Search Results for 0 - Narrowed by: Data encryption (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d0$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?
2025-12-28T08:57:15Z
Trusted Computing Platforms TPM2.0 in Context
ent://SD_ILS/0/SD_ILS:488634
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Proudler, Graeme. author. Chen, Liqun. author. Dalton, Chris. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Nature-Inspired Approach to Cryptology
ent://SD_ILS/0/SD_ILS:528952
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Shandilya, Shishir Kumar. author. Datta, Agni. author. Nagar, Atulya K. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-7081-0">https://doi.org/10.1007/978-981-99-7081-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – LATINCRYPT 2017 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20–22, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486418
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Lange, Tanja. editor. Dunkelman, Orr. editor. (orcid)0000-0001-5799-2635 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-25283-0">https://doi.org/10.1007/978-3-030-25283-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Science 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:483409
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Cheng, Xiaohui. editor. Jing, Weipeng. editor. Song, Xianhua. editor. Lu, Zeguang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-0118-0">https://doi.org/10.1007/978-981-15-0118-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484847
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Askarov, Aslan. editor. Hansen, René Rydhof. editor. Rafnsson, Willard. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ethical and Secure Computing A Concise Module
ent://SD_ILS/0/SD_ILS:485494
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03937-0">https://doi.org/10.1007/978-3-030-03937-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Electronic Voting 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1–4, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:487066
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Krimmer, Robert. editor. (orcid)0000-0002-0873-539X Volkamer, Melanie. editor. (orcid)0000-0003-2674-4043 Cortier, Veronique. editor. Beckert, Bernhard. editor. (orcid)0000-0002-9672-3291 Küsters, Ralf. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30625-0">https://doi.org/10.1007/978-3-030-30625-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399614
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Catalano, Dario. editor. De Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:399719
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Shacham, Hovav. editor. Boldyreva, Alexandra. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-96878-0">https://doi.org/10.1007/978-3-319-96878-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Secure Systems – IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:400428
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Venkataramani, Guru Prasadh. editor. Sankaranarayanan, Karthik. editor. Mukherjee, Saswati. editor. Arputharaj, Kannan. editor. Sankara Narayanan, Swamynathan. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2018 The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400594
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Smart, Nigel P. editor. (orcid)0000-0003-3567-3304 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-76953-0">https://doi.org/10.1007/978-3-319-76953-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Constructive Side-Channel Analysis and Secure Design 9th International Workshop, COSADE 2018, Singapore, April 23–24, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400637
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Fan, Junfeng. editor. Gierlichs, Benedikt. editor. (orcid)0000-0002-5866-1990 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-89641-0">https://doi.org/10.1007/978-3-319-89641-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:400161
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Shacham, Hovav. editor. Boldyreva, Alexandra. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-96881-0">https://doi.org/10.1007/978-3-319-96881-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11–13, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400479
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Negi, Atul. editor. (orcid)0000-0001-5707-130X Bhatnagar, Raj. editor. Parida, Laxmi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401487
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Preneel, Bart. editor. (orcid)0000-0003-2005-9651 Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401734
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Doss, Robin. editor. (orcid)0000-0001-6143-6850 Piramuthu, Selwyn. editor. Zhou, Wei. editor. (orcid)0000-0002-9965-9870 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400077
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Castiglione, Arcangelo. editor. Pop, Florin. editor. Ficco, Massimo. editor. Palmieri, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485793
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Chow, Sherman S.M. editor. Camenisch, Jan. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488920
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Prouff, Emmanuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10175-0">https://doi.org/10.1007/978-3-319-10175-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488961
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Krawczyk, Hugo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:485473
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Jürjens, Jan. editor. Piessens, Frank. editor. Bielova, Nataliia. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04897-0">https://doi.org/10.1007/978-3-319-04897-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace Safety and Security 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:332984
