Search Results for - Narrowed by: Online Library - Electronic Library - Computer science. - Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026te$003dILS$0026rt$003dfalse$00257C$00257C$00257CISBN$00257C$00257C$00257CISBN$0026ps$003d300$0026isd$003dtrue? 2024-08-28T20:32:23Z Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedings ent://SD_ILS/0/SD_ILS:401719 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Belqasmi, Fatna. editor.&#160;Harroud, Hamid. editor.&#160;Agueh, Max. editor.&#160;Dssouli, Rachida. editor.&#160;Kamoun, Faouzi. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67837-5">https://doi.org/10.1007/978-3-319-67837-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401734 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850&#160;Piramuthu, Selwyn. editor.&#160;Zhou, Wei. editor. (orcid)0000-0002-9965-9870&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11&ndash;12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402401 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;M. F. Kebe, Cheikh. editor.&#160;Gueye, Assane. editor.&#160;Ndiaye, Ababacar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Honeypot Frameworks and Their Applications: A New Framework ent://SD_ILS/0/SD_ILS:399250 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;NG, Chee Keong. author.&#160;Pan, Lei. author.&#160;Xiang, Yang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400126 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:402007 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Gal-Oz, Nurit. editor.&#160;Lewis, Peter R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401948 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Matou&scaron;ek, Petr. editor.&#160;Schmiedecker, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400247 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Ganapathy, Vinod. editor.&#160;Jaeger, Trent. editor.&#160;Shyamasundar, R.K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400326 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Krimmer, Robert. editor. (orcid)0000-0002-0873-539X&#160;Volkamer, Melanie. editor. (orcid)0000-0003-2674-4043&#160;Cortier, V&eacute;ronique. editor.&#160;Gor&eacute;, Rajeev. editor.&#160;Hapsara, Manik. editor. (orcid)0000-0002-8653-063X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Blockchain First International Conference, SmartBlock 2018, Tokyo, Japan, December 10&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399024 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Qiu, Meikang. editor. (orcid)0000-0002-1004-0140&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05764-0">https://doi.org/10.1007/978-3-030-05764-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399665 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Saracino, Andrea. editor.&#160;Mori, Paolo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematics and Computing 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400624 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Ghosh, Debdas. editor.&#160;Giri, Debasis. editor.&#160;Mohapatra, Ram N. editor.&#160;Savas, Ekrem. editor.&#160;Sakurai, Kouichi. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-0023-3">https://doi.org/10.1007/978-981-13-0023-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401491 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Hansen, Marit. editor.&#160;Kosta, Eleni. editor.&#160;Nai-Fovino, Igor. editor.&#160;Fischer-H&uuml;bner, Simone. editor. (orcid)0000-0002-6938-4466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402017 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Imine, Abdessamad. editor.&#160;Fernandez, Jos&eacute; M. editor. (orcid)0000-0001-9836-3595&#160;Marion, Jean-Yves. editor.&#160;Logrippo, Luigi. editor. (orcid)0000-0001-8804-0450&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals and Applications of Hardcopy Communication Conveying Side Information by Printed Media ent://SD_ILS/0/SD_ILS:402116 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Mayer, Joceli. author.&#160;Borges, Paulo V.K. author.&#160;J. Simske, Steven. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74083-6">https://doi.org/10.1007/978-3-319-74083-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Botnets ent://SD_ILS/0/SD_ILS:331175 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Tiirmaa-Klaar, Heli. author.&#160;Gassen, Jan. author.&#160;Gerhards-Padilla, Elmar. author.&#160;Martini, Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331175.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5216-3">http://dx.doi.org/10.1007/978-1-4471-5216-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security ent://SD_ILS/0/SD_ILS:331785 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Korzun, Dmitry. author.&#160;Gurtov, Andrei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331785.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5483-0">http://dx.doi.org/10.1007/978-1-4614-5483-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Outlier Analysis ent://SD_ILS/0/SD_ILS:332026 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Aggarwal, Charu C. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332026.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6396-2">http://dx.doi.org/10.1007/978-1-4614-6396-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SmartData Privacy Meets Evolutionary Robotics ent://SD_ILS/0/SD_ILS:332030 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Harvey, Inman. editor.&#160;Cavoukian, Ann. editor.&#160;Tomko, George. editor.&#160;Borrett, Don. editor.&#160;Kwan, Hon. editor.<br/>Preferred Shelf Number&#160;ONLINE(332030.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6409-9">http://dx.doi.org/10.1007/978-1-4614-6409-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical Layer Approaches for Securing Wireless Communication Systems ent://SD_ILS/0/SD_ILS:332050 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Wen, Hong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332050.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6510-2">http://dx.doi.org/10.1007/978-1-4614-6510-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Malware ent://SD_ILS/0/SD_ILS:332276 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Jiang, Xuxian. author.&#160;Zhou, Yajin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332276.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Social Networks ent://SD_ILS/0/SD_ILS:332451 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Liang, Xiaohui. author.&#160;Lu, Rongxing. author.&#160;Lin, Xiaodong. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332451.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8857-6">http://dx.doi.org/10.1007/978-1-4614-8857-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:332461 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Tang, Jin. author.&#160;Cheng, Yu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332461.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:332468 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Liu, Xinxin. author.&#160;Li, Xiaolin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332468.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Assessment in Vehicular Networks ent://SD_ILS/0/SD_ILS:332479 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Du, Suguo. author.&#160;Zhu, Haojin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332479.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Security Management ent://SD_ILS/0/SD_ILS:332865 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Al-Shaer, Ehab. editor.&#160;Ou, Xinming. editor.&#160;Xie, Geoffrey. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332865.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-01433-3">http://dx.doi.org/10.1007/978-3-319-01433-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and the Networked Society ent://SD_ILS/0/SD_ILS:332915 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Gregory, Mark A. author.&#160;Glance, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332915.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sensor Systems and Software 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333015 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Zuniga, Marco. editor.&#160;Dini, Gianluca. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333015.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-04166-7">http://dx.doi.org/10.1007/978-3-319-04166-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332941 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Qing, Sihan. editor.&#160;Zhou, Jianying. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332941.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332947 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Das, Sajal K. editor.&#160;Nita-Rotaru, Cristina. editor.&#160;Kantarcioglu, Murat. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332947.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02786-9">http://dx.doi.org/10.1007/978-3-319-02786-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Networking 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334025 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Frey, Davide. editor.&#160;Raynal, Michel. editor.&#160;Sarkar, Saswati. editor.&#160;Shyamasundar, Rudrapatna K. editor.&#160;Sinha, Prasun. editor.<br/>Preferred Shelf Number&#160;ONLINE(334025.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35668-1">http://dx.doi.org/10.1007/978-3-642-35668-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Internet Technology 9th International Conference, ICDCIT 2013, Bhubaneswar, India, February 5-8, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334114 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Hota, Chittaranjan. editor.&#160;Srimani, Pradip K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334114.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36071-8">http://dx.doi.org/10.1007/978-3-642-36071-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2013 The Cryptographers&rsquo; Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334122 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334122.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334132 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Hoepman, Jaap-Henk. editor.&#160;Verbauwhede, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334132.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334145 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James A. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334145.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personal Satellite Services 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334292 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Pillai, Prashant. editor.&#160;Shorey, Rajeev. editor.&#160;Ferro, Erina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334292.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36787-8">http://dx.doi.org/10.1007/978-3-642-36787-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334301 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Mustofa, Khabib. editor.&#160;Neuhold, Erich J. editor.&#160;Tjoa, A Min. editor.&#160;Weippl, Edgar. editor.&#160;You, Ilsun. editor.<br/>Preferred Shelf Number&#160;ONLINE(334301.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36818-9">http://dx.doi.org/10.1007/978-3-642-36818-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334305 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Basin, David. editor.