This book presents the most interesting talks given at ISSE 2015 – the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include: · Encrypted Communication · Trust Services, eID and Cloud Security · Industrial Security and Internet of Things · Cybersecurity, Cybercrime…
The Android Quick APIs Reference is a condensed code and APIs reference for the new Google Android 5.0 SDK. It presents the essential Android APIs in a well-organized format that can be used as a handy reference. You won’t find any technical jargon, bloated samples, drawn out history lessons, or witty stories in this book. What you will find is a software development kit and APIs reference…
This volume contains a collection of research and survey papers written by some of the most eminent mathematicians in the international community and is dedicated to Helmut Maier, whose own research has been groundbreaking and deeply influential to the field. Specific emphasis is given to topics regarding exponential and trigonometric sums and their behavior in short intervals, anatomy of inte…
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, netwo…
The book offers a blend of theory and practice in guiding readers to apply design thinking principles to solving some of our world’s biggest problems. At the same time, readers are encouraged to become aware of new and emerging technologies that make prototyping and applying solutions a reality.
How does technology impact research practices in the humanities? How does digitisation shape scholarly identity? How do we negotiate trust in the digital realm? What is scholarship, what forms can it take, and how does it acquire authority? This diverse set of essays demonstrate the importance of asking such questions, bringing together established and emerging scholars from a variety of dis…
This book constitutes thoroughly revised and selected papers from the Second International Congress on Sports Science Research and Technology Support, icSPORTS 2014, held in Rome, Italy, in October 2014. The 8 thoroughly revised and extended papers presented in this volume were carefully reviewed and selected from originally 131 submissions.
This book constitutes the refereed proceedings of the 4th International Symposium on Integrated Uncertainty in Knowledge Modeling and Decision Making, IUKM 2015, held in Nha Trang, Vietnam, in October 2015. The 40 revised full papers were carefully reviewed and selected from 58 submissions and are presented together with three keynote and invited talks. The papers provide a wealth of new ide…
Maximizing reader insights into the interactions between game theory, excessive crowding and safety and security elements, this book establishes a new research angle by illustrating linkages between different research approaches and through laying the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic…
This book constitutes the refereed proceedings of seven workshops held at the 18th International Conference on Image Analysis and Processing, ICIAP 2015, in Genoa, Italy, in September 2015: International Workshop on Recent Advances in Digital Security: Biometrics and Forensics, BioFor 2015; International Workshop on Color in Texture and Material Recognition, CTMR 2015; International Workshop on…