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Wang, Guojun. editor. Ray, Indrakshi. editor. Feng, Dengguo. editor. Rajarajan, Muttukrishnan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332984.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03584-0">http://dx.doi.org/10.1007/978-3-319-03584-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Assessment in Vehicular Networks
ent://SD_ILS/0/SD_ILS:332479
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Du, Suguo. author. Zhu, Haojin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332479.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:335160
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335197
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Stam, Martijn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335197.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters
ent://SD_ILS/0/SD_ILS:330758
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Futral, William. author. Greene, James. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330758.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-6149-0">http://dx.doi.org/10.1007/978-1-4302-6149-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335076
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Gierlichs, Benedikt. editor. Guilley, Sylvain. editor. Mukhopadhyay, Debdeep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335076.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
RFID. Security and Privacy 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195902
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Juels, Ari. editor. Paar, Christof. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25286-0">http://dx.doi.org/10.1007/978-3-642-25286-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection Information Infrastructure Models, Analysis, and Defense
ent://SD_ILS/0/SD_ILS:196564
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Lopez, Javier. editor. Setola, Roberto. editor. Wolthusen, Stephen D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28920-0">http://dx.doi.org/10.1007/978-3-642-28920-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Systems 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197598
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Mitchell, Chris J. editor. Tomlinson, Allan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35371-0">http://dx.doi.org/10.1007/978-3-642-35371-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols XX 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197629
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Christianson, Bruce. editor. Malcolm, James. editor. Stajano, Frank. editor. Anderson, Jonathan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35694-0">http://dx.doi.org/10.1007/978-3-642-35694-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196459
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Miri, Ali. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28496-0">http://dx.doi.org/10.1007/978-3-642-28496-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sequences and Their Applications – SETA 2012 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196928
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Helleseth, Tor. editor. Jedwab, Jonathan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30615-0">http://dx.doi.org/10.1007/978-3-642-30615-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197072
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Mitrokotsa, Aikaterini. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31410-0">http://dx.doi.org/10.1007/978-3-642-31410-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday
ent://SD_ILS/0/SD_ILS:196428
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Naccache, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196237
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Danezis, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27576-0">http://dx.doi.org/10.1007/978-3-642-27576-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations and Practice of Security 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196294
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Garcia-Alfaro, Joaquin. editor. Lafourcade, Pascal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27901-0">http://dx.doi.org/10.1007/978-3-642-27901-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Prime Numbers and Computer Methods for Factorization
ent://SD_ILS/0/SD_ILS:168374
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Riesel, Hans. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-8176-8298-9">http://dx.doi.org/10.1007/978-0-8176-8298-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197411
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Domingo-Ferrer, Josep. editor. Tinnirello, Ilenia. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33627-0">http://dx.doi.org/10.1007/978-3-642-33627-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195578
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Rhee, Kyung-Hyune. editor. Nyang, DaeHun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics VII 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 – February 2, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195579
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24212-0">http://dx.doi.org/10.1007/978-3-642-24212-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195931
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Biometrics
ent://SD_ILS/0/SD_ILS:167461
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Jain, Anil K. author. Ross, Arun A. author. Nandakumar, Karthik. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77326-1">http://dx.doi.org/10.1007/978-0-387-77326-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194568
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Bao, Feng. editor. Weng, Jian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Challenges in Security and Privacy for Academia and Industry 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194696
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Camenisch, Jan. editor. Fischer-Hübner, Simone. editor. Murayama, Yuko. editor. Portmann, Armand. editor. Rieder, Carlos. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21424-0">http://dx.doi.org/10.1007/978-3-642-21424-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Security Analysis and Design VI FOSAD Tutorial Lectures
