Search Results for - Narrowed by: SpringerLink (Online service) - Online Library - Computer science. - Data encryption (Computer science). - Data structures (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026te$003dILS$0026rt$003dfalse$00257C$00257C$00257CISBN$00257C$00257C$00257CISBN$0026ps$003d300$0026isd$003dtrue?
2024-08-30T02:18:15Z
Quantum Attacks on Public-Key Cryptosystems
ent://SD_ILS/0/SD_ILS:330828
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330828.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Authentication Problems and Solutions
ent://SD_ILS/0/SD_ILS:331610
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jakobsson, Markus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331610.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE(331766.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automatic Malware Analysis An Emulator Based Approach
ent://SD_ILS/0/SD_ILS:331796
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Yin, Heng. author. Song, Dawn. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331796.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Android Malware
ent://SD_ILS/0/SD_ILS:332276
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jiang, Xuxian. author. Zhou, Yajin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332276.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Location Privacy Protection in Mobile Networks
ent://SD_ILS/0/SD_ILS:332468
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Liu, Xinxin. author. Li, Xiaolin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332468.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335197
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Stam, Martijn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335197.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Cloud Computing Principles and Practice
ent://SD_ILS/0/SD_ILS:331022
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Hill, Richard. author. Hirsch, Laurie. author. Lake, Peter. author. Moshiri, Siavash. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331022.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Software and Systems 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334236
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jürjens, Jan. editor. Livshits, Benjamin. editor. Scandariato, Riccardo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334236.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36563-8">http://dx.doi.org/10.1007/978-3-642-36563-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Deterrence and IT Protection for Critical Infrastructures
ent://SD_ILS/0/SD_ILS:332909
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Martellini, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332909.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334707
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jacobson, Michael. editor. Locasto, Michael. editor. Mohassel, Payman. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334707.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196303
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Aura, Tuomas. editor. Järvinen, Kimmo. editor. Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196738
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Laud, Peeter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197072
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Mitrokotsa, Aikaterini. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31410-0">http://dx.doi.org/10.1007/978-3-642-31410-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Arithmetic of Finite Fields 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197122
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Özbudak, Ferruh. editor. Rodríguez-Henríquez, Francisco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31662-3">http://dx.doi.org/10.1007/978-3-642-31662-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems – CHES 2012 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197310
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Prouff, Emmanuel. editor. Schaumont, Patrick. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33027-8">http://dx.doi.org/10.1007/978-3-642-33027-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197411
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Domingo-Ferrer, Josep. editor. Tinnirello, Ilenia. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33627-0">http://dx.doi.org/10.1007/978-3-642-33627-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Crittografia nel Paese delle Meraviglie
ent://SD_ILS/0/SD_ILS:204651
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Venturi, Daniele. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-88-470-2481-6">http://dx.doi.org/10.1007/978-88-470-2481-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Software and Systems 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196370
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Barthe, Gilles. editor. Livshits, Benjamin. editor. Scandariato, Riccardo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28166-2">http://dx.doi.org/10.1007/978-3-642-28166-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196995
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Askoxylakis, Ioannis. editor. Pöhls, Henrich C. editor. Posegga, Joachim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197053
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Bao, Feng. editor. Samarati, Pierangela. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Watermarking 10th International Workshop, IWDW 2011, Atlantic City, NY, October 23-26, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197189
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Shi, Yun Qing. editor. Kim, Hyoung-Joong. editor. Perez-Gonzalez, Fernando. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32205-1">http://dx.doi.org/10.1007/978-3-642-32205-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197478
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Chim, Tat Wing. editor. Yuen, Tsz Hon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 – November 2, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197492
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jøsang, Audun. editor. Carlsson, Bengt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34210-3">http://dx.doi.org/10.1007/978-3-642-34210-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197603
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Pieprzyk, Josef. editor. Sadeghi, Ahmad-Reza. editor. Manulis, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35404-5">http://dx.doi.org/10.1007/978-3-642-35404-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2010, Corfu, Greece, September 22-24, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193101
