Search Results for 2 - Narrowed by: Data encryption (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d2$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300? 2025-12-24T16:33:38Z Financial Cryptography and Data Security FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura&ccedil;ao, March 2, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484585 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Zohar, Aviv. editor.&#160;Eyal, Ittay. editor.&#160;Teague, Vanessa. editor. (orcid)0000-0003-2648-2565&#160;Clark, Jeremy. editor.&#160;Bracciali, Andrea. editor. (orcid)0000-0003-1451-9260<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-58820-8">https://doi.org/10.1007/978-3-662-58820-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22&ndash;24, 2019, Proceedings - In Honor of Said El Hajji ent://SD_ILS/0/SD_ILS:483462 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Carlet, Claude. editor.&#160;Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534&#160;Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757&#160;Souidi, El Mamoun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algebra, Codes and Cryptology First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484860 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Gueye, Cheikh Thiecoumba. editor.&#160;Persichetti, Edoardo. editor. (orcid)0000-0002-1895-377X&#160;Cayrel, Pierre-Louis. editor.&#160;Buchmann, Johannes. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36237-9">https://doi.org/10.1007/978-3-030-36237-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2019 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2&ndash;4, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484918 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Schwabe, Peter. editor.&#160;Th&eacute;riault, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30530-7">https://doi.org/10.1007/978-3-030-30530-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:399520 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526&#160;Quaglia, Elizabeth A. editor.&#160;Tomasin, Stefano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:399545 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03332-3">https://doi.org/10.1007/978-3-030-03332-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399923 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03326-2">https://doi.org/10.1007/978-3-030-03326-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28&ndash;29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402215 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Hancke, Gerhard P. editor.&#160;Damiani, Ernesto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401487 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651&#160;Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:399086 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03329-3">https://doi.org/10.1007/978-3-030-03329-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 16th International Conference, CANS 2017, Hong Kong, China, November 30&mdash;December 2, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399347 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Capkun, Srdjan. editor.&#160;Chow, Sherman S. M. editor. (orcid)0000-0001-7306-453X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02641-7">https://doi.org/10.1007/978-3-030-02641-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400326 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Krimmer, Robert. editor. (orcid)0000-0002-0873-539X&#160;Volkamer, Melanie. editor. (orcid)0000-0003-2674-4043&#160;Cortier, V&eacute;ronique. editor.&#160;Gor&eacute;, Rajeev. editor.&#160;Hapsara, Manik. editor. (orcid)0000-0002-8653-063X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:488634 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Proudler, Graeme. author.&#160;Chen, Liqun. author.&#160;Dalton, Chris. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489541 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Naccache, David. editor.&#160;Sauveron, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334132 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Hoepman, Jaap-Henk. editor.&#160;Verbauwhede, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334132.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334616 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Cavallaro, Lorenzo. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334616.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334958 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Cuzzocrea, Alfredo. editor.&#160;Kittl, Christian. editor.&#160;Simos, Dimitris E. editor.&#160;Weippl, Edgar. editor.&#160;Xu, Lida. editor.<br/>Preferred Shelf Number&#160;ONLINE(334958.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Engineering and Intelligence Informatics CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334975 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Cuzzocrea, Alfredo. editor.&#160;Kittl, Christian. editor.&#160;Simos, Dimitris E. editor.&#160;Weippl, Edgar. editor.&#160;Xu, Lida. editor.<br/>Preferred Shelf Number&#160;ONLINE(334975.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40588-4">http://dx.doi.org/10.1007/978-3-642-40588-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May 28 &ndash; June 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334049 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Yuan, Yuyu. editor.&#160;Wu, Xu. editor.&#160;Lu, Yueming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334049.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35795-4">http://dx.doi.org/10.1007/978-3-642-35795-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197559 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Wang, Xiaoyun. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Applications for Security, Control and System Engineering International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197586 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Kim, Tai-hoon. editor.&#160;Stoica, Adrian. editor.&#160;Fang, Wai-chi. editor.&#160;Vasilakos, Thanos. editor.&#160;Villalba, Javier Garc&iacute;a. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35264-5">http://dx.doi.org/10.1007/978-3-642-35264-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2012 The Cryptographers&rsquo; Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 &ndash; March 2, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196309 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Dunkelman, Orr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27954-6">http://dx.doi.org/10.1007/978-3-642-27954-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Internet Technology 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196340 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Ramanujam, R. editor.