ent://SD_ILS/0/SD_ILS:195231
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Aldini, Alessandro. editor. Gorrieri, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23082-0">http://dx.doi.org/10.1007/978-3-642-23082-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Advances in Intrusion Detection 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195403
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Sommer, Robin. editor. Balzarotti, Davide. editor. Maier, Gregor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23644-0">http://dx.doi.org/10.1007/978-3-642-23644-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identity-Based Encryption
ent://SD_ILS/0/SD_ILS:173195
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Chatterjee, Sanjit. author. Sarkar, Palash. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-9383-0">http://dx.doi.org/10.1007/978-1-4419-9383-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194466
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Fehr, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20728-0">http://dx.doi.org/10.1007/978-3-642-20728-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
NETWORKING 2011 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:194477
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Domingo-Pascual, Jordi. editor. Manzoni, Pietro. editor. Palazzo, Sergio. editor. Pont, Ana. editor. Scoglio, Caterina. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20757-0">http://dx.doi.org/10.1007/978-3-642-20757-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman
ent://SD_ILS/0/SD_ILS:195100
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Goldreich, Oded. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22670-0">http://dx.doi.org/10.1007/978-3-642-22670-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195771
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Lai, Xuejia. editor. Zhou, Jianying. editor. Li, Hui. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24861-0">http://dx.doi.org/10.1007/978-3-642-24861-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193245
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Heng, Swee-Huay. editor. Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16280-0">http://dx.doi.org/10.1007/978-3-642-16280-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Einführung in die Kryptographie
ent://SD_ILS/0/SD_ILS:191605
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Buchmann, Johannes. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11186-0">http://dx.doi.org/10.1007/978-3-642-11186-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Networked Services and Applications - Engineering, Control and Management 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192508
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Aagesen, Finn Arve. editor. Knapskog, Svein Johan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13971-0">http://dx.doi.org/10.1007/978-3-642-13971-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security
ent://SD_ILS/0/SD_ILS:167094
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Huang, Scott C.-H. editor. MacCallum, David. editor. Du, Ding-Zhu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-73821-5">http://dx.doi.org/10.1007/978-0-387-73821-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ethical and Social Issues in the Information Age
ent://SD_ILS/0/SD_ILS:176135
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84996-038-0">http://dx.doi.org/10.1007/978-1-84996-038-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust and Trustworthy Computing Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192475
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Acquisti, Alessandro. editor. Smith, Sean W. editor. Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13869-0">http://dx.doi.org/10.1007/978-3-642-13869-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Statistical Steganalysis
ent://SD_ILS/0/SD_ILS:192611
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Böhme, Rainer. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14313-7">http://dx.doi.org/10.1007/978-3-642-14313-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digitale Fernseh- und Hörfunktechnik in Theorie und Praxis MPEG-Basisbandcodierung, DVB-, DAB-, ATSC-, ISDB-T-Übertragungstechnik, Messtechnik
ent://SD_ILS/0/SD_ILS:192855
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Fischer, Walter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15047-0">http://dx.doi.org/10.1007/978-3-642-15047-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Technology 4th International Conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193380
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Papasratorn, Borworn. editor. Lavangnananda, Kittichai. editor. Chutimaskul, Wichian. editor. Vanijja, Vajirasak. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16699-0">http://dx.doi.org/10.1007/978-3-642-16699-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193666
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Soriano, Miguel. editor. Qing, Sihan. editor. López, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Intrusion Detection and Prevention Concepts and Techniques
ent://SD_ILS/0/SD_ILS:167906
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Ghorbani, Ali A. author. Lu, Wei. author. Tavallaee, Mahbod. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88771-5">http://dx.doi.org/10.1007/978-0-387-88771-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elements of Computer Security
ent://SD_ILS/0/SD_ILS:168393
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Salomon, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-85729-006-9">http://dx.doi.org/10.1007/978-0-85729-006-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses
ent://SD_ILS/0/SD_ILS:171498
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Snyder, Chris. author. Myer, Thomas. author. Southwell, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-3319-0">http://dx.doi.org/10.1007/978-1-4302-3319-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Signatures
ent://SD_ILS/0/SD_ILS:165432
