Search Results for Communication - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCommunication$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue? 2024-11-06T23:18:05Z Handbook of Information and Communication Security ent://SD_ILS/0/SD_ILS:190841 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Stavroulakis, Peter. editor.&#160;Stamp, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Learning-based VANET Communication and Security Techniques ent://SD_ILS/0/SD_ILS:483960 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Xiao, Liang. author.&#160;Zhuang, Weihua. author.&#160;Zhou, Sheng. author.&#160;Chen, Cailian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01731-6">https://doi.org/10.1007/978-3-030-01731-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485314 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;Feng, Jun. editor. (orcid)0000-0001-9917-1819&#160;Bhuiyan, Md Zakirul Alam. editor. (orcid)0000-0002-9513-9990&#160;Lu, Rongxing. editor. (orcid)0000-0001-5720-0941&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24900-7">https://doi.org/10.1007/978-3-030-24900-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483858 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;Feng, Jun. editor. (orcid)0000-0001-9917-1819&#160;Bhuiyan, Md Zakirul Alam. editor. (orcid)0000-0002-9513-9990&#160;Lu, Rongxing. editor. (orcid)0000-0001-5720-0941&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24907-6">https://doi.org/10.1007/978-3-030-24907-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400846 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Lin, Xiaodong. editor.&#160;Ghorbani, Ali. editor.&#160;Ren, Kui. editor.&#160;Zhu, Sencun. editor.&#160;Zhang, Aiqing. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400597 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;Chen, Jinjun. editor.&#160;Yang, Laurence T. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05345-1">https://doi.org/10.1007/978-3-030-05345-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400949 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Lin, Xiaodong. editor.&#160;Ghorbani, Ali. editor.&#160;Ren, Kui. editor.&#160;Zhu, Sencun. editor.&#160;Zhang, Aiqing. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals and Applications of Hardcopy Communication Conveying Side Information by Printed Media ent://SD_ILS/0/SD_ILS:402116 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Mayer, Joceli. author.&#160;Borges, Paulo V.K. author.&#160;J. Simske, Steven. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74083-6">https://doi.org/10.1007/978-3-319-74083-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Anonymous communication networks : protecting privacy on the web ent://SD_ILS/0/SD_ILS:356657 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Peng, Kun, author.<br/>Preferred Shelf Number&#160;ONLINE(356657.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical Layer Approaches for Securing Wireless Communication Systems ent://SD_ILS/0/SD_ILS:332050 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Wen, Hong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332050.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6510-2">http://dx.doi.org/10.1007/978-1-4614-6510-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333021 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Zia, Tanveer. editor.&#160;Zomaya, Albert. editor.&#160;Varadharajan, Vijay. editor.&#160;Mao, Morley. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333021.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334301 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Mustofa, Khabib. editor.&#160;Neuhold, Erich J. editor.&#160;Tjoa, A Min. editor.&#160;Weippl, Edgar. editor.&#160;You, Ilsun. editor.<br/>Preferred Shelf Number&#160;ONLINE(334301.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36818-9">http://dx.doi.org/10.1007/978-3-642-36818-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334316 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Keromytis, Angelos D. editor.&#160;Pietro, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334316.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wired/Wireless Internet Communication 11th International Conference, WWIC 2013, St. Petersburg, Russia, June 5-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334594 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Tsaoussidis, Vassilis. editor.&#160;Kassler, Andreas J. editor.&#160;Koucheryavy, Yevgeni. editor.&#160;Mellouk, Abdelhamid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334594.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38401-1">http://dx.doi.org/10.1007/978-3-642-38401-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Communication Networking 19th EUNICE/IFIP WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334966 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Bauschert, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334966.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40552-5">http://dx.doi.org/10.1007/978-3-642-40552-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334976 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Awad, Ali Ismail. editor.&#160;Hassanien, Aboul Ella. editor.&#160;Baba, Kensuke. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334976.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends and Applications in Information Communication Technologies Second International Multi Topic Conference, IMTIC 2012, Jamshoro, Pakistan, March 28-30, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196576 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Chowdhry, Bhawani Shankar. editor.&#160;Shaikh, Faisal Karim. editor.&#160;Hussain, Dil Muhammad Akbar. editor.&#160;Uqaili, Muhammad Aslam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28962-0">http://dx.doi.org/10.1007/978-3-642-28962-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197152 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Rajarajan, Muttukrishnan. editor.&#160;Piper, Fred. editor.&#160;Wang, Haining. editor.&#160;Kesidis, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31909-9">http://dx.doi.org/10.1007/978-3-642-31909-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wired/Wireless Internet Communication 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196931 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Koucheryavy, Yevgeni. editor.&#160;Mamatas, Lefteris. editor.&#160;Matta, Ibrahim. editor.&#160;Tsaoussidis, Vassilis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30630-3">http://dx.doi.org/10.1007/978-3-642-30630-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technologies 18th EUNICE/ IFIP WG 6.2, 6.6 International Conference, EUNICE 2012, Budapest, Hungary, August 29-31, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197281 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Szab&oacute;, R&oacute;bert. editor.&#160;Vid&aacute;cs, Attila. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32808-4">http://dx.doi.org/10.1007/978-3-642-32808-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197367 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Schmidt, Andreas U. editor.&#160;Russello, Giovanni. editor.&#160;Krontiris, Ioannis. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33392-7">http://dx.doi.org/10.1007/978-3-642-33392-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Research on Electronic Commerce, Web Application, and Communication International Conference, ECWAC 2011, Guangzhou, China, April 16-17, 2011. Proceedings, Part I ent://SD_ILS/0/SD_ILS:194345 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Shen, Gang. editor.&#160;Huang, Xiong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20367-1">http://dx.doi.org/10.1007/978-3-642-20367-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194571 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Ardagna, Claudio A. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191712 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Gu, Qijun. editor.&#160;Zang, Wanyu. editor.&#160;Yu, Meng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191214 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Chen, Yan. editor.