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Domingo-Ferrer, Josep. editor. Magkos, Emmanouil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15838-4">http://dx.doi.org/10.1007/978-3-642-15838-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
e-Business and Telecommunications 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194254
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Obaidat, Mohammad S. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20077-9">http://dx.doi.org/10.1007/978-3-642-20077-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:172455
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author van Tilborg, Henk C. A. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Preserving Privacy in Data Outsourcing
ent://SD_ILS/0/SD_ILS:172941
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Foresti, Sara. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7659-8">http://dx.doi.org/10.1007/978-1-4419-7659-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Watermarking 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193883
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Kim, Hyoung-Joong. editor. Shi, Yun Qing. editor. Barni, Mauro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-18405-5">http://dx.doi.org/10.1007/978-3-642-18405-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Software and Systems Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:193943
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Erlingsson, Úlfar. editor. Wieringa, Roel. editor. Zannone, Nicola. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19125-1">http://dx.doi.org/10.1007/978-3-642-19125-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Advances in Intrusion Detection 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195403
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Sommer, Robin. editor. Balzarotti, Davide. editor. Maier, Gregor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23644-0">http://dx.doi.org/10.1007/978-3-642-23644-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems – CHES 2011 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195497
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Preneel, Bart. editor. Takagi, Tsuyoshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23951-9">http://dx.doi.org/10.1007/978-3-642-23951-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research
ent://SD_ILS/0/SD_ILS:173331
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-9866-8">http://dx.doi.org/10.1007/978-1-4419-9866-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195249
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Robles, Rosslin John. editor. Balitanas, Maricel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23141-4">http://dx.doi.org/10.1007/978-3-642-23141-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195888
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Qing, Sihan. editor. Susilo, Willy. editor. Wang, Guilin. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195966
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Lin, Dongdai. editor. Tsudik, Gene. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25513-7">http://dx.doi.org/10.1007/978-3-642-25513-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Biometrics
ent://SD_ILS/0/SD_ILS:167461
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jain, Anil K. author. Ross, Arun A. author. Nandakumar, Karthik. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77326-1">http://dx.doi.org/10.1007/978-0-387-77326-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identity-Based Encryption
ent://SD_ILS/0/SD_ILS:173195
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Chatterjee, Sanjit. author. Sarkar, Palash. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-9383-0">http://dx.doi.org/10.1007/978-1-4419-9383-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195967
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Chen, Liqun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Signatures
ent://SD_ILS/0/SD_ILS:165432
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Katz, Jonathan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-27712-7">http://dx.doi.org/10.1007/978-0-387-27712-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security
ent://SD_ILS/0/SD_ILS:167094
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Huang, Scott C.-H. editor. MacCallum, David. editor. Du, Ding-Zhu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-73821-5">http://dx.doi.org/10.1007/978-0-387-73821-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Arithmetic of Finite Fields Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192452
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Hasan, M. Anwar. editor. Helleseth, Tor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13797-6">http://dx.doi.org/10.1007/978-3-642-13797-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems, CHES 2010 12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192851
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Mangard, Stefan. editor. Standaert, François-Xavier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15031-9">http://dx.doi.org/10.1007/978-3-642-15031-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Advances in Intrusion Detection 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192992
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jha, Somesh. editor. Sommer, Robin. editor. Kreibich, Christian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15512-3">http://dx.doi.org/10.1007/978-3-642-15512-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193656
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Heng, Swee-Huay. editor. Wright, Rebecca N. editor. Goi, Bok-Min. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17619-7">http://dx.doi.org/10.1007/978-3-642-17619-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193666
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Soriano, Miguel. editor. Qing, Sihan. editor. López, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encryption for Digital Content
ent://SD_ILS/0/SD_ILS:171850
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Kiayias, Aggelos. author. Pehlivanoglu, Serdar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Threats in Cyber Security
ent://SD_ILS/0/SD_ILS:172782
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Probst, Christian W. editor. Hunker, Jeffrey. editor. Gollmann, Dieter. editor. Bishop, Matt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Software and Systems Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191790