&#160;Ramaswamy, Srini. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28073-3">http://dx.doi.org/10.1007/978-3-642-28073-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196995 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Askoxylakis, Ioannis. editor.&#160;P&ouml;hls, Henrich C. editor.&#160;Posegga, Joachim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management for Life 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197123 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Camenisch, Jan. editor.&#160;Crispo, Bruno. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Leenes, Ronald. editor.&#160;Russello, Giovanni. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31668-5">http://dx.doi.org/10.1007/978-3-642-31668-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197303 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Keromytis, Angelos D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32946-3">http://dx.doi.org/10.1007/978-3-642-32946-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197536 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Blyth, Jim. editor.&#160;Dietrich, Sven. editor.&#160;Camp, L. Jean. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34638-5">http://dx.doi.org/10.1007/978-3-642-34638-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197153 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Kim, Howon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197384 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Hevia, Alejandro. editor.&#160;Neven, Gregory. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 &ndash; November 2, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197492 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;J&oslash;sang, Audun. editor.&#160;Carlsson, Bengt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34210-3">http://dx.doi.org/10.1007/978-3-642-34210-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194571 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Ardagna, Claudio A. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics VII 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 &ndash; February 2, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195579 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24212-0">http://dx.doi.org/10.1007/978-3-642-24212-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196143 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27257-8">http://dx.doi.org/10.1007/978-3-642-27257-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Spaces and Next Generation Wired/Wireless Networking 11th International Conference, NEW2AN 2011, and 4th Conference on Smart Spaces, ruSMART 2011, St. Petersburg, Russia, August 22-25, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195166 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Balandin, Sergey. editor.&#160;Koucheryavy, Yevgeni. editor.&#160;Hu, Honglin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22875-9">http://dx.doi.org/10.1007/978-3-642-22875-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195171 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Furnell, Steven. editor.&#160;Lambrinoudakis, Costas. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22890-2">http://dx.doi.org/10.1007/978-3-642-22890-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings ent://SD_ILS/0/SD_ILS:195377 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23556-6">http://dx.doi.org/10.1007/978-3-642-23556-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 &ndash; December 2, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195937 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Yang, Bo-Yin.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25405-5">http://dx.doi.org/10.1007/978-3-642-25405-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management for Life 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194481 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Duquenoy, Penny. editor.&#160;Hansen, Marit. editor.&#160;Leenes, Ronald. editor.&#160;Zhang, Ge. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20769-3">http://dx.doi.org/10.1007/978-3-642-20769-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomic and Trusted Computing 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195360 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Calero, Jose M. Alcaraz. editor.&#160;Yang, Laurence T. editor.&#160;M&aacute;rmol, F&eacute;lix G&oacute;mez. editor.&#160;Garc&iacute;a Villalba, Luis Javier. editor.&#160;Li, Andy Xiaolin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23496-5">http://dx.doi.org/10.1007/978-3-642-23496-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Warehousing and Knowledge Discovery 13th International Conference, DaWaK 2011, Toulouse, France, August 29-September 2,2011. Proceedings ent://SD_ILS/0/SD_ILS:195375 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Cuzzocrea, Alfredo. editor.&#160;Dayal, Umeshwar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23544-3">http://dx.doi.org/10.1007/978-3-642-23544-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Application 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192017 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Gollmann, Dieter. editor.&#160;Lanet, Jean-Louis. editor.&#160;Iguchi-Cartigny, Julien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12510-2">http://dx.doi.org/10.1007/978-3-642-12510-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 &ndash; June 2, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192271 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Decker, Bart. editor.&#160;Schaum&uuml;ller-Bichl, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13241-4">http://dx.doi.org/10.1007/978-3-642-13241-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191973 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Samarati, Pierangela. editor.&#160;Tunstall, Michael. editor.&#160;Posegga, Joachim. editor.&#160;Markantonakis, Konstantinos. editor.&#160;Sauveron, Damien. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management for Life 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192602 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Bezzi, Michele. editor.&#160;Duquenoy, Penny. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Hansen, Marit. editor.&#160;Zhang, Ge. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14282-6">http://dx.doi.org/10.1007/978-3-642-14282-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers ent://SD_ILS/0/SD_ILS:192634 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Rome, Erich. editor.