&#160;Mitchell, John C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334305.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334316 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Keromytis, Angelos D. editor.&#160;Pietro, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334316.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ad Hoc Networks 4th International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334331 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Zheng, Jun. editor.&#160;Mitton, Nathalie. editor.&#160;Li, Jun. editor.&#160;Lorenz, Pascal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334331.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36958-2">http://dx.doi.org/10.1007/978-3-642-36958-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334514 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;J&oslash;sang, Audun. editor.&#160;Samarati, Pierangela. editor.&#160;Petrocchi, Marinella. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334514.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38004-4">http://dx.doi.org/10.1007/978-3-642-38004-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid Security First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334518 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Cuellar, Jorge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334518.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38030-3">http://dx.doi.org/10.1007/978-3-642-38030-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334519 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Deng, Robert H. editor.&#160;Feng, Tao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334519.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management VII 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334582 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Fern&aacute;ndez-Gago, Carmen. editor.&#160;Martinelli, Fabio. editor.&#160;Pearson, Siani. editor.&#160;Agudo, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334582.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38323-6">http://dx.doi.org/10.1007/978-3-642-38323-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2013 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334587 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Johansson, Thomas. editor.&#160;Nguyen, Phong Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334587.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38348-9">http://dx.doi.org/10.1007/978-3-642-38348-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wired/Wireless Internet Communication 11th International Conference, WWIC 2013, St. Petersburg, Russia, June 5-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334594 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Tsaoussidis, Vassilis. editor.&#160;Kassler, Andreas J. editor.&#160;Koucheryavy, Yevgeni. editor.&#160;Mellouk, Abdelhamid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334594.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38401-1">http://dx.doi.org/10.1007/978-3-642-38401-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334613 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Kuty&#322;owski, Miros&#322;aw. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334613.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334616 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Cavallaro, Lorenzo. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334616.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334620 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Youssef, Amr. editor.&#160;Nitaj, Abderrahmane. editor.&#160;Hassanien, Aboul Ella. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334620.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web-Age Information Management 14th International Conference, WAIM 2013, Beidaihe, China, June 14-16, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334622 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Wang, Jianyong. editor.&#160;Xiong, Hui. editor.&#160;Ishikawa, Yoshiharu. editor.&#160;Xu, Jianliang. editor.&#160;Zhou, Junfeng. editor.<br/>Preferred Shelf Number&#160;ONLINE(334622.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38562-9">http://dx.doi.org/10.1007/978-3-642-38562-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334767 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Wang, Lingyu. editor.&#160;Shafiq, Basit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334767.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I ent://SD_ILS/0/SD_ILS:335157 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335157.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II ent://SD_ILS/0/SD_ILS:335160 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335160.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335194 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Bagchi, Aditya. editor.&#160;Ray, Indrakshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335194.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy Preserving in Social Networks ent://SD_ILS/0/SD_ILS:335299 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Chbeir, Richard. editor.&#160;Al Bouna, Bechara. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335299.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-7091-0894-9">http://dx.doi.org/10.1007/978-3-7091-0894-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz Der Weg zur Zertifizierung ent://SD_ILS/0/SD_ILS:337870 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Kersten, Heinrich. author.&#160;Reuter, J&uuml;rgen. author.&#160;Schr&ouml;der, Klaus-Werner. author.&#160;Kersten, Heinrich. editor.&#160;Wolfenstetter, Klaus-Dieter. editor.<br/>Preferred Shelf Number&#160;ONLINE(337870.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-658-01724-8">http://dx.doi.org/10.1007/978-3-658-01724-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economics of Information Security and Privacy III ent://SD_ILS/0/SD_ILS:331294 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Schneier, Bruce. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331294.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Social Networks ent://SD_ILS/0/SD_ILS:331435 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Altshuler, Yaniv. editor.&#160;Elovici, Yuval. editor.&#160;Cremers, Armin B. editor.&#160;Aharony, Nadav. editor.&#160;Pentland, Alex. editor.<br/>Preferred Shelf Number&#160;ONLINE(331435.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4139-7">http://dx.doi.org/10.1007/978-1-4614-4139-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Authentication Problems and Solutions ent://SD_ILS/0/SD_ILS:331610 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Jakobsson, Markus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331610.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE(331766.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automatic Malware Analysis An Emulator Based Approach ent://SD_ILS/0/SD_ILS:331796 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Yin, Heng. author.&#160;Song, Dawn. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331796.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Iris Biometrics From Segmentation to Template Security ent://SD_ILS/0/SD_ILS:331810 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Rathgeb, Christian. author.&#160;Uhl, Andreas. author.&#160;Wild, Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331810.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5571-4">http://dx.doi.org/10.1007/978-1-4614-5571-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Implantable Medical Devices ent://SD_ILS/0/SD_ILS:332220 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Hei, Xiali. author.&#160;Du, Xiaojiang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332220.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IP Mobility Management for VANET ent://SD_ILS/0/SD_ILS:332861 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Taha, Sanaa. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332861.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-01351-0">http://dx.doi.org/10.1007/978-3-319-01351-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings ent://SD_ILS/0/SD_ILS:332976 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Bloem, Roderick. editor.&#160;Lipp, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332976.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03491-1">http://dx.doi.org/10.1007/978-3-319-03491-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332978 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Paul, Goutam. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332978.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03515-4">http://dx.doi.org/10.1007/978-3-319-03515-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conference ent://SD_ILS/0/SD_ILS:335292 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335292.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-658-03371-2">http://dx.doi.org/10.1007/978-3-658-03371-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXI 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335142 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;Stajano, Frank. editor.&#160;Anderson, Jonathan. editor.&#160;Bonneau, Joseph. editor.<br/>Preferred Shelf Number&#160;ONLINE(335142.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41717-7">http://dx.doi.org/10.1007/978-3-642-41717-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings ent://SD_ILS/0/SD_ILS:332957 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Abdalla, Michel. editor.&#160;Nita-Rotaru, Cristina. editor.&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332957.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 15th International Symposium, SSS 2013, Osaka, Japan, November 13-16, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332964 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Higashino, Teruo. editor.&#160;Katayama, Yoshiaki. editor.&#160;Masuzawa, Toshimitsu. editor.&#160;Potop-Butucaru, Maria. editor.&#160;Yamashita, Masafumi. editor.<br/>Preferred Shelf Number&#160;ONLINE(332964.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03089-0">http://dx.doi.org/10.1007/978-3-319-03089-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings ent://SD_ILS/0/SD_ILS:332984 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Wang, Guojun. editor.&#160;Ray, Indrakshi. editor.&#160;Feng, Dengguo. editor.&#160;Rajarajan, Muttukrishnan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03584-0">http://dx.doi.org/10.1007/978-3-319-03584-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Computational Science XVII ent://SD_ILS/0/SD_ILS:334063 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Gavrilova, Marina L. editor.&#160;Tan, C. J. Kenneth. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334063.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35840-1">http://dx.doi.org/10.1007/978-3-642-35840-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334078 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Pietro, Roberto. editor.&#160;Herranz, Javier. editor.&#160;Damiani, Ernesto. editor.&#160;State, Radu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334078.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35890-6">http://dx.doi.org/10.1007/978-3-642-35890-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334097 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Knudsen, Lars R. editor.