&#160;Dimitriou, Tassos D. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05284-2">http://dx.doi.org/10.1007/978-3-642-05284-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Communication and Networking Second International Conference on Future Generation Communication and Networking, FGCN 2008, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191309 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kim, Tai-hoon. editor.&#160;Yang, Laurence T. editor.&#160;Park, Jong Hyuk. editor.&#160;Chang, Alan Chin-Chen. editor.&#160;Vasilakos, Thanos. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10236-3">http://dx.doi.org/10.1007/978-3-642-10236-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Networks and Security Issues, Challenges and Research Trends ent://SD_ILS/0/SD_ILS:334140 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Khan, Shafiullah. editor.&#160;Khan Pathan, Al-Sakib. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334140.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36169-2">http://dx.doi.org/10.1007/978-3-642-36169-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Histories of Computing in Eastern Europe IFIP WG 9.7 International Workshop on the History of Computing, HC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Pozna&#324;, Poland, September 19&ndash;21, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485365 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Leslie, Christopher. editor.&#160;Schmitt, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29160-0">https://doi.org/10.1007/978-3-030-29160-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Education. Education in Proactive Information Security 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25&ndash;27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483477 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Drevin, Lynette. editor. (orcid)0000-0001-9370-8216&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-23451-5">https://doi.org/10.1007/978-3-030-23451-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11&ndash;12, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486939 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400126 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:402007 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Gal-Oz, Nurit. editor.&#160;Lewis, Peter R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335063 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335063.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334399 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Leeuw, Elisabeth. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334399.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management VII 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334582 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Fern&aacute;ndez-Gago, Carmen. editor.&#160;Martinelli, Fabio. editor.&#160;Pearson, Siani. editor.&#160;Agudo, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334582.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38323-6">http://dx.doi.org/10.1007/978-3-642-38323-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gon&ccedil;alves, RS, Brazil, July 27-31, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334794 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Dodge, Ronald C. editor.&#160;Futcher, Lynn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334794.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335209 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335209.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45330-4">http://dx.doi.org/10.1007/978-3-642-45330-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Critical Infrastructures and Society 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197357 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Hercheui, Magda David. editor.&#160;Whitehouse, Diane. editor.&#160;McIver, William. editor.&#160;Phahlamohlaka, Jackie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33332-3">http://dx.doi.org/10.1007/978-3-642-33332-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics VIII 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197449 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33962-2">http://dx.doi.org/10.1007/978-3-642-33962-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197638 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35764-0">http://dx.doi.org/10.1007/978-3-642-35764-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection V 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195772 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24864-1">http://dx.doi.org/10.1007/978-3-642-24864-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management III Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190202 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Ferrari, Elena. editor.&#160;Li, Ninghui. editor.&#160;Bertino, Elisa. editor.&#160;Karabulut, Yuecel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02056-8">http://dx.doi.org/10.1007/978-3-642-02056-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Future of Identity in the Information Society 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190588 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Cvr&#269;ek, Daniel. editor.&#160;&Scaron;venda, Petr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03315-5">http://dx.doi.org/10.1007/978-3-642-03315-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> iNetSec 2009 &ndash; Open Research Problems in Network Security IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191270 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Camenisch, Jan. editor.&#160;Kesdogan, Dogan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05437-2">http://dx.doi.org/10.1007/978-3-642-05437-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18&ndash;20, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189928 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Gritzalis, Dimitris. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01244-0">http://dx.doi.org/10.1007/978-3-642-01244-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Jacobs, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Testbeds and Research Infrastructures for the Development of Networks and Communities 13th EAI International Conference, TridentCom 2018, Shanghai, China, December 1-3, 2018, Proceedings ent://SD_ILS/0/SD_ILS:484288 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Gao, Honghao. editor.&#160;Yin, Yuyu. editor.&#160;Yang, Xiaoxian. editor.&#160;Miao, Huaikou. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12971-2">https://doi.org/10.1007/978-3-030-12971-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484509 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Garg, Deepak. editor. (orcid)0000-0002-0888-3093&#160;Kumar, N. V. Narendra. editor.&#160;Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain Technology in Internet of Things ent://SD_ILS/0/SD_ILS:484527 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Zhu, Liehuang. author.&#160;Gai, Keke. author.&#160;Li, Meng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21766-2">https://doi.org/10.1007/978-3-030-21766-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercryptography: Applicable Cryptography for Cyberspace Security ent://SD_ILS/0/SD_ILS:484533 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ad Hoc Networks 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings ent://SD_ILS/0/SD_ILS:484933 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Zheng, Jun. editor.&#160;Xiang, Wei. editor.&#160;Lorenz, Pascal. editor.&#160;Mao, Shiwen. editor.&#160;Yan, Feng. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05888-3">https://doi.org/10.1007/978-3-030-05888-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances of Science and Technology 6th EAI International Conference, ICAST 2018, Bahir Dar, Ethiopia, October 5-7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486686 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Zimale, Fasikaw Atanaw. editor.&#160;Enku Nigussie, Temesgen. editor.