&#160;Bloomfield, Robin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14379-3">http://dx.doi.org/10.1007/978-3-642-14379-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information, Security and Cryptology &ndash; ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192649 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Lee, Donghoon. editor.&#160;Hong, Seokhie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Future of Identity in the Information Society 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190588 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Cvr&#269;ek, Daniel. editor.&#160;&Scaron;venda, Petr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03315-5">http://dx.doi.org/10.1007/978-3-642-03315-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings ent://SD_ILS/0/SD_ILS:190785 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Markowitch, Olivier. editor.&#160;Bilas, Angelos. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Mitchell, Chris J. editor.&#160;Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190823 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Jahankhani, Hamid. editor.&#160;Hessami, Ali G. editor.&#160;Hsu, Feng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04062-7">http://dx.doi.org/10.1007/978-3-642-04062-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Spaces and Next Generation Wired/Wireless Networking 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190865 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Balandin, Sergey. editor.&#160;Moltchanov, Dmitri. editor.&#160;Koucheryavy, Yevgeni. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04190-7">http://dx.doi.org/10.1007/978-3-642-04190-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190173 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Abdalla, Michel. editor.&#160;Pointcheval, David. editor.&#160;Fouque, Pierre-Alain. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188543 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Onieva, Jose A. editor.&#160;Sauveron, Damien. editor.&#160;Chaumette, Serge. editor.&#160;Gollmann, Dieter. editor.&#160;Markantonakis, Konstantinos. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:189188 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Schulzrinne, Henning. editor.&#160;State, Radu. editor.&#160;Niccolini, Saverio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189304 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Franklin, Matthew K. editor.&#160;Hui, Lucas Chi Kwong. editor.&#160;Wong, Duncan S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Arithmetic of Finite Fields 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185849 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Gathen, Joachim. editor.&#160;Ima&ntilde;a, Jos&eacute; Luis. editor.&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69499-1">http://dx.doi.org/10.1007/978-3-540-69499-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188803 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Grimaud, Gilles. editor.&#160;Standaert, Fran&ccedil;ois-Xavier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186513 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Sauveron, Damien. editor.&#160;Markantonakis, Konstantinos. editor.&#160;Bilas, Angelos. editor.&#160;Quisquater, Jean-Jacques. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186859 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Pieprzyk, Josef. editor.&#160;Ghodosi, Hossein. editor.&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2007 First International Conference, Tokyo, Japan, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186868 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Okamoto, Tatsuaki. editor.&#160;Okamoto, Eiji. editor.&#160;Okamoto, Takeshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187473 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Susilo, Willy. editor.&#160;Liu, Joseph K. editor.&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences, Subsequences, and Consequences International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers ent://SD_ILS/0/SD_ILS:187862 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Golomb, Solomon W. editor.&#160;Gong, Guang. editor.&#160;Helleseth, Tor. editor.&#160;Song, Hong-Yeop. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77404-4">http://dx.doi.org/10.1007/978-3-540-77404-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186798 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Stajano, Frank. editor.&#160;Meadows, Catherine. editor.&#160;Capkun, Srdjan. editor.&#160;Moore, Tyler. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187720 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Kurosawa, Kaoru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184677 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Katsikas, Sokratis K. editor.&#160;L&oacute;pez, Javier. editor.&#160;Backes, Michael. editor.&#160;Gritzalis, Stefanos. editor.&#160;Preneel, Bart. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11836810">http://dx.doi.org/10.1007/11836810</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183702 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Domingo-Ferrer, Josep. editor.&#160;Posegga, Joachim. editor.&#160;Schreckling, Daniel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11733447">http://dx.doi.org/10.1007/11733447</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:184331 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Safavi-Naini, Reihaneh. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11787952">http://dx.doi.org/10.1007/11787952</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184439 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Damiani, Ernesto. editor.&#160;Liu, Peng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11805588">http://dx.doi.org/10.1007/11805588</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:184908 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Crescenzo, Giovanni. editor.&#160;Rubin, Avi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:183712 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Won, Dong Ho. editor.&#160;Kim, Seungjoo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11734727">http://dx.doi.org/10.1007/11734727</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182922 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Malcolm, James A. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183045 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11552338">http://dx.doi.org/10.1007/11552338</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:183146 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Park, Choon-sik. editor.&#160;Chee, Seongtaek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Crypto and AI From Coevolution to Quantum Revolution ent://SD_ILS/0/SD_ILS:528761 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Zolfaghari, Behrouz. author.