This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust an…
This book constitutes the refereed proceedings of the 9th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2015, held in Hamburg, Germany, in May 2015. The 10 revised full papers and 5 short papers presented were carefully reviewed and selected from 28 submissions. In addition, the book contains one invited paper and 5 papers from a special session on trusted cloud ecosystems.…
This textbook on network economics provides essential microeconomic instruments for the analysis of network sectors like telecommunications, transport or energy. Network-specific characteristics emerge both on the cost side and benefit side, requiring network providers to develop innovative entrepreneurial competition strategies for costing, pricing, and investment. From a competition policy pe…
This is the very first book to present the network radar countermeasure system. It explains in detail the systematic concept of combining radar and radar countermeasures from the perspective of the information acquisition of target location, the optimization of the reconnaissance and detection, the integrated attack of the signals and facilities, and technological and legal developments concern…
This brief focuses on the use of full-duplex radio in cognitive radio networks, presenting a novel spectrum sharing protocol that allows the secondary users to simultaneously sense and access the vacant spectrum. This protocol, called “Listen-and-talk” (LAT), is evaluated by both mathematical analysis and computer simulations in comparison with other existing protocols, including the listen…
This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2014, held in Istanbul, Turkey, in September 2014. The 10 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: efficient implementations and designs…
This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion and interaction among academics, researchers and p…
Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellula…
This book constitutes the proceedings of the 11th International Symposium on Advanced Parallel Processing Technologies, APPT 2015, held in Jinan, China, in August 2015. The 8 papers presented in this volume were carefully reviewed and selected from 24 submissions. They deal with the recent advances in big data processing; parallel architectures and systems; parallel software; parallel algorithm…
This book provides thorough coverage of error correcting techniques. It includes essential basic concepts and the latest advances on key topics in design, implementation, and optimization of hardware/software systems for error correction. The book’s chapters are written by internationally recognized experts in this field. Topics include evolution of error correction techniques, industrial use…