Search Results for Communication - Narrowed by: Data Encryption.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCommunication$0026qf$003dSUBJECT$002509Subject$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300$0026isd$003dtrue?
2024-11-01T13:27:36Z
Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:333021
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Zia, Tanveer. editor. Zomaya, Albert. editor. Varadharajan, Vijay. editor. Mao, Morley. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333021.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334301
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Mustofa, Khabib. editor. Neuhold, Erich J. editor. Tjoa, A Min. editor. Weippl, Edgar. editor. You, Ilsun. editor.<br/>Preferred Shelf Number ONLINE(334301.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36818-9">http://dx.doi.org/10.1007/978-3-642-36818-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334316
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Keromytis, Angelos D. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334316.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust Management VII 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334582
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Fernández-Gago, Carmen. editor. Martinelli, Fabio. editor. Pearson, Siani. editor. Agudo, Isaac. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334582.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38323-6">http://dx.doi.org/10.1007/978-3-642-38323-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334399
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Fischer-Hübner, Simone. editor. Leeuw, Elisabeth. editor. Mitchell, Chris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334399.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334755
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Janczewski, Lech J. editor. Wolfe, Henry B. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334755.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335063
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335063.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Android Malware
ent://SD_ILS/0/SD_ILS:332276
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Jiang, Xuxian. author. Zhou, Yajin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332276.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
ent://SD_ILS/0/SD_ILS:332461
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Tang, Jin. author. Cheng, Yu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332461.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Location Privacy Protection in Mobile Networks
ent://SD_ILS/0/SD_ILS:332468
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Liu, Xinxin. author. Li, Xiaolin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332468.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Assessment in Vehicular Networks
ent://SD_ILS/0/SD_ILS:332479
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Du, Suguo. author. Zhu, Haojin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332479.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Deterrence and IT Protection for Critical Infrastructures
ent://SD_ILS/0/SD_ILS:332909
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Martellini, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332909.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and the Networked Society
ent://SD_ILS/0/SD_ILS:332915
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Gregory, Mark A. author. Glance, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332915.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace Safety and Security 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:332984
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Wang, Guojun. editor. Ray, Indrakshi. editor. Feng, Dengguo. editor. Rajarajan, Muttukrishnan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332984.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03584-0">http://dx.doi.org/10.1007/978-3-319-03584-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May 28 – June 2, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334049
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Yuan, Yuyu. editor. Wu, Xu. editor. Lu, Yueming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334049.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35795-4">http://dx.doi.org/10.1007/978-3-642-35795-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334078
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Pietro, Roberto. editor. Herranz, Javier. editor. Damiani, Ernesto. editor. State, Radu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334078.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35890-6">http://dx.doi.org/10.1007/978-3-642-35890-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2013 The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334122
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Dawson, Ed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334122.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334132
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Hoepman, Jaap-Henk. editor. Verbauwhede, Ingrid. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334132.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334145
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Christianson, Bruce. editor. Malcolm, James A. editor. Matyáš, Vashek. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334145.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Software and Systems 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334236
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Jürjens, Jan. editor. Livshits, Benjamin. editor. Scandariato, Riccardo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334236.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36563-8">http://dx.doi.org/10.1007/978-3-642-36563-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334505
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Singh, Karan. editor. Awasthi, Amit K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334505.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37949-9">http://dx.doi.org/10.1007/978-3-642-37949-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Infocomm Technology 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012. Revised Papers
ent://SD_ILS/0/SD_ILS:334561
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Guyot, Vincent. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334561.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38227-7">http://dx.doi.org/10.1007/978-3-642-38227-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334616
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334616.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334638
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Lopez, Javier. editor. Huang, Xinyi. editor. Sandhu, Ravi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334638.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334746
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Heather, James. editor. Schneider, Steve. editor. Teague, Vanessa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334746.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334878
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Capitani di Vimercati, Sabrina. editor. Mitchell, Chris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334878.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334880
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Prouff, Emmanuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334880.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334938
