Search Results for - Narrowed by: SpringerLink (Online service) - Electronic Library - 2014 - Computer security. - Management information systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Management$002binformation$002bsystems.$002509Management$002binformation$002bsystems.$0026te$003dILS$0026rt$003dfalse$00257C$00257C$00257CISBN$00257C$00257C$00257CISBN$0026ps$003d300$0026isd$003dtrue? 2024-08-29T00:21:09Z Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485513 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Huang, Xinyi. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485743 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Gritzalis, Dimitris. editor.&#160;Kiayias, Aggelos. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12280-9">https://doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486701 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Sideridis, Alexander B. editor.&#160;Kardasiadou, Zoe. editor.&#160;Yialouris, Constantine P. editor.&#160;Zorkadis, Vasilios. editor. (orcid)0000-0003-4399-2495&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11710-2">https://doi.org/10.1007/978-3-319-11710-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487278 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487382 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Kimppa, Kai. editor.&#160;Whitehouse, Diane. editor.&#160;Kuusela, Tiina. editor.&#160;Phahlamohlaka, Jackie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44208-1">https://doi.org/10.1007/978-3-662-44208-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488986 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Lee, Hyang-Sook. editor.&#160;Han, Dong-Guk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:488996 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Aldini, Alessandro. editor.&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489016 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Data and Security Engineering 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489103 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589&#160;Wagner, Roland. editor.&#160;Neuhold, Erich J. editor.&#160;Takizawa, Makoto. editor.&#160;K&uuml;ng, Josef. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12778-1">https://doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489121 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Katsikas, Sokratis. editor.&#160;Agudo, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-53997-8">https://doi.org/10.1007/978-3-642-53997-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:489123 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11203-9">https://doi.org/10.1007/978-3-319-11203-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489026 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Mauw, Sjouke. editor.&#160;Damsgaard Jensen, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489033 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;Saad, Walid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12601-2">https://doi.org/10.1007/978-3-319-12601-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489038 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Cuellar, Jorge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10329-7">https://doi.org/10.1007/978-3-319-10329-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489060 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Hansen, Marit. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Leenes, Ronald. editor.&#160;Whitehouse, Diane. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55137-6">https://doi.org/10.1007/978-3-642-55137-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489070 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Lioudakis, Georgios. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Foley, Simon. editor.&#160;Fitzgerald, William M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54568-9">https://doi.org/10.1007/978-3-642-54568-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:489420 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Padr&oacute;, Carles. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489506 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Atluri, Vijay. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43936-4">https://doi.org/10.1007/978-3-662-43936-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:484564 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing Challenges, Limitations and R&amp;D Solutions ent://SD_ILS/0/SD_ILS:487747 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Mahmood, Zaigham. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10530-7">https://doi.org/10.1007/978-3-319-10530-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:487789 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11212-1">https://doi.org/10.1007/978-3-319-11212-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488918 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Chow, Sherman S.M. editor.&#160;Liu, Joseph K. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488920 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10175-0">https://doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Future Internet Services and Systems Current Research ent://SD_ILS/0/SD_ILS:488944 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Heisel, Maritta. editor.&#160;Joosen, Wouter. editor.&#160;L&oacute;pez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07452-8">https://doi.org/10.1007/978-3-319-07452-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488947 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Eckert, Claudia. editor.&#160;Katsikas, Sokratis K. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09770-1">https://doi.org/10.1007/978-3-319-09770-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II ent://SD_ILS/0/SD_ILS:488956 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 -- July 3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488960 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Sperotto, Anna. editor.&#160;Doyen, Guillaume. editor.&#160;Latr&eacute;, Steven. editor.&#160;Charalambides, Marinos. editor.&#160;Stiller, Burkhard. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43862-6">https://doi.org/10.1007/978-3-662-43862-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488978 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Francillon, Aur&eacute;lien. editor.&#160;Rohatgi, Pankaj. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08302-5">https://doi.org/10.1007/978-3-319-08302-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489201 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Frederic. editor.&#160;Jajodia, Sushil. editor.&#160;Abou El Kalam, Anas. editor.&#160;Sans, Thierry. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489223 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43933-3">https://doi.org/10.1007/978-3-662-43933-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489471 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Abadi, Mart&iacute;n. editor.&#160;Kremer, Steve. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54792-8">https://doi.org/10.1007/978-3-642-54792-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488522 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Gladyshev, Pavel. editor.&#160;Marrington, Andrew. editor.&#160;Baggili, Ibrahim. editor. (orcid)0000-0002-9574-9537&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489496 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45355-1">https://doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485594 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Holz, Thorsten. editor. (orcid)0000-0002-2783-1264&#160;Ioannidis, Sotiris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08593-7">https://doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485545 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Pointcheval, David. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06734-6">https://doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Attacks, Intrusions and Defenses 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485702 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Stavrou, Angelos. editor.&#160;Bos, Herbert. editor.&#160;Portokalidis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11379-1">https://doi.org/10.1007/978-3-319-11379-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487487 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;De Decker, Bart. editor.&#160;Z&uacute;quete, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489080 2024-08-29T00:21:09Z 2024-08-29T00:21:09Z Author&#160;Dietrich, Sven. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08509-8">https://doi.org/10.1007/978-3-319-08509-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>