You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R & D community, with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science research forum available. The scope of LNCS, including its subseries LNAI and LNBI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes proceedings (published in time for the respective conference)...
This book constitutes the refereed proceedings of the Second International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2011, held in Toulouse, France, in August/September 2011. The 30 revised full papers presented were carefully reviewed and selected from numerous submissions. Among the topics addressed are aspects of security, reliability, privacy and anonymity of e-government systems, knowledge processing, service-oriented computing, and case studies of e-government systems in several countries.
This book constitutes the refereed proceedings of the Third International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2014, held in Munich, Germany, in September 2014, in conjunction with DEXA 2014. The 23 revised full papers presented together with one invited talk were carefully reviewed and selected for inclusion in this volume. The papers are organized in the following topical sections: identity management in e-government; e-participation; intelligent systems in e-government; semantic technologies in e-government; e-government cases; open government data and G-cloud; and privacy and security in e-government.
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. T...
The book "TransMath - Innovative Solutions from Mathematical Technology" has been conceived as a tool for the dissemination of scientific knowledge. This publication is addressed to those companies with innovation needs that could be met through mathematical technology. The book maps both existing and possible interactions and connections that enable technology transfer between Spanish mathematical research and industrial and business sectors. Businesses can determine the level of implementation and demand for such technology within their sector and understand the benefits and innovations achieved in other companies and industries with the application of mathematical techniques. The information is classified into eleven sectors of economic activity: Biomedicine & Health; Construction; Economics & Finance; Energy & Environment; Food; ICT; Logistics & Transport; Management & Tourism; Metal & Machinery; Public Administration; and Technical Services.
Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents general principles and application paradigms critical to the future of this field. The study of cryptography is motivated by and driven forward by security requirements. All the new directions of modern cryptography, including proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography have arisen from t...
The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives. The International Workshop on Computational Intelligence for Security in Infor- tion Systems (CISIS) proposes a forum to the different communities related to the field of intelligent systems for security. The global purpose of CISIS conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading industries ac...
A microgrid (MG) is a local energy system consisting of a number of energy sources, energy storage units and loads that operate connected to the main electrical grid or autonomously. MGs include wind, solar or other renewable energy sources. MGs provide flexibility, reduce the main electricity grid dependence and contribute to change the large centralized production paradigm to local and distributed generation. However, such energy systems require complex management, advanced control and optimization. Interest on MGs hierarchical control has increased due to the availability of cheap online measurements. Similarly to any process system, MG hierarchical control is divided into three levels. H...
This book is a collection of the ICAME41 conference proceedings covering a range of topics in corpus linguistics. Busse et al. Explore contemporary trends and new directions in the field. Papers focusing on historical linguistics include Bohmann et al's study on the passive alternation in 19th and 20th century American English whilst Iyeiri and Fukunaga investigate negation in 19th century American missionary documents. Bohmann's emphasis is on the Contrastive usage profiling method to represent online discourse data. Empirical studies on discourse analysis include Brooks' analysis of how the UK press portrays obesity, Coats generating ASR transcripts to look at dialect data from YouTube, and Gonzalez-Cruz's pragmatic considerations of Anglicisms entering Canarian-Spanish digital headlines. Schneider use statistical models to look at language comprehension in an eye-tracking corpus.
This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, held in Florianópolis, Brazil, in September 2014. The 19 papers presented together with four invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on cryptographic engineering, side-channel attacks and countermeasures, privacy, crypto analysis and cryptographic protocols.