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Avoine, Gildas. editor. Kara, Orhun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334938.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Engineering and Intelligence Informatics CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334975
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Cuzzocrea, Alfredo. editor. Kittl, Christian. editor. Simos, Dimitris E. editor. Weippl, Edgar. editor. Xu, Lida. editor.<br/>Preferred Shelf Number ONLINE(334975.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40588-4">http://dx.doi.org/10.1007/978-3-642-40588-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335002
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Decker, Bart. editor. Dittmann, Jana. editor. Kraetzer, Christian. editor. Vielhauer, Claus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335002.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automated Security Management
ent://SD_ILS/0/SD_ILS:332865
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Al-Shaer, Ehab. editor. Ou, Xinming. editor. Xie, Geoffrey. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332865.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-01433-3">http://dx.doi.org/10.1007/978-3-319-01433-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings
ent://SD_ILS/0/SD_ILS:332957
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Abdalla, Michel. editor. Nita-Rotaru, Cristina. editor. Dahab, Ricardo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332957.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334097
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Knudsen, Lars R. editor. Wu, Huapeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334097.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless Network Security Theories and Applications
ent://SD_ILS/0/SD_ILS:334222
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Chen, Lei. author. Ji, Jiahuang. author. Zhang, Zihong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334222.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36511-9">http://dx.doi.org/10.1007/978-3-642-36511-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334305
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Basin, David. editor. Mitchell, John C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334305.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ad Hoc Networks 4th International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334331
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Zheng, Jun. editor. Mitton, Nathalie. editor. Li, Jun. editor. Lorenz, Pascal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334331.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36958-2">http://dx.doi.org/10.1007/978-3-642-36958-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334401
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Mangard, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334401.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust and Trustworthy Computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334696
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Huth, Michael. editor. Asokan, N. editor. Čapkun, Srdjan. editor. Flechais, Ivan. editor. Coles-Kemp, Lizzie. editor.<br/>Preferred Shelf Number ONLINE(334696.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38908-5">http://dx.doi.org/10.1007/978-3-642-38908-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334707
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Jacobson, Michael. editor. Locasto, Michael. editor. Mohassel, Payman. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334707.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334710
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Doyen, Guillaume. editor. Waldburger, Martin. editor. Čeleda, Pavel. editor. Sperotto, Anna. editor. Stiller, Burkhard. editor.<br/>Preferred Shelf Number ONLINE(334710.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38998-6">http://dx.doi.org/10.1007/978-3-642-38998-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334726
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Cristofaro, Emiliano. editor. Wright, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334726.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334767
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Wang, Lingyu. editor. Shafiq, Basit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334767.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334909
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Crampton, Jason. editor. Jajodia, Sushil. editor. Mayes, Keith. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334909.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335066
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Palamidessi, Catuscia. editor. Ryan, Mark D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335066.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41157-1">http://dx.doi.org/10.1007/978-3-642-41157-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335076
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Gierlichs, Benedikt. editor. Guilley, Sylvain. editor. Mukhopadhyay, Debdeep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335076.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335098
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335098.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335107
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Bologna, Sandro. editor. Hämmerli, Bernhard. editor. Gritzalis, Dimitris. editor. Wolthusen, Stephen. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335107.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols XXI 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335142
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Christianson, Bruce. editor. Malcolm, James. editor. Stajano, Frank. editor. Anderson, Jonathan. editor. Bonneau, Joseph. editor.<br/>Preferred Shelf Number ONLINE(335142.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41717-7">http://dx.doi.org/10.1007/978-3-642-41717-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
ent://SD_ILS/0/SD_ILS:335154
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Fischlin, Marc. editor. Katzenbeisser, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335154.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum Attacks on Public-Key Cryptosystems
ent://SD_ILS/0/SD_ILS:330828
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330828.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Authentication Problems and Solutions
ent://SD_ILS/0/SD_ILS:331610
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Jakobsson, Markus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331610.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE(331766.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automatic Malware Analysis An Emulator Based Approach
ent://SD_ILS/0/SD_ILS:331796
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Yin, Heng. author. Song, Dawn. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331796.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335194
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Bagchi, Aditya. editor. Ray, Indrakshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335194.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing Risk and Information Security Protect to Enable
ent://SD_ILS/0/SD_ILS:330694
2024-11-01T13:27:36Z
2024-11-01T13:27:36Z
Author Harkins, Malcolm. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330694.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-5114-9">http://dx.doi.org/10.1007/978-1-4302-5114-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>