and digital signatures.
This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012. The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing.
In 1992 we initiated a research project on large scale distributed computing systems (LSDCS). It was a collaborative project involving research institutes and universities in Bologna, Grenoble, Lausanne, Lisbon, Rennes, Rocquencourt, Newcastle, and Twente. The World Wide Web had recently been developed at CERN, but its use was not yet as common place as it is today and graphical browsers had yet to be developed. It was clear to us (and to just about everyone else) that LSDCS comprising several thousands to millions of individual computer systems (nodes) would be coming into existence as a consequence both of technological advances and the demands placed by applications. We were excited about...
Islamic architecture has enriched design with a wide variety of structural shapes, including among others, unique arches, a wide variety of vaults and domes, which allow for new forms to be developed. This volume deals with the design of many types of buildings in Islamic countries, including not only the better known public buildings like mosques, mausoleums, citadels and forts, but also houses and gardens, engineering works such as bridges and dams, irrigation systems and many others which have also had a profound impact on society. There is much to learn from past experiences to arrive at solutions that are environmentally sound and sustainable in the long term. As conventional energy res...
This book constitutes the refereed proceedings of 5 workshops co-located with SAFECOMP 2015, the 34th International Conference on Computer Safety, Reliability, and Security, held in Delft, The Netherlands, in September 2015. The 36 revised full papers presented were carefully reviewed and selected from numerous submissions. This year’s workshop are: ASSURE 2015 - Assurance Cases for Software-intensive Systems; DECSoS'15 - EWICS/ERCIM/ARTEMIS Dependable Cyber-physical Systems and Systems-of-Systems Workshop; ISSE'15 - International workshop on the Integration of Safety and Security Engineering; ReSA4CI 2015 - International Workshop on Reliability and Security Aspects for Critical Infrastructure Protection; SASSUR 2015 - International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems.
This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997. The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.