&#160;Wu, Huapeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334097.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May 28 &ndash; June 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334049 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Yuan, Yuyu. editor.&#160;Wu, Xu. editor.&#160;Lu, Yueming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334049.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35795-4">http://dx.doi.org/10.1007/978-3-642-35795-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334179 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Abdalla, Michel. editor.&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334179.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334184 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Kurosawa, Kaoru. editor.&#160;Hanaoka, Goichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334184.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Passive and Active Measurement 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334223 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Roughan, Matthew. editor.&#160;Chang, Rocky. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334223.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36516-4">http://dx.doi.org/10.1007/978-3-642-36516-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334242 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Sahai, Amit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334242.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334470 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Kwon, Taekyoung. editor.&#160;Lee, Mun-Kyu. editor.&#160;Kwon, Daesung. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334470.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334399 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Leeuw, Elisabeth. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334399.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334401 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Mangard, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334401.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334403 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Flegel, Ulrich. editor.&#160;Markatos, Evangelos. editor.&#160;Robertson, William. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334403.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37300-8">http://dx.doi.org/10.1007/978-3-642-37300-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334760 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Rieck, Konrad. editor.&#160;Stewin, Patrick. editor.&#160;Seifert, Jean-Pierre. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334760.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39235-1">http://dx.doi.org/10.1007/978-3-642-39235-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334707.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334720 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Boyd, Colin. editor.&#160;Simpson, Leonie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334720.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334726 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Cristofaro, Emiliano. editor.&#160;Wright, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334726.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gon&ccedil;alves, RS, Brazil, July 27-31, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334794 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Dodge, Ronald C. editor.&#160;Futcher, Lynn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334794.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Economics of Information Security and Privacy ent://SD_ILS/0/SD_ILS:334810 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;B&ouml;hme, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334810.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Interactive Theorem Proving 4th International Conference, ITP 2013, Rennes, France, July 22-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334825 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Blazy, Sandrine. editor.&#160;Paulin-Mohring, Christine. editor.&#160;Pichardie, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334825.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39634-2">http://dx.doi.org/10.1007/978-3-642-39634-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334836 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Wang, G. Alan. editor.&#160;Zheng, Xiaolong. editor.&#160;Chau, Michael. editor.&#160;Chen, Hsinchun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334836.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39693-9">http://dx.doi.org/10.1007/978-3-642-39693-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334863 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334863.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334864 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Rogers, Marcus. editor.&#160;Seigfried-Spellar, Kathryn C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334864.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39891-9">http://dx.doi.org/10.1007/978-3-642-39891-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334878 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Capitani di Vimercati, Sabrina. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334878.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334880 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334880.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I ent://SD_ILS/0/SD_ILS:334881 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Canetti, Ran. editor.&#160;Garay, Juan A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334881.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40041-4">http://dx.doi.org/10.1007/978-3-642-40041-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II ent://SD_ILS/0/SD_ILS:334888 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Canetti, Ran. editor.&#160;Garay, Juan A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334888.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40084-1">http://dx.doi.org/10.1007/978-3-642-40084-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Watermaking 11th International Workshop, IWDW 2012, Shanghai, China, October 31 &ndash; November 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334892 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Shi, Yun Q. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334892.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40099-5">http://dx.doi.org/10.1007/978-3-642-40099-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334909 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Crampton, Jason. editor.&#160;Jajodia, Sushil. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334932 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Bertoni, Guido. editor.&#160;Coron, Jean-S&eacute;bastien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334932.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40349-1">http://dx.doi.org/10.1007/978-3-642-40349-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334938 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Avoine, Gildas. editor.&#160;Kara, Orhun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334938.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Communication Networking 19th EUNICE/IFIP WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334966 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Bauschert, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334966.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40552-5">http://dx.doi.org/10.1007/978-3-642-40552-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335057 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Accorsi, Rafael. editor.&#160;Ranise, Silvio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335057.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41098-7">http://dx.doi.org/10.1007/978-3-642-41098-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335063 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335063.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security and Privacy Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335073 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Felici, Massimo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335073.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41205-9">http://dx.doi.org/10.1007/978-3-642-41205-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335076 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Gierlichs, Benedikt. editor.&#160;Guilley, Sylvain. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335076.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335077 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Susilo, Willy. editor.&#160;Reyhanitabar, Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335077.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Attacks, Intrusions, and Defenses 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335085 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Stolfo, Salvatore J. editor.&#160;Stavrou, Angelos. editor.&#160;Wright, Charles V. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335085.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41284-4">http://dx.doi.org/10.1007/978-3-642-41284-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335088 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Adams, Andrew A. editor.&#160;Brenner, Michael. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335088.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335090 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Hutter, Michael. editor.&#160;Schmidt, J&ouml;rn-Marc. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335090.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41332-2">http://dx.doi.org/10.1007/978-3-642-41332-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings ent://SD_ILS/0/SD_ILS:335098 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Sakiyama, Kazuo. editor.&#160;Terada, Masayuki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335098.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern Cryptography Primer Theoretical Foundations and Practical Applications ent://SD_ILS/0/SD_ILS:335099 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Ko&#347;cielny, Czes&#322;aw. author.&#160;Kurkowski, Miros&#322;aw. author.&#160;Srebrny, Marian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335099.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet and Distributed Computing Systems 6th International Conference, IDCS 2013, Hangzhou, China, October 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:335105 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Pathan, Mukaddim. editor.&#160;Wei, Guiyi. editor.&#160;Fortino, Giancarlo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335105.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41428-2">http://dx.doi.org/10.1007/978-3-642-41428-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335107 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Bologna, Sandro. editor.&#160;H&auml;mmerli, Bernhard. editor.&#160;Gritzalis, Dimitris. editor.&#160;Wolthusen, Stephen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335107.