&#160;Fanta, Solomon Workneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15357-1">https://doi.org/10.1007/978-3-030-15357-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malicious Attack Propagation and Source Identification ent://SD_ILS/0/SD_ILS:482633 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Jiang, Jiaojiao. author.&#160;Wen, Sheng. author.&#160;Liu, Bo. author.&#160;Yu, Shui. author.&#160;Xiang, Yang. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing &ndash; CLOUD 2019 12th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25&ndash;30, 2019, Proceedings ent://SD_ILS/0/SD_ILS:482766 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Da Silva, Dilma. editor.&#160;Wang, Qingyang. editor. (orcid)0000-0002-5729-2898&#160;Zhang, Liang-Jie. editor. (orcid)0000-0002-6219-0853&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-23502-4">https://doi.org/10.1007/978-3-030-23502-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Multimedia Information Security: Techniques and Applications ent://SD_ILS/0/SD_ILS:483348 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Singh, Amit Kumar. editor.&#160;Mohan, Anand. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22&ndash;24, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483576 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944&#160;Subramaniyaswamy, V. editor.&#160;Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X&#160;Zhang, Leo. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Internet 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedings ent://SD_ILS/0/SD_ILS:484276 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Chen, Jiann-Liang. editor.&#160;Pang, Ai-Chun. editor.&#160;Deng, Der-Jiunn. editor.&#160;Lin, Chun-Cheng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-06158-6">https://doi.org/10.1007/978-3-030-06158-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Control Systems Security and Resiliency Practice and Theory ent://SD_ILS/0/SD_ILS:484767 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Rieger, Craig. editor.&#160;Ray, Indrajit. editor.&#160;Zhu, Quanyan. editor.&#160;Haney, Michael A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-18214-4">https://doi.org/10.1007/978-3-030-18214-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Internet Security Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19&ndash;22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485193 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;You, Ilsun. editor. (orcid)0000-0002-0604-3445&#160;Chen, Hsing-Chung. editor.&#160;Sharma, Vishal. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-3732-1">https://doi.org/10.1007/978-981-13-3732-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Networks and Intelligent Systems 5th EAI International Conference, INISCOM 2019, Ho Chi Minh City, Vietnam, August 19, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487049 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Duong, Trung Quang. editor.&#160;Vo, Nguyen-Son. editor.&#160;Nguyen, Loi K. editor.&#160;Vien, Quoc-Tuan. editor.&#160;Nguyen, Van-Dinh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30149-1">https://doi.org/10.1007/978-3-030-30149-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomous Cyber Deception Reasoning, Adaptive Planning, and Evaluation of HoneyThings ent://SD_ILS/0/SD_ILS:482942 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Al-Shaer, Ehab. editor.&#160;Wei, Jinpeng. editor. (orcid)0000-0002-6982-7386&#160;Hamlen, Kevin W. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02110-8">https://doi.org/10.1007/978-3-030-02110-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data Privacy Preservation for Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:483634 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Pan, Miao. author.&#160;Wang, Jingyi. author.&#160;Errapotu, Sai Mounika. author.&#160;Zhang, Xinyue. author.&#160;Ding, Jiahao. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-13370-2">https://doi.org/10.1007/978-3-030-13370-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy for Next-Generation Wireless Networks ent://SD_ILS/0/SD_ILS:484125 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Zhong, Sheng. author.&#160;Zhong, Hong. author.&#160;Huang, Xinyi. author.&#160;Yang, Panlong. author.&#160;Shi, Jin. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01150-5">https://doi.org/10.1007/978-3-030-01150-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database Systems for Advanced Applications DASFAA 2019 International Workshops: BDMS, BDQM, and GDMA, Chiang Mai, Thailand, April 22&ndash;25, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484429 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Li, Guoliang. editor.&#160;Yang, Jun. editor.&#160;Gama, Joao. editor. (orcid)0000-0003-3357-1195&#160;Natwichai, Juggapong. editor.&#160;Tong, Yongxin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-18590-9">https://doi.org/10.1007/978-3-030-18590-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486019 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Shen, Bazhong. editor.&#160;Wang, Baocang. editor. (orcid)0000-0002-2554-4464&#160;Han, Jinguang. editor. (orcid)0000-0002-4993-9452&#160;Yu, Yong. editor. (orcid)0000-0003-0667-077X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cognitive Radio Oriented Wireless Networks 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486744 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Moerman, Ingrid. editor. (orcid)0000-0003-2377-3674&#160;Marquez-Barja, Johann. editor. (orcid)0000-0001-5660-3597&#160;Shahid, Adnan. editor. (orcid)0000-0003-1943-6261&#160;Liu, Wei. editor.&#160;Giannoulis, Spilios. editor. (orcid)0000-0002-3190-8770<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05490-8">https://doi.org/10.1007/978-3-030-05490-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Network Systems and Security 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27&ndash;29, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486649 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850&#160;Piramuthu, Selwyn. editor.&#160;Zhou, Wei. editor. (orcid)0000-0002-9965-9870&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34353-8">https://doi.org/10.1007/978-3-030-34353-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proactive and Dynamic Network Defense ent://SD_ILS/0/SD_ILS:486655 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Wang, Cliff. editor.&#160;Lu, Zhuo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10597-6">https://doi.org/10.1007/978-3-030-10597-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399665 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Saracino, Andrea. editor.&#160;Mori, Paolo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXVI 26th International Workshop, Cambridge, UK, March 19&ndash;21, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400277 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;&Scaron;venda, Petr. editor.&#160;Stajano, Frank. editor.&#160;Christianson, Bruce. editor.&#160;Anderson, Jonathan. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03251-7">https://doi.org/10.1007/978-3-030-03251-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Threat Intelligence ent://SD_ILS/0/SD_ILS:400906 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Dehghantanha, Ali. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Dargahi, Tooska. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17&ndash;18, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402205 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Sun, Guanglu. editor.&#160;Liu, Shuai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Applications of Neural Networks 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399759 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Pimenidis, Elias. editor. (orcid)0000-0003-3593-8640&#160;Jayne, Chrisina. editor. (orcid)0000-0001-7292-2109&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98204-5">https://doi.org/10.1007/978-3-319-98204-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400247 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Ganapathy, Vinod. editor.