st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy of users. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. This challenges the information security research community...
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase ...
The IFIP Working Group 6. 8 Mobile and Wireless Communications has a long tradition on addressing and grouping researchers and practitioners working on various mobile and wireless communications technologies and services. Due to the promising and exciting applications enabled by the development of Wireless Sensor and Actor Networks (WSAN), the IFIP WG 6. 8 had decided to launch a new series of conferences on this exciting new technology. The 1st WSAN was held in Albacete, Spain on September 24-26, 2006. After a thoroughly evaluation process by the program committee members assisted by...
The IFIP Working Group 6. 8 Mobile and Wireless Communications has a long tradition on addressing and grouping researchers and practitioners working o...
In 2006, the Federal Bureau of Investigation (FBI) processed more than two petabytes of digital evidence; in 2007, the volume of digital evidence processed will exceed four petabytes. Electronic devices are becoming smaller and more diverse; memory capacities are increasing according to Moore's Law; distributed networks are growing massively in size and scale. As society embraces new technologies and applications with gusto, digital information will become even more pervasive. Digital investigations already involve searching for the proverbial nee- dle in the haystack. In five years, possibly...
In 2006, the Federal Bureau of Investigation (FBI) processed more than two petabytes of digital evidence; in 2007, the volume of digital evidence proc...
This volume represents the papers reviewed and accepted for the HOIT2007 conference held at the Indian Institute of Technology Madras (IIT-M) in the city of Chennai, India, in August 2007. The conference, entitled "Home/Community Oriented ICT for the Next Billion," addressed many major themes of current interest in this field. In particular, the focus was on community-based technologies. The conference was organized by IFIP working Group 9. 3-Home Oriented Informatics and Telematics (HOIT), in association with the TeNeT Group of the Indian Institute of Technology, Madras. The conference...
This volume represents the papers reviewed and accepted for the HOIT2007 conference held at the Indian Institute of Technology Madras (IIT-M) in the c...
International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings...
International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of inform...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wir...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wir...
Mobile Information Systems II provides a collection of research on the planning, analysis, design, construction, modification, implementation, utilization, evaluation, and management of mobile information systems. The articles focus on the implications of this research in the world of commerce, and address technical issues and constraints on mobile information systems functionalities and design.
Mobile Information Systems II provides a collection of research on the planning, analysis, design, construction, modification, implem...
Communication systems are now ubiquitous and making them more intelligent remains very challenging. The IFIP International Conference on Intelligence in Communication Systems is an effort to bring together researchers and practitioners who represent the latest developments in this area. This volume contains selected papers from the conference in the following focus areas: ad hoc networks / hybrid networks / WLAN; security, privacy and consumer protection; adaptive architectures and protocols; flexible QoS and QoS management; flexible service specification, validation, searching and querying;...
Communication systems are now ubiquitous and making them more intelligent remains very challenging. The IFIP International Conference on Intelligence ...
Within the last decade several new developments have contributed to many new opportunities, as well as to a need for intensive research and development. New applications are driven by the desire for ubiquitous high-quality access to offered and available services at reasonable cost.
A considerable amount of research and development activities are currently going on world wide in order to adopt Internet services to the particular needs of users working in various environments and having an access to a great amount of information provided by commerce, business and public institutions....
Within the last decade several new developments have contributed to many new opportunities, as well as to a need for intensive research and develop...