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Massacci, Fabio. editor. Wallach, Dan. editor. Zannone, Nicola. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11747-3">http://dx.doi.org/10.1007/978-3-642-11747-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Adaptive Cryptographic Access Control
ent://SD_ILS/0/SD_ILS:172654
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Kayem, Anne V. D. M. author. Akl, Selim G. author. Martin, Patrick. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-6655-1">http://dx.doi.org/10.1007/978-1-4419-6655-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Situational Awareness Issues and Research
ent://SD_ILS/0/SD_ILS:171874
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jajodia, Sushil. editor. Liu, Peng. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191712
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Gu, Qijun. editor. Zang, Wanyu. editor. Yu, Meng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191714
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Weerasinghe, Dasun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Multi-Party Non-Repudiation Protocols and Applications
ent://SD_ILS/0/SD_ILS:167284
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Onieva, José A. author. Lopez, Javier. author. Zhou, Jianying. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189928
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Gritzalis, Dimitris. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01244-0">http://dx.doi.org/10.1007/978-3-642-01244-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 18th International Symposium, AAECC-18 2009, Tarragona, Spain, June 8-12, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190242
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Bras-Amorós, Maria. editor. Høholdt, Tom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02181-7">http://dx.doi.org/10.1007/978-3-642-02181-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography – Pairing 2009 Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190581
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Shacham, Hovav. editor. Waters, Brent. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03298-1">http://dx.doi.org/10.1007/978-3-642-03298-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fast Software Encryption 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190589
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Dunkelman, Orr. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03317-9">http://dx.doi.org/10.1007/978-3-642-03317-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Watermarking 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190703
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Ho, Anthony T. S. editor. Shi, Yun Q. editor. Kim, H. J. editor. Barni, Mauro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03688-0">http://dx.doi.org/10.1007/978-3-642-03688-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190634
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Degano, Pierpaolo. editor. Viganò, Luca. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03459-6">http://dx.doi.org/10.1007/978-3-642-03459-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190823
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jahankhani, Hamid. editor. Hessami, Ali G. editor. Hsu, Feng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04062-7">http://dx.doi.org/10.1007/978-3-642-04062-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems - CHES 2009 11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190848
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Clavier, Christophe. editor. Gaj, Kris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04138-9">http://dx.doi.org/10.1007/978-3-642-04138-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190855
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Avanzi, Roberto Maria. editor. Keliher, Liam. editor. Sica, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04159-4">http://dx.doi.org/10.1007/978-3-642-04159-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191592
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Qing, Sihan. editor. Mitchell, Chris J. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11145-7">http://dx.doi.org/10.1007/978-3-642-11145-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190173
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Abdalla, Michel. editor. Pointcheval, David. editor. Fouque, Pierre-Alain. editor. Vergnaud, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal to Practical Security Papers Issued from the 2005-2008 French-Japanese Collaboration
ent://SD_ILS/0/SD_ILS:190185
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Cortier, Véronique. editor. Kirchner, Claude. editor. Okada, Mitsuhiro. editor. Sakurada, Hideki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02002-5">http://dx.doi.org/10.1007/978-3-642-02002-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust Management III Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190202
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Ferrari, Elena. editor. Li, Ninghui. editor. Bertino, Elisa. editor. Karabulut, Yuecel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02056-8">http://dx.doi.org/10.1007/978-3-642-02056-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190947
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Schmidt, Andreas U. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04434-2">http://dx.doi.org/10.1007/978-3-642-04434-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190950
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Backes, Michael. editor. Ning, Peng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191095
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Christianson, Bruce. editor. Crispo, Bruno. editor. Malcolm, James A. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04904-0">http://dx.doi.org/10.1007/978-3-642-04904-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
e-Business and Telecommunications International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191190
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Filipe, Joaquim. editor. Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05197-5">http://dx.doi.org/10.1007/978-3-642-05197-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191346
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - INDOCRYPT 2009 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191427
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Roy, Bimal. editor. Sendrier, Nicolas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10628-6">http://dx.doi.org/10.1007/978-3-642-10628-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Key Establishment
ent://SD_ILS/0/SD_ILS:167859