&#160;Jaeger, Trent. editor.&#160;Shyamasundar, R.K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy-Enhancing Fog Computing and Its Applications ent://SD_ILS/0/SD_ILS:399066 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Lin, Xiaodong. author.&#160;Ni, Jianbing. author.&#160;Shen, Xuemin (Sherman). author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02113-9">https://doi.org/10.1007/978-3-030-02113-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25&ndash;26, and December 15&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:400508 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Wan, Jiafu. editor.&#160;Lin, Kai. editor.&#160;Zeng, Delu. editor.&#160;Li, Jin. editor.&#160;Xiang, Yang. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Monitoring in P2P Botnets A Dual Perspective ent://SD_ILS/0/SD_ILS:400767 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Karuppayah, Shankar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Internet Technologies and Trends First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401813 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Patel, Zuber. editor.&#160;Gupta, Shilpi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73712-6">https://doi.org/10.1007/978-3-319-73712-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:399859 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kim, Kwangjo. author.&#160;Aminanto, Muhamad Erza. author.&#160;Tanuwidjaja, Harry Chandra. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Smart Grid ent://SD_ILS/0/SD_ILS:399960 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Abdallah, Asmaa. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Versatile Cybersecurity ent://SD_ILS/0/SD_ILS:399974 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Somani, Gaurav. editor.&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ad Hoc Networks 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28&ndash;29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401013 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Zhou, Yifeng. editor.&#160;Kunz, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74439-1">https://doi.org/10.1007/978-3-319-74439-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedings ent://SD_ILS/0/SD_ILS:401719 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Belqasmi, Fatna. editor.&#160;Harroud, Hamid. editor.&#160;Agueh, Max. editor.&#160;Dssouli, Rachida. editor.&#160;Kamoun, Faouzi. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67837-5">https://doi.org/10.1007/978-3-319-67837-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401734 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850&#160;Piramuthu, Selwyn. editor.&#160;Zhou, Wei. editor. (orcid)0000-0002-9965-9870&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Networking 11th EAI international Conference, ChinaCom 2016 Chongqing, China, September 24-26, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:402150 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Chen, Qianbin. editor.&#160;Meng, Weixiao. editor.&#160;Zhao, Liqiang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66628-0">https://doi.org/10.1007/978-3-319-66628-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Networking 11th EAI International Conference, ChinaCom 2016, Chongqing, China, September 24-26, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:402158 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Chen, Qianbin. editor.&#160;Meng, Weixiao. editor.&#160;Zhao, Liqiang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66625-9">https://doi.org/10.1007/978-3-319-66625-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Networks and Intelligent Systems 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402381 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Chen, Yuanfang. editor.&#160;Duong, Trung Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74176-5">https://doi.org/10.1007/978-3-319-74176-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11&ndash;12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402401 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;M. F. Kebe, Cheikh. editor.&#160;Gueye, Assane. editor.&#160;Ndiaye, Ababacar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402736 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201&#160;Campegiani, Paolo. editor.&#160;Czach&oacute;rski, Tadeusz. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Komnios, Ioannis. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile data loss : threats and countermeasures ent://SD_ILS/0/SD_ILS:458729 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Raggo, Michael T.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Botnets ent://SD_ILS/0/SD_ILS:331175 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Tiirmaa-Klaar, Heli. author.&#160;Gassen, Jan. author.&#160;Gerhards-Padilla, Elmar. author.&#160;Martini, Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331175.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5216-3">http://dx.doi.org/10.1007/978-1-4471-5216-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Social Networks ent://SD_ILS/0/SD_ILS:331435 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Altshuler, Yaniv. editor.&#160;Elovici, Yuval. editor.&#160;Cremers, Armin B. editor.&#160;Aharony, Nadav. editor.&#160;Pentland, Alex. editor.<br/>Preferred Shelf Number&#160;ONLINE(331435.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4139-7">http://dx.doi.org/10.1007/978-1-4614-4139-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Authentication Problems and Solutions ent://SD_ILS/0/SD_ILS:331610 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Jakobsson, Markus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331610.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE(331766.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security ent://SD_ILS/0/SD_ILS:331785 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Korzun, Dmitry. author.&#160;Gurtov, Andrei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331785.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5483-0">http://dx.doi.org/10.1007/978-1-4614-5483-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automatic Malware Analysis An Emulator Based Approach ent://SD_ILS/0/SD_ILS:331796 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Yin, Heng. author.&#160;Song, Dawn. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331796.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Malware ent://SD_ILS/0/SD_ILS:332276 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Jiang, Xuxian. author.&#160;Zhou, Yajin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332276.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:332461 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Tang, Jin. author.&#160;Cheng, Yu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332461.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:332468 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Liu, Xinxin. author.&#160;Li, Xiaolin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332468.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Assessment in Vehicular Networks ent://SD_ILS/0/SD_ILS:332479 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Du, Suguo. author.&#160;Zhu, Haojin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332479.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332947 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Das, Sajal K. editor.&#160;Nita-Rotaru, Cristina. editor.&#160;Kantarcioglu, Murat. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332947.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02786-9">http://dx.doi.org/10.1007/978-3-319-02786-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May 28 &ndash; June 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334049 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Yuan, Yuyu. editor.&#160;Wu, Xu. editor.&#160;Lu, Yueming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334049.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35795-4">http://dx.doi.org/10.1007/978-3-642-35795-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334401 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Mangard, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334401.