Security and Privacy in Ad-hoc and Sensor Networks Security and Privacy in Ad-hoc and Sensor Networks

Security and Privacy in Ad-hoc and Sensor Networks

Frank Stajano y otros
    • USD 69.99
    • USD 69.99

Descripción editorial

You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The wo- nd rd shop took place in Cambridge, UK, on the 2 and 3 of July 2007. The workshop was European in name and location but it was de?nitely transatlantic in scope. We had a program chair from Europe and one from the USA, and membership of our program committee was almost evenly split - tween those two regions. When looking at participation, the workshop was even more global than that: the submitted papers came from 25 countries in 6 con- nents. We received 87 submissions. After quick-rejecting 5 papers deemed to be out of scope, the remaining 82 papers were each reviewed by at least three PC members. The two program chairs, who did not submit any works, had sole authoritytodecidewhichpaperstoacceptandreject,basedonlyonthedirective that quality had to be the primary criterion, in order to form a proceedings volume of high international relevance. The number of papers to be accepted was not set in advance: it was selected a posteriori so as to include only solid, innovative and insightful papers. The resulting acceptance rate of about 20%, very strict for a workshop, is a testimonial of how selective we chose to be in accepting only high quality papers.

GÉNERO
Informática e Internet
PUBLICADO
2007
24 de agosto
IDIOMA
EN
Inglés
EXTENSIÓN
260
Páginas
EDITORIAL
Springer Berlin Heidelberg
VENDEDOR
Springer Nature B.V.
TAMAÑO
9.6
MB

Más libros de Frank Stajano, Catherine Meadows, Srdjan Capkun & Tyler Moore

Security Protocols XXVIII Security Protocols XXVIII
2023
Security Protocols XXVII Security Protocols XXVII
2020
Security Protocols XXVI Security Protocols XXVI
2018
Security Protocols XXV Security Protocols XXV
2017
Security Protocols XXIV Security Protocols XXIV
2017
Technology and Practice of Passwords Technology and Practice of Passwords
2016