&#160;Nemati, Hamid. author.&#160;Yanai, Naoto. author.&#160;Bibak, Khodakhast. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-44807-2">https://doi.org/10.1007/978-3-031-44807-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:482982 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Zhang, Huanguo. editor.&#160;Zhao, Bo. editor.&#160;Yan, Fei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483024 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Hamid, Brahim. editor.&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053&#160;Shabtai, Asaf. editor. (orcid)0000-0003-0630-4059&#160;Elovici, Yuval. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Automotive Connectivity and Cybersecurity Trends, Technologies, Innovations and Applications ent://SD_ILS/0/SD_ILS:483042 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;M&ouml;ller, Dietmar P.F. author.&#160;Haas, Roland E. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73512-2">https://doi.org/10.1007/978-3-319-73512-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19&ndash;23, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:483164 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Ishai, Yuval. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17653-2">https://doi.org/10.1007/978-3-030-17653-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 17th International Conference, CARDIS 2018, Montpellier, France, November 12&ndash;14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485324 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Bilgin, Beg&uuml;l. editor.&#160;Fischer, Jean-Bernard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15462-2">https://doi.org/10.1007/978-3-030-15462-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multi-photon Quantum Secure Communication ent://SD_ILS/0/SD_ILS:486171 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Verma, Pramode K. author.&#160;El Rifai, Mayssaa. author.&#160;Chan, Kam Wai Clifford. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8618-2">https://doi.org/10.1007/978-981-10-8618-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13&ndash;15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399528 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Eisenbarth, Thomas. editor. (orcid)0000-0003-1116-6973&#160;Teglia, Yannick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75208-2">https://doi.org/10.1007/978-3-319-75208-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400045 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X&#160;Kuty&#322;owski, Miros&#322;aw. editor. (orcid)0000-0003-3192-2430&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400306 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Budaghyan, Lilya. editor.&#160;Rodr&iacute;guez-Henr&iacute;quez, Francisco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Random Numbers and Computers ent://SD_ILS/0/SD_ILS:400593 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Kneusel, Ronald T. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-77697-2">https://doi.org/10.1007/978-3-319-77697-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489026 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Mauw, Sjouke. editor.&#160;Damsgaard Jensen, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489066 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Garay, Juan A. editor.&#160;Gennaro, Rosario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44371-2">https://doi.org/10.1007/978-3-662-44371-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489068 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Meier, Willi. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13039-2">https://doi.org/10.1007/978-3-319-13039-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communication Networks for Smart Grids Making Smart Grid Real ent://SD_ILS/0/SD_ILS:489375 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Budka, Kenneth C. author.&#160;Deshpande, Jayant G. author.&#160;Thottan, Marina. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6302-2">https://doi.org/10.1007/978-1-4471-6302-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Science and Cybersecurity ent://SD_ILS/0/SD_ILS:484756 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Pino, Robinson E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487372 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Yoshida, Maki. editor.&#160;Mouri, Koichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487966 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Martinez Perez, Gregorio. editor.&#160;Thampi, Sabu M. editor.&#160;Ko, Ryan. editor.&#160;Shu, Lei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489603 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Shi, Yun Qing. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43886-2">https://doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334242 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Sahai, Amit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334242.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ad Hoc Networks 4th International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334331 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Zheng, Jun. editor.&#160;Mitton, Nathalie. editor.&#160;Li, Jun. editor.&#160;Lorenz, Pascal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334331.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36958-2">http://dx.doi.org/10.1007/978-3-642-36958-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334638 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Lopez, Javier. editor.&#160;Huang, Xinyi. editor.&#160;Sandhu, Ravi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334638.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335090 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Hutter, Michael. editor.&#160;Schmidt, J&ouml;rn-Marc. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335090.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41332-2">http://dx.doi.org/10.1007/978-3-642-41332-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Cloud Computing Principles and Practice ent://SD_ILS/0/SD_ILS:331022 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Hill, Richard. author.&#160;Hirsch, Laurie. author.&#160;Lake, Peter. author.&#160;Moshiri, Siavash. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331022.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:332461 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Tang, Jin. author.&#160;Cheng, Yu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332461.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334145 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James A. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334145.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Software and Systems 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196370 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Barthe, Gilles. editor.&#160;Livshits, Benjamin. editor.&#160;Scandariato, Riccardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28166-2">http://dx.doi.org/10.1007/978-3-642-28166-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196771 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Petkova-Nikova, Svetla. editor.&#160;Pashalidis, Andreas. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29804-2">http://dx.doi.org/10.1007/978-3-642-29804-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and Trustworthy Computing 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196986 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Katzenbeisser, Stefan. editor.&#160;Weippl, Edgar. editor.&#160;Camp, L. Jean. editor.&#160;Volkamer, Melanie. editor.&#160;Reiter, Mike. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30921-2">http://dx.doi.org/10.1007/978-3-642-30921-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197291 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32873-2">http://dx.doi.org/10.1007/978-3-642-32873-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Eco-friendly Computing and Communication Systems International Conference, ICECCS 2012, Kochi, India, August 9-11, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197179 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Mathew, Jimson. editor.&#160;Patra, Priyadarshan. editor.&#160;Pradhan, Dhiraj K. editor.&#160;Kuttyamma, A. J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32112-2">http://dx.doi.org/10.1007/978-3-642-32112-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197346 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Wang, Guilin. editor.&#160;Qin, Zhiguang. editor.&#160;Jiang, Shaoquan. editor.&#160;Yu, Yong. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33272-2">http://dx.doi.org/10.1007/978-3-642-33272-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics VIII 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197449 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33962-2">http://dx.doi.org/10.1007/978-3-642-33962-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196240 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Camenisch, Jan. editor.&#160;Kesdogan, Dogan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27585-2">http://dx.doi.org/10.1007/978-3-642-27585-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196613 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Ryan, Mark D. editor.&#160;Smyth, Ben. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29101-2">http://dx.doi.org/10.1007/978-3-642-29101-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2011 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings ent://SD_ILS/0/SD_ILS:195458 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Atluri, Vijay. editor.&#160;Diaz, Claudia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23822-2">http://dx.doi.org/10.1007/978-3-642-23822-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195683 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Joye, Marc. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;Tunstall, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2011 The Cryptographers&rsquo; Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings ent://SD_ILS/0/SD_ILS:193925 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Kiayias, Aggelos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19074-2">http://dx.doi.org/10.1007/978-3-642-19074-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:194143 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Degano, Pierpaolo. editor.&#160;Etalle, Sandro. editor.&#160;Guttman, Joshua. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19751-2">http://dx.doi.org/10.1007/978-3-642-19751-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Chaos-Based Cryptography Theory,Algorithms and Applications ent://SD_ILS/0/SD_ILS:194408 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Kocarev, Ljupco. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20542-2">http://dx.doi.org/10.1007/978-3-642-20542-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195856 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Iwata, Tetsu. editor.&#160;Nishigaki, Masakatsu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Technology International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:196121 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Kim, Tai-hoon. editor.&#160;Adeli, Hojjat. editor.&#160;Fang, Wai-chi. editor.&#160;Villalba, Javier Garc&iacute;a. editor.&#160;Arnett, Kirk P. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27189-2">http://dx.doi.org/10.1007/978-3-642-27189-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Spyware and Adware ent://SD_ILS/0/SD_ILS:167516 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Communication and Quantum Networking First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191783 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Sergienko, Alexander. editor.&#160;Pascazio, Saverio. editor.&#160;Villoresi, Paolo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11731-2">http://dx.doi.org/10.1007/978-3-642-11731-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192157 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Sendrier, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12929-2">http://dx.doi.org/10.1007/978-3-642-12929-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192420 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Security, Safety, and Sustainability 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193062 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Tenreiro de Magalh&atilde;es, S&eacute;rgio. editor.&#160;Jahankhani, Hamid. editor.&#160;Hessami, Ali G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15717-2">http://dx.doi.org/10.1007/978-3-642-15717-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics VI Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192990 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Chow, Kam-Pui. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15506-2">http://dx.doi.org/10.1007/978-3-642-15506-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences and Their Applications &ndash; SETA 2010 6th International Conference, Paris, France, September 13-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193113 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Carlet, Claude. editor.