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334403 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Flegel, Ulrich. editor.&#160;Markatos, Evangelos. editor.&#160;Robertson, William. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334403.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37300-8">http://dx.doi.org/10.1007/978-3-642-37300-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334505 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Singh, Karan. editor.&#160;Awasthi, Amit K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334505.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37949-9">http://dx.doi.org/10.1007/978-3-642-37949-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334836 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Wang, G. Alan. editor.&#160;Zheng, Xiaolong. editor.&#160;Chau, Michael. editor.&#160;Chen, Hsinchun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334836.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39693-9">http://dx.doi.org/10.1007/978-3-642-39693-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security and Privacy Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335073 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Felici, Massimo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335073.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41205-9">http://dx.doi.org/10.1007/978-3-642-41205-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335076 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Gierlichs, Benedikt. editor.&#160;Guilley, Sylvain. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335076.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Attacks, Intrusions, and Defenses 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335085 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Stolfo, Salvatore J. editor.&#160;Stavrou, Angelos. editor.&#160;Wright, Charles V. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335085.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41284-4">http://dx.doi.org/10.1007/978-3-642-41284-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings ent://SD_ILS/0/SD_ILS:335098 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Sakiyama, Kazuo. editor.&#160;Terada, Masayuki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335098.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern Cryptography Primer Theoretical Foundations and Practical Applications ent://SD_ILS/0/SD_ILS:335099 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Ko&#347;cielny, Czes&#322;aw. author.&#160;Kurkowski, Miros&#322;aw. author.&#160;Srebrny, Marian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335099.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet and Distributed Computing Systems 6th International Conference, IDCS 2013, Hangzhou, China, October 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:335105 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Pathan, Mukaddim. editor.&#160;Wei, Guiyi. editor.&#160;Fortino, Giancarlo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335105.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41428-2">http://dx.doi.org/10.1007/978-3-642-41428-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335107 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Bologna, Sandro. editor.&#160;H&auml;mmerli, Bernhard. editor.&#160;Gritzalis, Dimitris. editor.&#160;Wolthusen, Stephen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335107.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335110 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;H&auml;mmerli, Bernhard M. editor.&#160;Kalstad Svendsen, Nils. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335110.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41485-5">http://dx.doi.org/10.1007/978-3-642-41485-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economics of Information Security and Privacy III ent://SD_ILS/0/SD_ILS:331294 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Schneier, Bruce. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331294.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Social Networks ent://SD_ILS/0/SD_ILS:332451 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Liang, Xiaohui. author.&#160;Lu, Rongxing. author.&#160;Lin, Xiaodong. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332451.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8857-6">http://dx.doi.org/10.1007/978-1-4614-8857-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IP Mobility Management for VANET ent://SD_ILS/0/SD_ILS:332861 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Taha, Sanaa. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332861.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-01351-0">http://dx.doi.org/10.1007/978-3-319-01351-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Security Management ent://SD_ILS/0/SD_ILS:332865 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Al-Shaer, Ehab. editor.&#160;Ou, Xinming. editor.&#160;Xie, Geoffrey. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332865.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-01433-3">http://dx.doi.org/10.1007/978-3-319-01433-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Deterrence and IT Protection for Critical Infrastructures ent://SD_ILS/0/SD_ILS:332909 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Martellini, Maurizio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and the Networked Society ent://SD_ILS/0/SD_ILS:332915 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Gregory, Mark A. author.&#160;Glance, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332915.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333008 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Luiijf, Eric. editor.&#160;Hartel, Pieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333008.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sensor Systems and Software 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333015 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Zuniga, Marco. editor.&#160;Dini, Gianluca. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333015.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-04166-7">http://dx.doi.org/10.1007/978-3-319-04166-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Computational Science XVII ent://SD_ILS/0/SD_ILS:334063 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Gavrilova, Marina L. editor.&#160;Tan, C. J. Kenneth. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334063.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35840-1">http://dx.doi.org/10.1007/978-3-642-35840-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334078 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Pietro, Roberto. editor.&#160;Herranz, Javier. editor.&#160;Damiani, Ernesto. editor.&#160;State, Radu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334078.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35890-6">http://dx.doi.org/10.1007/978-3-642-35890-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personal Satellite Services 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334292 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Pillai, Prashant. editor.&#160;Shorey, Rajeev. editor.&#160;Ferro, Erina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334292.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36787-8">http://dx.doi.org/10.1007/978-3-642-36787-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Passive and Active Measurement 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334223 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Roughan, Matthew. editor.&#160;Chang, Rocky. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334223.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36516-4">http://dx.doi.org/10.1007/978-3-642-36516-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334616 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Cavallaro, Lorenzo. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334616.