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Katz, Jonathan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-27712-7">http://dx.doi.org/10.1007/978-0-387-27712-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems, Technology and Management 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191868
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Prasad, Sushil K. editor. Vin, Harrick M. editor. Sahni, Sartaj. editor. Jaiswal, Mahadeo P. editor. Thipakorn, Bundit. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12035-0">http://dx.doi.org/10.1007/978-3-642-12035-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Decision and Game Theory for Security First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193524
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Alpcan, Tansu. editor. Buttyán, Levente. editor. Baras, John S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17197-0">http://dx.doi.org/10.1007/978-3-642-17197-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Engineering
ent://SD_ILS/0/SD_ILS:166887
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Koç, Çetin Kaya. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-71817-0">http://dx.doi.org/10.1007/978-0-387-71817-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Biometrics
ent://SD_ILS/0/SD_ILS:167010
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Li, Stan Z. editor. Jain, Anil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-73003-5">http://dx.doi.org/10.1007/978-0-387-73003-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Multi-Party Non-Repudiation Protocols and Applications
ent://SD_ILS/0/SD_ILS:167284
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Onieva, José A. author. Lopez, Javier. author. Zhou, Jianying. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primality Testing and Integer Factorization in Public-Key Cryptography
ent://SD_ILS/0/SD_ILS:167452
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open Source Systems Security Certification
ent://SD_ILS/0/SD_ILS:167460
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Damiani, Ernesto. author. Ardagna, Claudio Agostino. author. El Ioini, Nabil. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77324-7">http://dx.doi.org/10.1007/978-0-387-77324-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189928
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Gritzalis, Dimitris. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01244-0">http://dx.doi.org/10.1007/978-3-642-01244-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191095
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Christianson, Bruce. editor. Crispo, Bruno. editor. Malcolm, James A. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04904-0">http://dx.doi.org/10.1007/978-3-642-04904-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Security Technology International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191311
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Kim, Haeng-kon. editor. Kim, Tai-hoon. editor. Kiumi, Akingbehin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10240-0">http://dx.doi.org/10.1007/978-3-642-10240-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing Information Risk and the Economics of Security
ent://SD_ILS/0/SD_ILS:164782
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Johnson, M. Eric. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09762-6">http://dx.doi.org/10.1007/978-0-387-09762-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Initiatives to Secure Cyberspace An Emerging Landscape
ent://SD_ILS/0/SD_ILS:164783
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Portnoy, Michael. editor. Goodman, Seymour. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Coding and Cryptology Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190149
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Chee, Yeow Meng. editor. Li, Chao. editor. Ling, San. editor. Wang, Huaxiong. editor. Xing, Chaoping. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01877-0">http://dx.doi.org/10.1007/978-3-642-01877-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Watermarking 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190703
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Ho, Anthony T. S. editor. Shi, Yun Q. editor. Kim, H. J. editor. Barni, Mauro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03688-0">http://dx.doi.org/10.1007/978-3-642-03688-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Advances in Intrusion Detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190920
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Kirda, Engin. editor. Jha, Somesh. editor. Balzarotti, Davide. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04342-0">http://dx.doi.org/10.1007/978-3-642-04342-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Watermarking 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008. Selected Papers
ent://SD_ILS/0/SD_ILS:190948
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Kim, Hyoung-Joong. editor. Katzenbeisser, Stefan. editor. Ho, Anthony T. S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04438-0">http://dx.doi.org/10.1007/978-3-642-04438-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
RFID Security Techniques, Protocols and System-on-Chip Design
ent://SD_ILS/0/SD_ILS:167344
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Kitsos, Paris. editor. Zhang, Yan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-76481-8">http://dx.doi.org/10.1007/978-0-387-76481-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Algebraic Cryptanalysis
ent://SD_ILS/0/SD_ILS:167905
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Bard, Gregory V. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88757-9">http://dx.doi.org/10.1007/978-0-387-88757-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identifying Malicious Code Through Reverse Engineering
ent://SD_ILS/0/SD_ILS:167947
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Singh, Abhishek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Biometric System and Data Analysis Design, Evaluation, and Data Mining
ent://SD_ILS/0/SD_ILS:167497