&#160;Pott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15874-2">http://dx.doi.org/10.1007/978-3-642-15874-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193421 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Ors Yalcin, Siddika Berna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16822-2">http://dx.doi.org/10.1007/978-3-642-16822-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191613 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Roudier, Yves. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11207-2">http://dx.doi.org/10.1007/978-3-642-11207-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Replication Theory and Practice ent://SD_ILS/0/SD_ILS:191641 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Charron-Bost, Bernadette. editor.&#160;Pedone, Fernando. editor.&#160;Schiper, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11294-2">http://dx.doi.org/10.1007/978-3-642-11294-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Networking 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191651 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Kant, Krishna. editor.&#160;Pemmaraju, Sriram V. editor.&#160;Sivalingam, Krishna M. editor.&#160;Wu, Jie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11322-2">http://dx.doi.org/10.1007/978-3-642-11322-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191801 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Micciancio, Daniele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11799-2">http://dx.doi.org/10.1007/978-3-642-11799-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193205 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Jajodia, Sushil. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16161-2">http://dx.doi.org/10.1007/978-3-642-16161-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193620 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Schmidt, Andreas U. editor.&#160;Russello, Giovanni. editor.&#160;Lioy, Antonio. editor.&#160;Prasad, Neeli R. editor.&#160;Lian, Shiguo. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17502-2">http://dx.doi.org/10.1007/978-3-642-17502-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing Wireless Communications at the Physical Layer ent://SD_ILS/0/SD_ILS:172230 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Liu, Ruoheng. editor.&#160;Trappe, Wade. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-1385-2">http://dx.doi.org/10.1007/978-1-4419-1385-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191214 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Chen, Yan. editor.&#160;Dimitriou, Tassos D. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05284-2">http://dx.doi.org/10.1007/978-3-642-05284-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191308 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Gal, Cecilia S. editor.&#160;Kantor, Paul B. editor.&#160;Lesk, Michael E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-business and Telecommunications 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189098 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Filipe, Joaquim. editor.&#160;Obaidat, Mohammad S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88653-2">http://dx.doi.org/10.1007/978-3-540-88653-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2009 Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190306 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02384-2">http://dx.doi.org/10.1007/978-3-642-02384-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190947 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Schmidt, Andreas U. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04434-2">http://dx.doi.org/10.1007/978-3-642-04434-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> iNetSec 2009 &ndash; Open Research Problems in Network Security IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191270 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Camenisch, Jan. editor.&#160;Kesdogan, Dogan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05437-2">http://dx.doi.org/10.1007/978-3-642-05437-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing Biometrics Applications ent://SD_ILS/0/SD_ILS:166745 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Shoniregun, Charles A. author.&#160;Crosier, Stephen. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security with Noisy Data On Private Biometrics, Secure Key Storage and Anti-Counterfeiting ent://SD_ILS/0/SD_ILS:175657 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Tuyls, Pim. editor.&#160;Skoric, Boris. editor.&#160;Kevenaar, Tom. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84628-984-2">http://dx.doi.org/10.1007/978-1-84628-984-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186890 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Xiao, Bin. editor.&#160;Yang, Laurence T. editor.&#160;Ma, Jianhua. editor.&#160;Muller-Schloer, Christian. editor.&#160;Hua, Yu. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187809 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Malcolm, James A. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187856 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Furon, Teddy. editor.&#160;Cayre, Fran&ccedil;ois. editor.&#160;Do&euml;rr, Gwena&euml;l. editor.&#160;Bas, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187790 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;McDaniel, Patrick. editor.&#160;Gupta, Shyam K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187146 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Lambrinoudakis, Costas. editor.&#160;Pernul, G&uuml;nther. editor.&#160;Tjoa, A Min. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187246 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Paillier, Pascal. editor.&#160;Verbauwhede, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74735-2">http://dx.doi.org/10.1007/978-3-540-74735-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security Policies and Procedures ent://SD_ILS/0/SD_ILS:166393 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Frye, Douglas W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Compression The Complete Reference ent://SD_ILS/0/SD_ILS:175468 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84628-603-2">http://dx.doi.org/10.1007/978-1-84628-603-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Complexity Theory and Cryptology An Introduction to Cryptocomplexity ent://SD_ILS/0/SD_ILS:181782 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Rothe, J&ouml;rg. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-28520-2">http://dx.doi.org/10.1007/3-540-28520-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer viruses: from theory to applications ent://SD_ILS/0/SD_ILS:176342 2025-12-24T16:33:38Z 2025-12-24T16:33:38Z Author&#160;Filiol, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>