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web-Age Information Management 14th International Conference, WAIM 2013, Beidaihe, China, June 14-16, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334622 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Wang, Jianyong. editor.&#160;Xiong, Hui. editor.&#160;Ishikawa, Yoshiharu. editor.&#160;Xu, Jianliang. editor.&#160;Zhou, Junfeng. editor.<br/>Preferred Shelf Number&#160;ONLINE(334622.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38562-9">http://dx.doi.org/10.1007/978-3-642-38562-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334638 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Lopez, Javier. editor.&#160;Huang, Xinyi. editor.&#160;Sandhu, Ravi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334638.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334760 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Rieck, Konrad. editor.&#160;Stewin, Patrick. editor.&#160;Seifert, Jean-Pierre. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334760.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39235-1">http://dx.doi.org/10.1007/978-3-642-39235-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334767 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Wang, Lingyu. editor.&#160;Shafiq, Basit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334767.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334878 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Capitani di Vimercati, Sabrina. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334878.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334880 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334880.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334909 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Crampton, Jason. editor.&#160;Jajodia, Sushil. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334938 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Avoine, Gildas. editor.&#160;Kara, Orhun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334938.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335002 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Decker, Bart. editor.&#160;Dittmann, Jana. editor.&#160;Kraetzer, Christian. editor.&#160;Vielhauer, Claus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335002.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335005 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Bitsch, Friedemann. editor.&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Ka&acirc;niche, Mohamed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335005.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40793-2">http://dx.doi.org/10.1007/978-3-642-40793-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335194 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Bagchi, Aditya. editor.&#160;Ray, Indrakshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335194.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXI 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335142 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;Stajano, Frank. editor.&#160;Anderson, Jonathan. editor.&#160;Bonneau, Joseph. editor.<br/>Preferred Shelf Number&#160;ONLINE(335142.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41717-7">http://dx.doi.org/10.1007/978-3-642-41717-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings ent://SD_ILS/0/SD_ILS:332957 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Abdalla, Michel. editor.&#160;Nita-Rotaru, Cristina. editor.&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332957.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 15th International Symposium, SSS 2013, Osaka, Japan, November 13-16, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332964 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Higashino, Teruo. editor.&#160;Katayama, Yoshiaki. editor.&#160;Masuzawa, Toshimitsu. editor.&#160;Potop-Butucaru, Maria. editor.&#160;Yamashita, Masafumi. editor.<br/>Preferred Shelf Number&#160;ONLINE(332964.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03089-0">http://dx.doi.org/10.1007/978-3-319-03089-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings ent://SD_ILS/0/SD_ILS:332984 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Wang, Guojun. editor.&#160;Ray, Indrakshi. editor.&#160;Feng, Dengguo. editor.&#160;Rajarajan, Muttukrishnan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03584-0">http://dx.doi.org/10.1007/978-3-319-03584-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334097 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Knudsen, Lars R. editor.&#160;Wu, Huapeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334097.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Internet Technology 9th International Conference, ICDCIT 2013, Bhubaneswar, India, February 5-8, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334114 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Hota, Chittaranjan. editor.&#160;Srimani, Pradip K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334114.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36071-8">http://dx.doi.org/10.1007/978-3-642-36071-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2013 The Cryptographers&rsquo; Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334122 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334122.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334132 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Hoepman, Jaap-Henk. editor.&#160;Verbauwhede, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334132.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334145 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James A. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334145.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Networking 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334025 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Frey, Davide. editor.&#160;Raynal, Michel. editor.&#160;Sarkar, Saswati. editor.&#160;Shyamasundar, Rudrapatna K. editor.&#160;Sinha, Prasun. editor.<br/>Preferred Shelf Number&#160;ONLINE(334025.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35668-1">http://dx.doi.org/10.1007/978-3-642-35668-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334305 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Basin, David. editor.&#160;Mitchell, John C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334305.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ad Hoc Networks 4th International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334331 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Zheng, Jun. editor.&#160;Mitton, Nathalie. editor.&#160;Li, Jun. editor.&#160;Lorenz, Pascal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334331.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36958-2">http://dx.doi.org/10.1007/978-3-642-36958-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334707.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334726 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Cristofaro, Emiliano. editor.&#160;Wright, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334726.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334746 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Heather, James. editor.&#160;Schneider, Steve. editor.&#160;Teague, Vanessa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334746.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing and Communications International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334972 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Thampi, Sabu M. editor.&#160;Atrey, Pradeep K. editor.&#160;Fan, Chun-I. editor.&#160;Perez, Gregorio Martinez. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334972.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40576-1">http://dx.doi.org/10.1007/978-3-642-40576-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures ent://SD_ILS/0/SD_ILS:334982 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Haataja, Keijo. author.&#160;Hypp&ouml;nen, Konstantin. author.&#160;Pasanen, Sanna. author.&#160;Toivanen, Pekka. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334982.