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Dunstone, Ted. editor. Yager, Neil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77627-9">http://dx.doi.org/10.1007/978-0-387-77627-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Key Establishment
ent://SD_ILS/0/SD_ILS:167859
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Choo, Kim-Kwang Raymond. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-87969-7">http://dx.doi.org/10.1007/978-0-387-87969-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network-Aware Security for Group Communications
ent://SD_ILS/0/SD_ILS:166640
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Sun, Yan. author. Trappe, Wade. author. Liu, K. J. R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68848-0">http://dx.doi.org/10.1007/978-0-387-68848-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Preserving Data Mining Models and Algorithms
ent://SD_ILS/0/SD_ILS:166794
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Aggarwal, Charu C. editor. Yu, Philip S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-70992-5">http://dx.doi.org/10.1007/978-0-387-70992-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Biometrics
ent://SD_ILS/0/SD_ILS:166799
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Jain, Anil K. editor. Flynn, Patrick. editor. Ross, Arun A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-71041-9">http://dx.doi.org/10.1007/978-0-387-71041-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Cards, Tokens, Security and Applications
ent://SD_ILS/0/SD_ILS:166922
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Mayes, Keith E. author. Markantonakis, Konstantinos. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Attack and Cyber Security Beyond the Hacker
ent://SD_ILS/0/SD_ILS:167459
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Stolfo, Salvatore J. editor. Bellovin, Steven M. editor. Keromytis, Angelos D. editor. Hershkop, Shlomo. editor. Smith, Sean W. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185647
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Bellovin, Steven M. editor. Gennaro, Rosario. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188832
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Akar, Nail. editor. Pioro, Michal. editor. Skianis, Charalabos. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Database Security Applications and Trends
ent://SD_ILS/0/SD_ILS:166409
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Gertz, Michael. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptanalytic Attacks on RSA
ent://SD_ILS/0/SD_ILS:166422
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing Biometrics Applications
ent://SD_ILS/0/SD_ILS:166745
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Shoniregun, Charles A. author. Crosier, Stephen. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Telecommunications Networks
ent://SD_ILS/0/SD_ILS:166945
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Traynor, Patrick. author. McDaniel, Patrick. author. Porta, Thomas La. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185962
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Mu, Yi. editor. Susilo, Willy. editor. Seberry, Jennifer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185981
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Zamboni, Diego. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Random Curves Journeys of a Mathematician
ent://SD_ILS/0/SD_ILS:187049
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Koblitz, Neal. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74078-0">http://dx.doi.org/10.1007/978-3-540-74078-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vulnerability Analysis and Defense for the Internet
ent://SD_ILS/0/SD_ILS:167162
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Singh, Abhishek. editor. Singh, Baibhav. editor. Joseph, Hirosh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An Introduction to Mathematical Cryptography
ent://SD_ILS/0/SD_ILS:167545
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Silverman, J.H. author. Pipher, Jill. author. Hoffstein, Jeffrey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Power Analysis Attacks Revealing the Secrets of Smart Cards
ent://SD_ILS/0/SD_ILS:166230
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Mangard, Stefan. author. Oswald, Elisabeth. author. Popp, Thomas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-38162-6">http://dx.doi.org/10.1007/978-0-387-38162-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Reliable Face Recognition Methods System Design, Impementation and Evaluation
ent://SD_ILS/0/SD_ILS:166247
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Wechsler, Harry. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-38464-1">http://dx.doi.org/10.1007/978-0-387-38464-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware Detection
ent://SD_ILS/0/SD_ILS:166294
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Christodorescu, Mihai. editor. Jha, Somesh. editor. Maughan, Douglas. editor. Song, Dawn. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Electronic Postage Systems Technology, Security, Economics
ent://SD_ILS/0/SD_ILS:166296
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Bleumer, Gerrit. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security Policies and Procedures
ent://SD_ILS/0/SD_ILS:166393
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Frye, Douglas W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Wireless Sensor Networks
ent://SD_ILS/0/SD_ILS:166353
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Liu, Donggang. author. Ning, Peng. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Warehousing and Data Mining Techniques for Cyber Security
ent://SD_ILS/0/SD_ILS:166379
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Synchronizing Internet Protocol Security (SIPSec)
ent://SD_ILS/0/SD_ILS:166600
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Identity Theft: Avoidance, Causes and Possible Cures
ent://SD_ILS/0/SD_ILS:166606
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Camp, L. Jean. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Online Business Security Systems
ent://SD_ILS/0/SD_ILS:166641