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335197 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Stam, Martijn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335197.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Internet Technologies Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335225 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Su, Jinshu. editor.&#160;Zhao, Baokang. editor.&#160;Sun, Zhigang. editor.&#160;Wang, Xiaofeng. editor.&#160;Wang, Fei. editor.<br/>Preferred Shelf Number&#160;ONLINE(335225.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-53959-6">http://dx.doi.org/10.1007/978-3-642-53959-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risikomanagement kompakt Risiken und Unsicherheiten bewerten und beherrschen ent://SD_ILS/0/SD_ILS:337388 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Ebert, Christof. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(337388.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41048-2">http://dx.doi.org/10.1007/978-3-642-41048-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Netzwerk- und Datensicherheit Eine praktische Einf&uuml;hrung ent://SD_ILS/0/SD_ILS:338406 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Kappes, Martin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(338406.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-8612-5">http://dx.doi.org/10.1007/978-3-8348-8612-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT-Risikomanagement mit System Praxisorientiertes Management von Informationssicherheits- und IT-Risiken ent://SD_ILS/0/SD_ILS:338328 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;K&ouml;nigs, Hans-Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(338328.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-2165-2">http://dx.doi.org/10.1007/978-3-8348-2165-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Deterrence and IT Protection for Critical Infrastructures ent://SD_ILS/0/SD_ILS:332909 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Martellini, Maurizio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333008 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Luiijf, Eric. editor.&#160;Hartel, Pieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333008.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333021 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Zia, Tanveer. editor.&#160;Zomaya, Albert. editor.&#160;Varadharajan, Vijay. editor.&#160;Mao, Morley. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333021.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334505 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Singh, Karan. editor.&#160;Awasthi, Amit K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334505.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37949-9">http://dx.doi.org/10.1007/978-3-642-37949-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334635 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Gaborit, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334635.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334638 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Lopez, Javier. editor.&#160;Huang, Xinyi. editor.&#160;Sandhu, Ravi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334638.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of Information Security, Privacy, and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334786 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Marinos, Louis. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334786.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39345-7">http://dx.doi.org/10.1007/978-3-642-39345-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334746 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Heather, James. editor.&#160;Schneider, Steve. editor.&#160;Teague, Vanessa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334746.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334958 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Cuzzocrea, Alfredo. editor.&#160;Kittl, Christian. editor.&#160;Simos, Dimitris E. editor.&#160;Weippl, Edgar. editor.&#160;Xu, Lida. editor.<br/>Preferred Shelf Number&#160;ONLINE(334958.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing and Communications International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334972 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Thampi, Sabu M. editor.&#160;Atrey, Pradeep K. editor.&#160;Fan, Chun-I. editor.&#160;Perez, Gregorio Martinez. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334972.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40576-1">http://dx.doi.org/10.1007/978-3-642-40576-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334976 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Awad, Ali Ismail. editor.&#160;Hassanien, Aboul Ella. editor.&#160;Baba, Kensuke. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334976.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures ent://SD_ILS/0/SD_ILS:334982 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Haataja, Keijo. author.&#160;Hypp&ouml;nen, Konstantin. author.&#160;Pasanen, Sanna. author.&#160;Toivanen, Pekka. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334982.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Service-Oriented and Cloud Computing Second European Conference, ESOCC 2013, M&aacute;laga, Spain, September 11-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334983 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Lau, Kung-Kiu. editor.&#160;Lamersdorf, Winfried. editor.&#160;Pimentel, Ernesto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334983.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40651-5">http://dx.doi.org/10.1007/978-3-642-40651-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Public Key Infrastructures ent://SD_ILS/0/SD_ILS:334984 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Buchmann, Johannes A. author.&#160;Karatsiolis, Evangelos. author.&#160;Wiesmaier, Alexander. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335002 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Decker, Bart. editor.&#160;Dittmann, Jana. editor.&#160;Kraetzer, Christian. editor.&#160;Vielhauer, Claus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335002.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335005 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Bitsch, Friedemann. editor.&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Ka&acirc;niche, Mohamed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335005.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40793-2">http://dx.doi.org/10.1007/978-3-642-40793-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems: OTM 2013 Conferences Confederated International Conferences: CoopIS, DOA-Trusted Cloud, and ODBASE 2013, Graz, Austria, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335044 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Meersman, Robert. editor.&#160;Panetto, Herv&eacute;. editor.&#160;Dillon, Tharam. editor.&#160;Eder, Johann. editor.&#160;Bellahsene, Zohra. editor.<br/>Preferred Shelf Number&#160;ONLINE(335044.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41030-7">http://dx.doi.org/10.1007/978-3-642-41030-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335110 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;H&auml;mmerli, Bernhard M. editor.&#160;Kalstad Svendsen, Nils. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335110.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41485-5">http://dx.doi.org/10.1007/978-3-642-41485-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings ent://SD_ILS/0/SD_ILS:335111 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Riis Nielson, Hanne. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335111.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41488-6">http://dx.doi.org/10.1007/978-3-642-41488-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335209 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335209.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45330-4">http://dx.doi.org/10.1007/978-3-642-45330-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Economics of Financial and Medical Identity Theft ent://SD_ILS/0/SD_ILS:174049 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Camp, L. Jean. author.&#160;Johnson, M. Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1918-1">http://dx.doi.org/10.1007/978-1-4614-1918-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Survey of Data Leakage Detection and Prevention Solutions ent://SD_ILS/0/SD_ILS:174080 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Shabtai, Asaf. author.&#160;Elovici, Yuval. author.&#160;Rokach, Lior. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-2053-8">http://dx.doi.org/10.1007/978-1-4614-2053-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Achieving Systems Safety Proceedings of the Twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012 ent://SD_ILS/0/SD_ILS:173458 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Dale, Chris. editor.&#160;Anderson, Tom. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-2494-8">http://dx.doi.org/10.1007/978-1-4471-2494-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Hacks - Intensivkurs Angriff und Verteidigung mit Python ent://SD_ILS/0/SD_ILS:195598 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Ballmann, Bastian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24305-9">http://dx.doi.org/10.1007/978-3-642-24305-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Protocol Security Analysis Based on Trusted Freshness ent://SD_ILS/0/SD_ILS:195536 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Dong, Ling. author.&#160;Chen, Kefei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24073-7">http://dx.doi.org/10.1007/978-3-642-24073-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Intelligent Information Systems International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195894 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Bouvry, Pascal. editor.&#160;K&#322;opotek, Mieczys&#322;aw A. editor.&#160;Lepr&eacute;vost, Franck. editor.&#160;Marciniak, Ma&#322;gorzata. editor.&#160;Mykowiecka, Agnieszka. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25261-7">http://dx.doi.org/10.1007/978-3-642-25261-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Security and Security Data 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:196019 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;MacKinnon, Lachlan M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25704-9">http://dx.doi.org/10.1007/978-3-642-25704-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Networking 13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196091 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Bononi, Luciano. editor.&#160;Datta, Ajoy K. editor.&#160;Devismes, St&eacute;phane. editor.&#160;Misra, Archan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25959-3">http://dx.doi.org/10.1007/978-3-642-25959-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196237 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Danezis, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27576-0">http://dx.doi.org/10.1007/978-3-642-27576-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196240 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Camenisch, Jan. editor.&#160;Kesdogan, Dogan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27585-2">http://dx.doi.org/10.1007/978-3-642-27585-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:196291 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Jung, Souhwan. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27890-7">http://dx.doi.org/10.1007/978-3-642-27890-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196303 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Aura, Tuomas. editor.&#160;J&auml;rvinen, Kimmo. editor.&#160;Nyberg, Kaisa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2012 The Cryptographers&rsquo; Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 &ndash; March 2, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196309 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Dunkelman, Orr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27954-6">http://dx.doi.org/10.1007/978-3-642-27954-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday ent://SD_ILS/0/SD_ILS:196428 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings ent://SD_ILS/0/SD_ILS:196497 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Degano, Pierpaolo. editor.&#160;Guttman, Joshua D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28641-4">http://dx.doi.org/10.1007/978-3-642-28641-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security VII ent://SD_ILS/0/SD_ILS:196512 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28693-3">http://dx.doi.org/10.1007/978-3-642-28693-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196738 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Laud, Peeter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196796 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Schindler, Werner. editor.&#160;Huss, Sorin A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29912-4">http://dx.doi.org/10.1007/978-3-642-29912-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196805 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Meadows, Catherine. editor.&#160;Fernandez-Gago, Carmen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29963-6">http://dx.doi.org/10.1007/978-3-642-29963-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196822 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Fischlin, Marc. editor.&#160;Buchmann, Johannes. editor.&#160;Manulis, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30057-8">http://dx.doi.org/10.1007/978-3-642-30057-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197124 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Wright, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31680-7">http://dx.doi.org/10.1007/978-3-642-31680-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Networks and Computational Intelligence 6th International Conference on Information Processing, ICIP 2012, Bangalore, India, August 10-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197125 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Venugopal, K. R. editor.&#160;Patnaik, L. M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31686-9">http://dx.doi.org/10.1007/978-3-642-31686-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197291 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32873-2">http://dx.doi.org/10.1007/978-3-642-32873-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197399 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Richa, Andr&eacute;a W. editor.&#160;Scheideler, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33536-5">http://dx.doi.org/10.1007/978-3-642-33536-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems: OTM 2012 Confederated International Conferences: CoopIS, DOA-SVI, and ODBASE 2012, Rome, Italy, September 10-14, 2012. Proceedings, Part I ent://SD_ILS/0/SD_ILS:197406 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Meersman, Robert. editor.&#160;Panetto, Herv&eacute;. editor.&#160;Dillon, Tharam. editor.&#160;Rinderle-Ma, Stefanie. editor.&#160;Dadam, Peter. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33606-5">http://dx.doi.org/10.1007/978-3-642-33606-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems: OTM 2012 Confederated International Conferences: CoopIS, DOA-SVI, and ODBASE 2012, Rome, Italy, September 10-14, 2012. Proceedings, Part II ent://SD_ILS/0/SD_ILS:197409 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Meersman, Robert. editor.&#160;Panetto, Herv&eacute;. editor.&#160;Dillon, Tharam. editor.&#160;Rinderle-Ma, Stefanie. editor.&#160;Dadam, Peter. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33615-7">http://dx.doi.org/10.1007/978-3-642-33615-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197411 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Domingo-Ferrer, Josep. editor.&#160;Tinnirello, Ilenia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33627-0">http://dx.doi.org/10.1007/978-3-642-33627-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197425 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Kotenko, Igor. editor.&#160;Skormin, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33704-8">http://dx.doi.org/10.1007/978-3-642-33704-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197346 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Wang, Guilin. editor.&#160;Qin, Zhiguang. editor.&#160;Jiang, Shaoquan. editor.&#160;Yu, Yong. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33272-2">http://dx.doi.org/10.1007/978-3-642-33272-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197367 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Schmidt, Andreas U. editor.&#160;Russello, Giovanni. editor.&#160;Krontiris, Ioannis. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33392-7">http://dx.doi.org/10.1007/978-3-642-33392-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding High-Dimensional Spaces ent://SD_ILS/0/SD_ILS:197368 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Skillicorn, David B. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33398-9">http://dx.doi.org/10.1007/978-3-642-33398-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197475 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Hanaoka, Goichiro. editor.&#160;Yamauchi, Toshihiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197478 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Chim, Tat Wing. editor.&#160;Yuen, Tsz Hon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197479 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Thampi, Sabu M. editor.&#160;Zomaya, Albert Y. editor.&#160;Strufe, Thorsten. editor.&#160;Alcaraz Calero, Jose M. editor.&#160;Thomas, Tony , 1927-1977 editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34135-9">http://dx.doi.org/10.1007/978-3-642-34135-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Cryptology 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197481 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Armknecht, Frederik. editor.&#160;Lucks, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34159-5">http://dx.doi.org/10.1007/978-3-642-34159-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 &ndash; November 2, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197492 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;J&oslash;sang, Audun. editor.&#160;Carlsson, Bengt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34210-3">http://dx.doi.org/10.1007/978-3-642-34210-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197500 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Grossklags, Jens. editor.&#160;Walrand, Jean. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34266-0">http://dx.doi.org/10.1007/978-3-642-34266-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Programming Languages and Systems 10th Asian Symposium, APLAS 2012, Kyoto, Japan, December 11-13, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197577 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Jhala, Ranjit. editor.&#160;Igarashi, Atsushi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35182-2">http://dx.doi.org/10.1007/978-3-642-35182-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197580 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Lei, Jingsheng. editor.&#160;Wang, Fu Lee. editor.&#160;Li, Mo. editor.&#160;Luo, Yuan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35211-9">http://dx.doi.org/10.1007/978-3-642-35211-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics VIII 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197449 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33962-2">http://dx.doi.org/10.1007/978-3-642-33962-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197597 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Xiang, Yang. editor.&#160;Lopez, Javier. editor.&#160;Kuo, C.-C. Jay. editor.&#160;Zhou, Wanlei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35362-8">http://dx.doi.org/10.1007/978-3-642-35362-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197598 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Mitchell, Chris J. editor.&#160;Tomlinson, Allan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35371-0">http://dx.doi.org/10.1007/978-3-642-35371-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197603 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Pieprzyk, Josef. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;Manulis, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35404-5">http://dx.doi.org/10.1007/978-3-642-35404-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197604 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Lee, Dong Hoon. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35416-8">http://dx.doi.org/10.1007/978-3-642-35416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197516 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Bogdanov, Andrey. editor.&#160;Sanadhya, Somitra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34416-9">http://dx.doi.org/10.1007/978-3-642-34416-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197638 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35764-0">http://dx.doi.org/10.1007/978-3-642-35764-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tunnel und verdeckte Kan&auml;le im Netz Grundlagen, Protokolle, Sicherheit und Methoden ent://SD_ILS/0/SD_ILS:198870 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Wendzel, Steffen. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-2143-0">http://dx.doi.org/10.1007/978-3-8348-2143-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Datenschutz bei Wearable Computing Eine juristische Analyse am Beispiel von Schutzanz&uuml;gen ent://SD_ILS/0/SD_ILS:198950 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Ro&szlig;nagel, Alexander. author.&#160;Jandt, Silke. author.&#160;Skistims, Hendrik. author.&#160;Zirfas, Julia. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-2555-1">http://dx.doi.org/10.1007/978-3-8348-2555-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software Similarity and Classification ent://SD_ILS/0/SD_ILS:173499 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Cesare, Silvio. author.&#160;Xiang, Yang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-2909-7">http://dx.doi.org/10.1007/978-1-4471-2909-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Collaborative Financial Infrastructure Protection Tools, Abstractions, and Middleware ent://SD_ILS/0/SD_ILS:194366 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Baldoni, Roberto. editor.&#160;Chockler, Gregory. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20420-3">http://dx.doi.org/10.1007/978-3-642-20420-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Mobile Apps Mit Business-Apps ins Zeitalter mobiler Gesch&auml;ftsprozesse ent://SD_ILS/0/SD_ILS:194966 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Verclas, Stephan. editor.