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Internet Technologies Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335225 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Su, Jinshu. editor.&#160;Zhao, Baokang. editor.&#160;Sun, Zhigang. editor.&#160;Wang, Xiaofeng. editor.&#160;Wang, Fei. editor.<br/>Preferred Shelf Number&#160;ONLINE(335225.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-53959-6">http://dx.doi.org/10.1007/978-3-642-53959-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Collaborative Financial Infrastructure Protection Tools, Abstractions, and Middleware ent://SD_ILS/0/SD_ILS:194366 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Baldoni, Roberto. editor.&#160;Chockler, Gregory. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20420-3">http://dx.doi.org/10.1007/978-3-642-20420-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RFID. Security and Privacy 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195902 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Juels, Ari. editor.&#160;Paar, Christof. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25286-0">http://dx.doi.org/10.1007/978-3-642-25286-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196588 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Pointcheval, David. editor.&#160;Johansson, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29011-4">http://dx.doi.org/10.1007/978-3-642-29011-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196613 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Ryan, Mark D. editor.&#160;Smyth, Ben. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29101-2">http://dx.doi.org/10.1007/978-3-642-29101-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196771 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Petkova-Nikova, Svetla. editor.&#160;Pashalidis, Andreas. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29804-2">http://dx.doi.org/10.1007/978-3-642-29804-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Computing, Networking and Security International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196663 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Thilagam, P. Santhi. editor.&#160;Pais, Alwyn Roshan. editor.&#160;Chandrasekaran, K. editor.&#160;Balakrishnan, N. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29280-4">http://dx.doi.org/10.1007/978-3-642-29280-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196822 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Fischlin, Marc. editor.&#160;Buchmann, Johannes. editor.&#160;Manulis, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30057-8">http://dx.doi.org/10.1007/978-3-642-30057-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196995 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Askoxylakis, Ioannis. editor.&#160;P&ouml;hls, Henrich C. editor.&#160;Posegga, Joachim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pervasive Computing 10th International Conference, Pervasive 2012, Newcastle, UK, June 18-22, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197040 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kay, Judy. editor.&#160;Lukowicz, Paul. editor.&#160;Tokuda, Hideyuki. editor.&#160;Olivier, Patrick. editor.&#160;Kr&uuml;ger, Antonio. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31205-2">http://dx.doi.org/10.1007/978-3-642-31205-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Networks 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197042 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kwiecie&#324;, Andrzej. editor.&#160;Gaj, Piotr. editor.&#160;Stera, Piotr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31217-5">http://dx.doi.org/10.1007/978-3-642-31217-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197053 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Bao, Feng. editor.&#160;Samarati, Pierangela. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings ent://SD_ILS/0/SD_ILS:197101 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Garcia-Alfaro, Joaquin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31540-4">http://dx.doi.org/10.1007/978-3-642-31540-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197124 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Wright, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31680-7">http://dx.doi.org/10.1007/978-3-642-31680-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Networks and Computational Intelligence 6th International Conference on Information Processing, ICIP 2012, Bangalore, India, August 10-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197125 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Venugopal, K. R. editor.&#160;Patnaik, L. M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31686-9">http://dx.doi.org/10.1007/978-3-642-31686-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197153 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kim, Howon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197202 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Katsikas, Sokratis. editor.&#160;Quirchmayr, Gerald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32287-7">http://dx.doi.org/10.1007/978-3-642-32287-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197168 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Safavi-Naini, Reihaneh. editor.&#160;Canetti, Ran. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32009-5">http://dx.doi.org/10.1007/978-3-642-32009-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet of Things International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197216 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Wang, Yongheng. editor.&#160;Zhang, Xiaoming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32427-7">http://dx.doi.org/10.1007/978-3-642-32427-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197250 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Lee, Geuk. editor.&#160;Howard, Daniel. editor.&#160;Kang, Jeong Jin. editor.&#160;&#346;l&#281;zak, Dominik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32645-5">http://dx.doi.org/10.1007/978-3-642-32645-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197259 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Lee, Geuk. editor.&#160;Howard, Daniel. editor.&#160;&#346;l&#281;zak, Dominik. editor.&#160;Hong, You Sik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32692-9">http://dx.doi.org/10.1007/978-3-642-32692-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Economics of Financial and Medical Identity Theft ent://SD_ILS/0/SD_ILS:174049 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Camp, L. Jean. author.&#160;Johnson, M. Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1918-1">http://dx.doi.org/10.1007/978-1-4614-1918-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Networking 13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196091 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Bononi, Luciano. editor.&#160;Datta, Ajoy K. editor.&#160;Devismes, St&eacute;phane. editor.&#160;Misra, Archan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25959-3">http://dx.doi.org/10.1007/978-3-642-25959-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:196291 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Jung, Souhwan. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27890-7">http://dx.doi.org/10.1007/978-3-642-27890-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2012 The Cryptographers&rsquo; Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 &ndash; March 2, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196309 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Dunkelman, Orr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27954-6">http://dx.doi.org/10.1007/978-3-642-27954-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday ent://SD_ILS/0/SD_ILS:196428 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196459 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Miri, Ali. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28496-0">http://dx.doi.org/10.1007/978-3-642-28496-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings ent://SD_ILS/0/SD_ILS:196497 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Degano, Pierpaolo. editor.