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Williams, Godfried B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Variable-length Codes for Data Compression
ent://SD_ILS/0/SD_ILS:175645
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Salomon, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84628-959-0">http://dx.doi.org/10.1007/978-1-84628-959-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Preserving Privacy in On-Line Analytical Processing (OLAP)
ent://SD_ILS/0/SD_ILS:166336
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Wang, Lingyu. author. Jajodia, Sushil. author. Wijesekera, Duminda. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ent://SD_ILS/0/SD_ILS:166337
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Poovendran, Radha. editor. Roy, Sumit. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187773
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Qing, Sihan. editor. Imai, Hideki. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186886
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Barker, Steve. editor. Ahn, Gail-Joon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Advances in Intrusion Detection 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187122
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Kruegel, Christopher. editor. Lippmann, Richard. editor. Clark, Andrew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74320-0">http://dx.doi.org/10.1007/978-3-540-74320-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Management in Decentralized Systems
ent://SD_ILS/0/SD_ILS:165430
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Yu, Ting. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Internet Security
ent://SD_ILS/0/SD_ILS:165679
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Vacca, John R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless Network Security
ent://SD_ILS/0/SD_ILS:165912
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Xiao, Yang. editor. Shen, Xuemin Sherman. editor. Du, Ding-Zhu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-33112-6">http://dx.doi.org/10.1007/978-0-387-33112-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quality of Protection Security Measurements and Metrics
ent://SD_ILS/0/SD_ILS:166159
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Gollmann, Dieter. editor. Massacci, Fabio. editor. Yautsiukhin, Artsiom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Exercise Book
ent://SD_ILS/0/SD_ILS:165571
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Baigèneres, Thomas. author. Lu, Yi. author. Vaudenay, Serge. author. Junod, Pascal. author. Monnerat, Jean. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Viruses and Malware
ent://SD_ILS/0/SD_ILS:166010
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CryptoGraphics Exploiting Graphics Cards for Security
ent://SD_ILS/0/SD_ILS:166011
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Cook, Debra L. author. Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Algebraic Aspects of the Advanced Encryption Standard
ent://SD_ILS/0/SD_ILS:166179
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Cid, Carlos. author. Murphy, Sean. author. Robshaw, Matthew. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36842-9">http://dx.doi.org/10.1007/978-0-387-36842-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multivariate Public Key Cryptosystems
ent://SD_ILS/0/SD_ILS:166190
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Ding, Jintai. author. Gower, Jason E. author. Schmidt, Dieter S. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Intrusion Detection Through Visualization
ent://SD_ILS/0/SD_ILS:165418
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Axelsson, Stefan. author. Sands, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Access Control Systems Security, Identity Management and Trust Models
ent://SD_ILS/0/SD_ILS:165433
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Benantar, Messaoud. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Biometric User Authentication for it Security From Fundamentals to Handwriting
ent://SD_ILS/0/SD_ILS:165467
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Vielhauer, Claus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hop Integrity in the Internet
ent://SD_ILS/0/SD_ILS:165645
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Huang, Chin-Tser. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Unconstrained Face Recognition
ent://SD_ILS/0/SD_ILS:165650
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Zhou, Shaohua Kevin. author. Chellappa, Rama. author. Zhao, Wenyi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29486-5">http://dx.doi.org/10.1007/978-0-387-29486-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Preserving Data Mining
ent://SD_ILS/0/SD_ILS:165653
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Vaidya, Jaideep. author. Zhu, Yu Michael. author. Clifton, Christopher W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Wireless Network Security
ent://SD_ILS/0/SD_ILS:165680
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Vacca, John R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Multibiometrics
ent://SD_ILS/0/SD_ILS:165914
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Ross, Arun A. author. Jain, Anil K. author. Nandakumar, Karthik. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-33123-9">http://dx.doi.org/10.1007/0-387-33123-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:164930
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Modern Number Theory Fundamental Problems, Ideas and Theories
ent://SD_ILS/0/SD_ILS:181540
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Manin, Yuri Ivanovic. author. Panchishkin, Alexei A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-27692-0">http://dx.doi.org/10.1007/3-540-27692-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E’2005), October 28–30, 2005, Poznan, Poland
ent://SD_ILS/0/SD_ILS:165672
2025-12-28T08:57:15Z
2025-12-28T08:57:15Z
Author Funabashi, Matohisa. editor. Grzech, Adam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-29773-1">http://dx.doi.org/10.1007/0-387-29773-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>