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Choo, Kim-Kwang Raymond. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-87969-7">http://dx.doi.org/10.1007/978-0-387-87969-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identifying Malicious Code Through Reverse Engineering
ent://SD_ILS/0/SD_ILS:167947
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Singh, Abhishek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-business and Telecommunications 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189098
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Filipe, Joaquim. editor. Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88653-2">http://dx.doi.org/10.1007/978-3-540-88653-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190377
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Park, Jong Hyuk. editor. Chen, Hsiao-Hwa. editor. Atiquzzaman, Mohammed. editor. Lee, Changhoon. editor. Kim, Tai-hoon. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02617-1">http://dx.doi.org/10.1007/978-3-642-02617-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190382
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Park, Jong Hyuk. editor. Zhan, Justin. editor. Lee, Changhoon. editor. Wang, Guilin. editor. Kim, Tai-hoon. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02633-1">http://dx.doi.org/10.1007/978-3-642-02633-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - CRYPTO 2009 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190600
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Halevi, Shai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03356-8">http://dx.doi.org/10.1007/978-3-642-03356-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings
ent://SD_ILS/0/SD_ILS:190785
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Markowitch, Olivier. editor. Bilas, Angelos. editor. Hoepman, Jaap-Henk. editor. Mitchell, Chris J. editor. Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Personal Satellite Services International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190890
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Sithamparanathan, Kandeepan. editor. Marchese, Mario. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04260-7">http://dx.doi.org/10.1007/978-3-642-04260-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191012
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Pieprzyk, Josef. editor. Zhang, Fangguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04642-1">http://dx.doi.org/10.1007/978-3-642-04642-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ad-Hoc, Mobile and Wireless Networks 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190928
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Ruiz, Pedro M. editor. Garcia-Luna-Aceves, Jose Joaquin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04383-3">http://dx.doi.org/10.1007/978-3-642-04383-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Hiding 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190946
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Katzenbeisser, Stefan. editor. Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04431-1">http://dx.doi.org/10.1007/978-3-642-04431-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Watermarking 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008. Selected Papers
ent://SD_ILS/0/SD_ILS:190948
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Kim, Hyoung-Joong. editor. Katzenbeisser, Stefan. editor. Ho, Anthony T. S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04438-0">http://dx.doi.org/10.1007/978-3-642-04438-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191053
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jøsang, Audun. editor. Maseng, Torleiv. editor. Knapskog, Svein Johan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04766-4">http://dx.doi.org/10.1007/978-3-642-04766-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191214
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Chen, Yan. editor. Dimitriou, Tassos D. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05284-2">http://dx.doi.org/10.1007/978-3-642-05284-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191273
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jacobson, Michael J. editor. Rijmen, Vincent. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05445-7">http://dx.doi.org/10.1007/978-3-642-05445-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Security Technology International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191311
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Kim, Haeng-kon. editor. Kim, Tai-hoon. editor. Kiumi, Akingbehin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10240-0">http://dx.doi.org/10.1007/978-3-642-10240-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191494
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Ślęzak, Dominik. editor. Kim, Tai-hoon. editor. Fang, Wai-Chi. editor. Arnett, Kirk P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191500
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Parker, Matthew G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Initiatives to Secure Cyberspace An Emerging Landscape
ent://SD_ILS/0/SD_ILS:164783
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Portnoy, Michael. editor. Goodman, Seymour. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primality Testing and Integer Factorization in Public-Key Cryptography
ent://SD_ILS/0/SD_ILS:167452
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open Source Systems Security Certification
ent://SD_ILS/0/SD_ILS:167460
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Damiani, Ernesto. author. Ardagna, Claudio Agostino. author. El Ioini, Nabil. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77324-7">http://dx.doi.org/10.1007/978-0-387-77324-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Algebraic Cryptanalysis
ent://SD_ILS/0/SD_ILS:167905
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Bard, Gregory V. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88757-9">http://dx.doi.org/10.1007/978-0-387-88757-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematical Methods in Computer Science Essays in Memory of Thomas Beth
ent://SD_ILS/0/SD_ILS:189380
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Calmet, Jacques. editor. Geiselmann, Willi. editor. Müller-Quade, Jörn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89994-5">http://dx.doi.org/10.1007/978-3-540-89994-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings
ent://SD_ILS/0/SD_ILS:189415
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Shi, Yun Q. editor. Kim, Hyoung-Joong. editor. Katzenbeisser, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography – Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188716