&#160;Linnhoff-Popien, Claudia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22259-7">http://dx.doi.org/10.1007/978-3-642-22259-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197280 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Decker, Bart. editor.&#160;Chadwick, David W. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32805-3">http://dx.doi.org/10.1007/978-3-642-32805-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technologies 18th EUNICE/ IFIP WG 6.2, 6.6 International Conference, EUNICE 2012, Budapest, Hungary, August 29-31, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197281 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Szab&oacute;, R&oacute;bert. editor.&#160;Vid&aacute;cs, Attila. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32808-4">http://dx.doi.org/10.1007/978-3-642-32808-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Service-Oriented and Cloud Computing First European Conference, ESOCC 2012, Bertinoro, Italy, September 19-21, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197373 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Paoli, Flavio. editor.&#160;Pimentel, Ernesto. editor.&#160;Zavattaro, Gianluigi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33427-6">http://dx.doi.org/10.1007/978-3-642-33427-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197299 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Visconti, Ivan. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32928-9">http://dx.doi.org/10.1007/978-3-642-32928-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197152 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Rajarajan, Muttukrishnan. editor.&#160;Piper, Fred. editor.&#160;Wang, Haining. editor.&#160;Kesidis, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31909-9">http://dx.doi.org/10.1007/978-3-642-31909-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197168 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Safavi-Naini, Reihaneh. editor.&#160;Canetti, Ran. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32009-5">http://dx.doi.org/10.1007/978-3-642-32009-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197328 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Aschenbruck, Nils. editor.&#160;Martini, Peter. editor.&#160;Meier, Michael. editor.&#160;T&ouml;lle, Jens. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33161-9">http://dx.doi.org/10.1007/978-3-642-33161-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197419 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Ortmeier, Frank. editor.&#160;Daniel, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33675-1">http://dx.doi.org/10.1007/978-3-642-33675-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197420 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Ortmeier, Frank. editor.&#160;Daniel, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33678-2">http://dx.doi.org/10.1007/978-3-642-33678-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197609 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Gladyshev, Pavel. editor.&#160;Rogers, Marcus K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35515-8">http://dx.doi.org/10.1007/978-3-642-35515-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197529 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Xu, Li. editor.&#160;Bertino, Elisa. editor.&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34601-9">http://dx.doi.org/10.1007/978-3-642-34601-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modeling Decisions for Artificial Intelligence 9th International Conference, MDAI 2012, Girona, Catalonia, Spain, November 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197533 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Torra, Vicen&ccedil;. editor.&#160;Narukawa, Yasuo. editor.&#160;L&oacute;pez, Beatriz. editor.&#160;Villaret, Mateu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34620-0">http://dx.doi.org/10.1007/978-3-642-34620-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 &ndash; December 3, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197541 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Wu, Chuan-Kun. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet and Distributed Computing Systems 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197553 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Xiang, Yang. editor.&#160;Pathan, Mukaddim. editor.&#160;Tao, Xiaohui. editor.&#160;Wang, Hua. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34883-9">http://dx.doi.org/10.1007/978-3-642-34883-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197557 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Galbraith, Steven. editor.&#160;Nandi, Mridul. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34931-7">http://dx.doi.org/10.1007/978-3-642-34931-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197559 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Wang, Xiaoyun. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197566 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Venkatakrishnan, Venkat. editor.&#160;Goswami, Diganta. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35130-3">http://dx.doi.org/10.1007/978-3-642-35130-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Security, Safety and Sustainability &amp; e-Democracy 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197375 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Georgiadis, Christos K. editor.&#160;Jahankhani, Hamid. editor.&#160;Pimenidis, Elias. editor.&#160;Bashroush, Rabih. editor.&#160;Al-Nemrat, Ameer. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33448-1">http://dx.doi.org/10.1007/978-3-642-33448-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web Information Systems and Mining International Conference, WISM 2012, Chengdu, China, October 26-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197381 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Wang, Fu Lee. editor.&#160;Lei, Jingsheng. editor.&#160;Gong, Zhiguo. editor.&#160;Luo, Xiangfeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33469-6">http://dx.doi.org/10.1007/978-3-642-33469-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197384 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Hevia, Alejandro. editor.&#160;Neven, Gregory. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197303 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Keromytis, Angelos D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32946-3">http://dx.doi.org/10.1007/978-3-642-32946-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2012 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197310 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Prouff, Emmanuel. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33027-8">http://dx.doi.org/10.1007/978-3-642-33027-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197153 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Kim, Howon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security VIII Special Issue on Pattern Recognition for IT Security ent://SD_ILS/0/SD_ILS:197164 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Shi, Yun Q. editor.&#160;Katzenbeisser, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31971-6">http://dx.doi.org/10.1007/978-3-642-31971-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197329 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Foresti, Sara. editor.&#160;Yung, Moti. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33167-1">http://dx.doi.org/10.1007/978-3-642-33167-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Crittografia nel Paese delle Meraviglie ent://SD_ILS/0/SD_ILS:204651 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Venturi, Daniele. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-88-470-2481-6">http://dx.doi.org/10.1007/978-88-470-2481-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RFID. Security and Privacy 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195902 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Juels, Ari. editor.&#160;Paar, Christof. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25286-0">http://dx.doi.org/10.1007/978-3-642-25286-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196459 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Miri, Ali. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28496-0">http://dx.doi.org/10.1007/978-3-642-28496-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends and Applications in Information Communication Technologies Second International Multi Topic Conference, IMTIC 2012, Jamshoro, Pakistan, March 28-30, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196576 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Chowdhry, Bhawani Shankar. editor.&#160;Shaikh, Faisal Karim. editor.&#160;Hussain, Dil Muhammad Akbar. editor.&#160;Uqaili, Muhammad Aslam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28962-0">http://dx.doi.org/10.1007/978-3-642-28962-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196588 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Pointcheval, David. editor.&#160;Johansson, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29011-4">http://dx.doi.org/10.1007/978-3-642-29011-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196562 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Cramer, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28914-9">http://dx.doi.org/10.1007/978-3-642-28914-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection Information Infrastructure Models, Analysis, and Defense ent://SD_ILS/0/SD_ILS:196564 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Lopez, Javier. editor.&#160;Setola, Roberto. editor.&#160;Wolthusen, Stephen D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28920-0">http://dx.doi.org/10.1007/978-3-642-28920-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196613 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Ryan, Mark D. editor.&#160;Smyth, Ben. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29101-2">http://dx.doi.org/10.1007/978-3-642-29101-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Computing, Networking and Security International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196663 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Thilagam, P. Santhi. editor.&#160;Pais, Alwyn Roshan. editor.&#160;Chandrasekaran, K. editor.&#160;Balakrishnan, N. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29280-4">http://dx.doi.org/10.1007/978-3-642-29280-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects of Security and Trust 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:196695 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Barthe, Gilles. editor.&#160;Datta, Anupam. editor.&#160;Etalle, Sandro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29420-4">http://dx.doi.org/10.1007/978-3-642-29420-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196771 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Petkova-Nikova, Svetla. editor.&#160;Pashalidis, Andreas. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29804-2">http://dx.doi.org/10.1007/978-3-642-29804-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wired/Wireless Internet Communication 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196931 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Koucheryavy, Yevgeni. editor.&#160;Mamatas, Lefteris. editor.&#160;Matta, Ibrahim. editor.&#160;Tsaoussidis, Vassilis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30630-3">http://dx.doi.org/10.1007/978-3-642-30630-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196995 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Askoxylakis, Ioannis. editor.&#160;P&ouml;hls, Henrich C. editor.&#160;Posegga, Joachim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pervasive Computing 10th International Conference, Pervasive 2012, Newcastle, UK, June 18-22, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197040 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Kay, Judy. editor.&#160;Lukowicz, Paul. editor.&#160;Tokuda, Hideyuki. editor.&#160;Olivier, Patrick. editor.&#160;Kr&uuml;ger, Antonio. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31205-2">http://dx.doi.org/10.1007/978-3-642-31205-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Networks 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197042 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Kwiecie&#324;, Andrzej. editor.&#160;Gaj, Piotr. editor.&#160;Stera, Piotr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31217-5">http://dx.doi.org/10.1007/978-3-642-31217-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197053 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Bao, Feng. editor.&#160;Samarati, Pierangela. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197072 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Mitrokotsa, Aikaterini. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31410-0">http://dx.doi.org/10.1007/978-3-642-31410-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197080 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Susilo, Willy. editor.&#160;Mu, Yi. editor.&#160;Seberry, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31448-3">http://dx.doi.org/10.1007/978-3-642-31448-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings ent://SD_ILS/0/SD_ILS:197101 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Garcia-Alfaro, Joaquin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31540-4">http://dx.doi.org/10.1007/978-3-642-31540-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web-Age Information Management 13th International Conference, WAIM 2012, Harbin, China, August 18-20, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197200 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Gao, Hong. editor.&#160;Lim, Lipyeow. editor.&#160;Wang, Wei. editor.&#160;Li, Chuan. editor.&#160;Chen, Lei. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32281-5">http://dx.doi.org/10.1007/978-3-642-32281-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197201 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Smith, Adam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32284-6">http://dx.doi.org/10.1007/978-3-642-32284-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197202 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Katsikas, Sokratis. editor.&#160;Quirchmayr, Gerald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32287-7">http://dx.doi.org/10.1007/978-3-642-32287-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197203 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Chen, Liqun. editor.&#160;Yung, Moti. editor.&#160;Zhu, Liehuang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32298-3">http://dx.doi.org/10.1007/978-3-642-32298-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Interactive Theorem Proving Third International Conference, ITP 2012, Princeton, NJ, USA, August 13-15, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197211 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Beringer, Lennart. editor.&#160;Felty, Amy. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32347-8">http://dx.doi.org/10.1007/978-3-642-32347-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet of Things International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197216 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Wang, Yongheng. editor.&#160;Zhang, Xiaoming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32427-7">http://dx.doi.org/10.1007/978-3-642-32427-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business System Management and Engineering From Open Issues to Applications ent://SD_ILS/0/SD_ILS:197218 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Ardagna, Claudio A. editor.&#160;Damiani, Ernesto. editor.&#160;Maciaszek, Leszek A. editor.&#160;Missikoff, Michele. editor.&#160;Parkin, Michael. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32439-0">http://dx.doi.org/10.1007/978-3-642-32439-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multidisciplinary Research and Practice for Information Systems IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197227 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Quirchmayr, Gerald. editor.&#160;Basl, Josef. editor.&#160;You, Ilsun. editor.&#160;Xu, Lida. editor.&#160;Weippl, Edgar. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32498-7">http://dx.doi.org/10.1007/978-3-642-32498-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197250 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Lee, Geuk. editor.&#160;Howard, Daniel. editor.&#160;Kang, Jeong Jin. editor.&#160;&#346;l&#281;zak, Dominik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32645-5">http://dx.doi.org/10.1007/978-3-642-32645-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Critical Infrastructures and Society 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197357 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Hercheui, Magda David. editor.&#160;Whitehouse, Diane. editor.&#160;McIver, William. editor.&#160;Phahlamohlaka, Jackie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33332-3">http://dx.doi.org/10.1007/978-3-642-33332-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Attacks, Intrusions, and Defenses 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197358 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Balzarotti, Davide. editor.&#160;Stolfo, Salvatore J. editor.&#160;Cova, Marco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33338-5">http://dx.doi.org/10.1007/978-3-642-33338-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197259 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Lee, Geuk. editor.&#160;Howard, Daniel. editor.&#160;&#346;l&#281;zak, Dominik. editor.&#160;Hong, You Sik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32692-9">http://dx.doi.org/10.1007/978-3-642-32692-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197365 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Gollmann, Dieter. editor.&#160;Freiling, Felix C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33383-5">http://dx.doi.org/10.1007/978-3-642-33383-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Voting and Identity Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197268 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Kiayias, Aggelos. editor.&#160;Lipmaa, Helger. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32747-6">http://dx.doi.org/10.1007/978-3-642-32747-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197464 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Canteaut, Anne. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34047-5">http://dx.doi.org/10.1007/978-3-642-34047-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197636 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Obaidat, Mohammad S. editor.&#160;Sevillano, Jos&eacute; L. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35755-8">http://dx.doi.org/10.1007/978-3-642-35755-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) ent://SD_ILS/0/SD_ILS:198953 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Fischer-Hellmann, Klaus-Peter. author.&#160;Bischoff, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Das IT-Gesetz: Compliance in der IT-Sicherheit Leitfaden f&uuml;r ein Regelwerk zur IT-Sicherheit im Unternehmen ent://SD_ILS/0/SD_ILS:199084 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Gr&uuml;nendahl, Ralf Torsten. author.&#160;Steinbacher, Andreas F. author.&#160;Will, Peter H.L. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-8283-7">http://dx.doi.org/10.1007/978-3-8348-8283-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Der IT Security Manager Aktuelles Praxiswissen f&uuml;r IT Security Manager und IT-Sicherheitsbeauftragte in Unternehmen und Beh&ouml;rden ent://SD_ILS/0/SD_ILS:199087 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Kersten, Heinrich. author.&#160;Klett, Gerhard. author.&#160;Kersten, Heinrich. editor.&#160;Wolfenstetter, Klaus-Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-8287-5">http://dx.doi.org/10.1007/978-3-8348-8287-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Ubiquitous Computing ent://SD_ILS/0/SD_ILS:207047 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Khalil, Ismail. editor.&#160;Mantoro, Teddy. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.2991/978-94-91216-71-8">http://dx.doi.org/10.2991/978-94-91216-71-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transparent User Authentication Biometrics, RFID and Behavioural Profiling ent://SD_ILS/0/SD_ILS:168600 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Clarke, Nathan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-85729-805-8">http://dx.doi.org/10.1007/978-0-85729-805-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Preserving Privacy in Data Outsourcing ent://SD_ILS/0/SD_ILS:172941 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Foresti, Sara. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7659-8">http://dx.doi.org/10.1007/978-1-4419-7659-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantitative Security Risk Assessment of Enterprise Networks ent://SD_ILS/0/SD_ILS:174032 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Ou, Xinming. author.&#160;Singhal, Anoop. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1860-3">http://dx.doi.org/10.1007/978-1-4614-1860-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Apple's iPad im Enterprise-Einsatz Einsatzm&ouml;glichkeiten, Programmierung, Betrieb und Sicherheit im Unternehmen ent://SD_ILS/0/SD_ILS:192969 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Oelmaier, Florian. author.&#160;H&ouml;rtreiter, Jochen. author.&#160;Seitz, Andreas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15437-9">http://dx.doi.org/10.1007/978-3-642-15437-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2010, Corfu, Greece, September 22-24, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193101 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Domingo-Ferrer, Josep. editor.&#160;Magkos, Emmanouil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15838-4">http://dx.doi.org/10.1007/978-3-642-15838-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:193265 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Bao, Feng. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;Jing, Jiwu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16342-5">http://dx.doi.org/10.1007/978-3-642-16342-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193686 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Jha, Somesh. editor.&#160;Mathuria, Anish. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193761 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Chung, Yongwha. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17955-6">http://dx.doi.org/10.1007/978-3-642-17955-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193823 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Burmester, Mike. editor.&#160;Tsudik, Gene. editor.&#160;Magliveras, Spyros. editor.&#160;Ili&#263;, Ivana. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-18178-8">http://dx.doi.org/10.1007/978-3-642-18178-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Spyware and Adware ent://SD_ILS/0/SD_ILS:167516 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Systems Safety Proceedings of the Nineteenth Safety-Critical Systems Symposium, Southampton, UK, 8-10th February 2011 ent://SD_ILS/0/SD_ILS:168431 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Dale, Chris. editor.&#160;Anderson, Tom. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-85729-133-2">http://dx.doi.org/10.1007/978-0-85729-133-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research ent://SD_ILS/0/SD_ILS:173331 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Keromytis, Angelos D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-9866-8">http://dx.doi.org/10.1007/978-1-4419-9866-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence Management Knowledge Driven Frameworks for Combating Terrorism and Organized Crime ent://SD_ILS/0/SD_ILS:173369 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Akhgar, Babak. editor.&#160;Yates, Simeon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-2140-4">http://dx.doi.org/10.1007/978-1-4471-2140-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194086 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Ishai, Yuval. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19571-6">http://dx.doi.org/10.1007/978-3-642-19571-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:194143 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Degano, Pierpaolo. editor.&#160;Etalle, Sandro. editor.&#160;Guttman, Joshua. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19751-2">http://dx.doi.org/10.1007/978-3-642-19751-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Research on Electronic Commerce, Web Application, and Communication International Conference, ECWAC 2011, Guangzhou, China, April 16-17, 2011. Proceedings, Part I ent://SD_ILS/0/SD_ILS:194345 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Shen, Gang. editor.&#160;Huang, Xiong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20367-1">http://dx.doi.org/10.1007/978-3-642-20367-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194466 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Fehr, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20728-0">http://dx.doi.org/10.1007/978-3-642-20728-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194571 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Ardagna, Claudio A. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194726 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Lai, Xuejia. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21518-6">http://dx.doi.org/10.1007/978-3-642-21518-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-M&aacute;laga, Spain, June 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194663 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Herrero, &Aacute;lvaro. editor.&#160;Corchado, Emilio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21323-6">http://dx.doi.org/10.1007/978-3-642-21323-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Trust Computing, Data Management and Applications 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194993 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Park, James J. editor.&#160;Lopez, Javier. editor.&#160;Yeo, Sang-Soo. editor.&#160;Shon, Taeshik. editor.&#160;Taniar, David. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22339-6">http://dx.doi.org/10.1007/978-3-642-22339-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXV 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194997 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Li, Yingjiu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22348-8">http://dx.doi.org/10.1007/978-3-642-22348-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:195089 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Camenisch, Jan. editor.&#160;Lambrinoudakis, Costas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22633-5">http://dx.doi.org/10.1007/978-3-642-22633-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Parallel and Distributed Computing and Networks International Conference, PDCN 2010, Chongqing, China, December 13-14, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:195111 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Qi, Luo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22706-6">http://dx.doi.org/10.1007/978-3-642-22706-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VI FOSAD Tutorial Lectures ent://SD_ILS/0/SD_ILS:195231 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Aldini, Alessandro. editor.&#160;Gorrieri, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23082-0">http://dx.doi.org/10.1007/978-3-642-23082-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195578 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Rhee, Kyung-Hyune. editor.&#160;Nyang, DaeHun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 30th International Conference,SAFECOMP 2011, Naples, Italy, September 19-22, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195586 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Flammini, Francesco. editor.&#160;Bologna, Sandro. editor.&#160;Vittorini, Valeria. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24270-0">http://dx.doi.org/10.1007/978-3-642-24270-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 5th International Conference, ProvSec 2011, Xi&rsquo;an, China, October 16-18, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195600 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Boyen, Xavier. editor.&#160;Chen, Xiaofeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24316-5">http://dx.doi.org/10.1007/978-3-642-24316-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection V 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195772 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24864-1">http://dx.doi.org/10.1007/978-3-642-24864-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195888 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Qing, Sihan. editor.&#160;Susilo, Willy. editor.&#160;Wang, Guilin. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 14th International Conference, ISC 2011, Xi&rsquo;an, China, October 26-29, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195771 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Lai, Xuejia. editor.&#160;Zhou, Jianying. editor.&#160;Li, Hui. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24861-0">http://dx.doi.org/10.1007/978-3-642-24861-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195856 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Iwata, Tetsu. editor.&#160;Nishigaki, Masakatsu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Counterterrorism and Open Source Intelligence ent://SD_ILS/0/SD_ILS:197734 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Wiil, Uffe Kock. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-7091-0388-3">http://dx.doi.org/10.1007/978-3-7091-0388-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Metriken &ndash; der Schl&uuml;ssel zum erfolgreichen Security und Compliance Monitoring Design, Implementierung und Validierung in der Praxis ent://SD_ILS/0/SD_ILS:199028 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Sowa, Aleksandra. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-8194-6">http://dx.doi.org/10.1007/978-3-8348-8194-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats ent://SD_ILS/0/SD_ILS:173823 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;Wang, X. Sean. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Model-Driven Risk Analysis The CORAS Approach ent://SD_ILS/0/SD_ILS:191958 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Lund, Mass Soldal. author.&#160;Solhaug, Bj&oslash;rnar. author.&#160;St&oslash;len, Ketil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12323-8">http://dx.doi.org/10.1007/978-3-642-12323-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Networking 12th International Conference, ICDCN 2011, Bangalore, India, January 2-5, 2011. Proceedings ent://SD_ILS/0/SD_ILS:193675 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Aguilera, Marcos K. editor.&#160;Yu, Haifeng. editor.&#160;Vaidya, Nitin H. editor.&#160;Srinivasan, Vikram. editor.&#160;Choudhury, Romit Roy. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17679-1">http://dx.doi.org/10.1007/978-3-642-17679-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2011 The Cryptographers&rsquo; Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings ent://SD_ILS/0/SD_ILS:193925 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Kiayias, Aggelos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19074-2">http://dx.doi.org/10.1007/978-3-642-19074-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 &ndash; June 1, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194568 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Bao, Feng. editor.&#160;Weng, Jian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194738 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Lopez, Javier. editor.&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wired/Wireless Internet Communications 9th IFIP TC 6 International Conference, WWIC 2011, Vilanova i la Geltr&uacute;, Spain, June 15-17, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194740 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Masip-Bruin, Xavier. editor.&#160;Verchere, Dominique. editor.&#160;Tsaoussidis, Vassilis. editor.&#160;Yannuzzi, Marcelo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21560-5">http://dx.doi.org/10.1007/978-3-642-21560-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194789 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Joux, Antoine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21702-9">http://dx.doi.org/10.1007/978-3-642-21702-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Networks 18th Conference, CN 2011, Ustron, Poland, June 14-18, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194812 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Kwiecie&#324;, Andrzej. editor.&#160;Gaj, Piotr. editor.&#160;Stera, Piotr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21771-5">http://dx.doi.org/10.1007/978-3-642-21771-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2011 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194876 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Nitaj, Abderrahmane. editor.&#160;Pointcheval, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21969-6">http://dx.doi.org/10.1007/978-3-642-21969-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194968 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Hopper, Nicholas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22263-4">http://dx.doi.org/10.1007/978-3-642-22263-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2011 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195141 2024-08-28T20:32:23Z 2024-08-28T20:32:23Z Author&#160;Rogaway, Phillip. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22792-9">http://dx.doi.org/10.1007/978-3-642-22792-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>