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Galbraith, Steven D. editor. Paterson, Kenneth G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and Parallel Computing IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188995
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Cao, Jian. editor. Li, Minglu. editor. Wu, Min-You. editor. Chen, Jinjun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88140-7">http://dx.doi.org/10.1007/978-3-540-88140-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:189090
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Chen, Liqun. editor. Ryan, Mark D. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Database Security Applications and Trends
ent://SD_ILS/0/SD_ILS:166409
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Gertz, Michael. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptanalytic Attacks on RSA
ent://SD_ILS/0/SD_ILS:166422
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing Biometrics Applications
ent://SD_ILS/0/SD_ILS:166745
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Shoniregun, Charles A. author. Crosier, Stephen. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Biometrics
ent://SD_ILS/0/SD_ILS:166799
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jain, Anil K. editor. Flynn, Patrick. editor. Ross, Arun A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-71041-9">http://dx.doi.org/10.1007/978-0-387-71041-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Cards, Tokens, Security and Applications
ent://SD_ILS/0/SD_ILS:166922
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Mayes, Keith E. author. Markantonakis, Konstantinos. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Telecommunications Networks
ent://SD_ILS/0/SD_ILS:166945
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Traynor, Patrick. author. McDaniel, Patrick. author. Porta, Thomas La. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vulnerability Analysis and Defense for the Internet
ent://SD_ILS/0/SD_ILS:167162
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Singh, Abhishek. editor. Singh, Baibhav. editor. Joseph, Hirosh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Attack and Cyber Security Beyond the Hacker
ent://SD_ILS/0/SD_ILS:167459
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Stolfo, Salvatore J. editor. Bellovin, Steven M. editor. Keromytis, Angelos D. editor. Hershkop, Shlomo. editor. Smith, Sean W. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:186153
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-71039-4">http://dx.doi.org/10.1007/978-3-540-71039-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Management in Decentralized Systems
ent://SD_ILS/0/SD_ILS:165430
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Yu, Ting. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Warehousing and Data Mining Techniques for Cyber Security
ent://SD_ILS/0/SD_ILS:166379
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security Policies and Procedures
ent://SD_ILS/0/SD_ILS:166393
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Frye, Douglas W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187473
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Susilo, Willy. editor. Liu, Joseph K. editor. Mu, Yi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptography Principles and Applications
ent://SD_ILS/0/SD_ILS:185185
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Delfs, Hans. author. Knebl, Helmut. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security with Noisy Data On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
ent://SD_ILS/0/SD_ILS:175657
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Tuyls, Pim. editor. Skoric, Boris. editor. Kevenaar, Tom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84628-984-2">http://dx.doi.org/10.1007/978-1-84628-984-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Internet Security
ent://SD_ILS/0/SD_ILS:165679
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Vacca, John R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Power Analysis Attacks Revealing the Secrets of Smart Cards
ent://SD_ILS/0/SD_ILS:166230
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Mangard, Stefan. author. Oswald, Elisabeth. author. Popp, Thomas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-38162-6">http://dx.doi.org/10.1007/978-0-387-38162-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Reliable Face Recognition Methods System Design, Impementation and Evaluation
ent://SD_ILS/0/SD_ILS:166247
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Wechsler, Harry. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-38464-1">http://dx.doi.org/10.1007/978-0-387-38464-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware Detection
ent://SD_ILS/0/SD_ILS:166294
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Christodorescu, Mihai. editor. Jha, Somesh. editor. Maughan, Douglas. editor. Song, Dawn. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Electronic Postage Systems Technology, Security, Economics
ent://SD_ILS/0/SD_ILS:166296
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Bleumer, Gerrit. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Preserving Privacy in On-Line Analytical Processing (OLAP)
ent://SD_ILS/0/SD_ILS:166336
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Wang, Lingyu. author. Jajodia, Sushil. author. Wijesekera, Duminda. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ent://SD_ILS/0/SD_ILS:166337
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Poovendran, Radha. editor. Roy, Sumit. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Wireless Sensor Networks
ent://SD_ILS/0/SD_ILS:166353
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Liu, Donggang. author. Ning, Peng. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Synchronizing Internet Protocol Security (SIPSec)
ent://SD_ILS/0/SD_ILS:166600
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Online Business Security Systems
ent://SD_ILS/0/SD_ILS:166641
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Williams, Godfried B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Intrusion Detection Through Visualization
ent://SD_ILS/0/SD_ILS:165418
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Axelsson, Stefan. author. Sands, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Access Control Systems Security, Identity Management and Trust Models
ent://SD_ILS/0/SD_ILS:165433
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Benantar, Messaoud. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Exercise Book
ent://SD_ILS/0/SD_ILS:165571
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Baigèneres, Thomas. author. Lu, Yi. author. Vaudenay, Serge. author. Junod, Pascal. author. Monnerat, Jean. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Biometric User Authentication for it Security From Fundamentals to Handwriting
ent://SD_ILS/0/SD_ILS:165467
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Vielhauer, Claus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Unconstrained Face Recognition
ent://SD_ILS/0/SD_ILS:165650
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Zhou, Shaohua Kevin. author. Chellappa, Rama. author. Zhao, Wenyi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29486-5">http://dx.doi.org/10.1007/978-0-387-29486-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Preserving Data Mining
ent://SD_ILS/0/SD_ILS:165653
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Vaidya, Jaideep. author. Zhu, Yu Michael. author. Clifton, Christopher W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quality of Protection Security Measurements and Metrics
ent://SD_ILS/0/SD_ILS:166159
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Gollmann, Dieter. editor. Massacci, Fabio. editor. Yautsiukhin, Artsiom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hop Integrity in the Internet
ent://SD_ILS/0/SD_ILS:165645
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Huang, Chin-Tser. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Computer Security
ent://SD_ILS/0/SD_ILS:175390
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Salomon, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Applications for Communications Security
ent://SD_ILS/0/SD_ILS:165205
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Vaudenay, Serge. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Wireless Network Security
ent://SD_ILS/0/SD_ILS:165680
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Vacca, John R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Multibiometrics
ent://SD_ILS/0/SD_ILS:165914
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Ross, Arun A. author. Jain, Anil K. author. Nandakumar, Karthik. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-33123-9">http://dx.doi.org/10.1007/0-387-33123-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Viruses and Malware
ent://SD_ILS/0/SD_ILS:166010
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CryptoGraphics Exploiting Graphics Cards for Security
ent://SD_ILS/0/SD_ILS:166011
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Cook, Debra L. author. Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Algebraic Aspects of the Advanced Encryption Standard
ent://SD_ILS/0/SD_ILS:166179
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Cid, Carlos. author. Murphy, Sean. author. Robshaw, Matthew. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36842-9">http://dx.doi.org/10.1007/978-0-387-36842-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multivariate Public Key Cryptosystems
ent://SD_ILS/0/SD_ILS:166190
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Ding, Jintai. author. Gower, Jason E. author. Schmidt, Dieter S. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theoretical Computer Science Essays in Memory of Shimon Even
ent://SD_ILS/0/SD_ILS:183542
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Goldreich, Oded. editor. Rosenberg, Arnold L. editor. Selman, Alan L. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11685654">http://dx.doi.org/10.1007/11685654</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection and Correlation Challenges and Solutions
ent://SD_ILS/0/SD_ILS:164919
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Kruegel, Christopher. author. Valeur, Fredrik. author. Vigna, Giovanni. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy, Security and Trust within the Context of Pervasive Computing
ent://SD_ILS/0/SD_ILS:164923
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Robinson, Philip. editor. Vogt, Harald. editor. Wagealla, Waleed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing Platforms: Design and Applications
ent://SD_ILS/0/SD_ILS:164994
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Smith, Sean W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b103637">http://dx.doi.org/10.1007/b103637</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security in the 21st Century
ent://SD_ILS/0/SD_ILS:165001
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Lee, D. T. editor. Shieh, S. P. editor. Tygar, J. D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, France
ent://SD_ILS/0/SD_ILS:165011
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Dimitrakos, Theo. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom
ent://SD_ILS/0/SD_ILS:165055
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Chadwick, David. editor. Preneel, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105674">http://dx.doi.org/10.1007/b105674</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Certification and Security in Inter-Organizational E-Service
ent://SD_ILS/0/SD_ILS:165086
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Nardelli, Enrico. editor. Talamo, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)
ent://SD_ILS/0/SD_ILS:165267
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004
ent://SD_ILS/0/SD_ILS:168883
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Kowalik, Janusz S. editor. Gorski, Janusz. editor. Sachenko, Anatoly. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer viruses: from theory to applications
ent://SD_ILS/0/SD_ILS:176342
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Filiol, Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Group Communications over Data Networks
ent://SD_ILS/0/SD_ILS:164839
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Zou, Xukai. author. Ramamurthy, Byrav. author. Magliveras, Spyros S. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Coding for Data and Computer Communications
ent://SD_ILS/0/SD_ILS:164977
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Salomon, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Image and Video Encryption From Digital Rights Management to Secured Personal Communication
ent://SD_ILS/0/SD_ILS:164920
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:164930
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in E-Learning
ent://SD_ILS/0/SD_ILS:165224
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Weippl, Edgar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multimedia Encryption and Watermarking
ent://SD_ILS/0/SD_ILS:165226
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Furht, Borko. author. Muharemagic, Edin. author. Socek, Daniel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japan
ent://SD_ILS/0/SD_ILS:165165
2024-08-30T02:18:15Z
2024-08-30T02:18:15Z
Author Sasaki, Ryoichi. editor. Qing, Sihan. editor. Okamoto, Eiji. editor. Yoshiura, Hiroshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>