&#160;Guttman, Joshua D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28641-4">http://dx.doi.org/10.1007/978-3-642-28641-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security VII ent://SD_ILS/0/SD_ILS:196512 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28693-3">http://dx.doi.org/10.1007/978-3-642-28693-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196562 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Cramer, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28914-9">http://dx.doi.org/10.1007/978-3-642-28914-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196796 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Schindler, Werner. editor.&#160;Huss, Sorin A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29912-4">http://dx.doi.org/10.1007/978-3-642-29912-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196805 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Meadows, Catherine. editor.&#160;Fernandez-Gago, Carmen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29963-6">http://dx.doi.org/10.1007/978-3-642-29963-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197072 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Mitrokotsa, Aikaterini. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31410-0">http://dx.doi.org/10.1007/978-3-642-31410-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web-Age Information Management 13th International Conference, WAIM 2012, Harbin, China, August 18-20, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197200 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Gao, Hong. editor.&#160;Lim, Lipyeow. editor.&#160;Wang, Wei. editor.&#160;Li, Chuan. editor.&#160;Chen, Lei. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32281-5">http://dx.doi.org/10.1007/978-3-642-32281-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197203 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Chen, Liqun. editor.&#160;Yung, Moti. editor.&#160;Zhu, Liehuang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32298-3">http://dx.doi.org/10.1007/978-3-642-32298-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197280 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Decker, Bart. editor.&#160;Chadwick, David W. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32805-3">http://dx.doi.org/10.1007/978-3-642-32805-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197291 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32873-2">http://dx.doi.org/10.1007/978-3-642-32873-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197299 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Visconti, Ivan. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32928-9">http://dx.doi.org/10.1007/978-3-642-32928-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Voting and Identity Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197268 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kiayias, Aggelos. editor.&#160;Lipmaa, Helger. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32747-6">http://dx.doi.org/10.1007/978-3-642-32747-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Attacks, Intrusions, and Defenses 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197358 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Balzarotti, Davide. editor.&#160;Stolfo, Salvatore J. editor.&#160;Cova, Marco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33338-5">http://dx.doi.org/10.1007/978-3-642-33338-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Security, Safety and Sustainability &amp; e-Democracy 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197375 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Georgiadis, Christos K. editor.&#160;Jahankhani, Hamid. editor.&#160;Pimenidis, Elias. editor.&#160;Bashroush, Rabih. editor.&#160;Al-Nemrat, Ameer. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33448-1">http://dx.doi.org/10.1007/978-3-642-33448-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197384 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Hevia, Alejandro. editor.&#160;Neven, Gregory. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197399 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Richa, Andr&eacute;a W. editor.&#160;Scheideler, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33536-5">http://dx.doi.org/10.1007/978-3-642-33536-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197411 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Domingo-Ferrer, Josep. editor.&#160;Tinnirello, Ilenia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33627-0">http://dx.doi.org/10.1007/978-3-642-33627-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197419 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Ortmeier, Frank. editor.&#160;Daniel, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33675-1">http://dx.doi.org/10.1007/978-3-642-33675-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197420 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Ortmeier, Frank. editor.&#160;Daniel, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33678-2">http://dx.doi.org/10.1007/978-3-642-33678-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197425 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kotenko, Igor. editor.&#160;Skormin, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33704-8">http://dx.doi.org/10.1007/978-3-642-33704-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197475 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Hanaoka, Goichiro. editor.&#160;Yamauchi, Toshihiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197478 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Chim, Tat Wing. editor.&#160;Yuen, Tsz Hon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197479 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Thampi, Sabu M. editor.&#160;Zomaya, Albert Y. editor.&#160;Strufe, Thorsten. editor.&#160;Alcaraz Calero, Jose M. editor.&#160;Thomas, Tony , 1927-1977 editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34135-9">http://dx.doi.org/10.1007/978-3-642-34135-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197500 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Grossklags, Jens. editor.&#160;Walrand, Jean. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34266-0">http://dx.doi.org/10.1007/978-3-642-34266-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197516 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Bogdanov, Andrey. editor.&#160;Sanadhya, Somitra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34416-9">http://dx.doi.org/10.1007/978-3-642-34416-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197529 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Xu, Li. editor.&#160;Bertino, Elisa. editor.&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34601-9">http://dx.doi.org/10.1007/978-3-642-34601-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197464 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Canteaut, Anne. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34047-5">http://dx.doi.org/10.1007/978-3-642-34047-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet and Distributed Computing Systems 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197553 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Xiang, Yang. editor.&#160;Pathan, Mukaddim. editor.&#160;Tao, Xiaohui. editor.&#160;Wang, Hua. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34883-9">http://dx.doi.org/10.1007/978-3-642-34883-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197557 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Galbraith, Steven. editor.&#160;Nandi, Mridul. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34931-7">http://dx.doi.org/10.1007/978-3-642-34931-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197580 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Lei, Jingsheng. editor.&#160;Wang, Fu Lee. editor.&#160;Li, Mo. editor.&#160;Luo, Yuan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35211-9">http://dx.doi.org/10.1007/978-3-642-35211-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197566 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Venkatakrishnan, Venkat. editor.&#160;Goswami, Diganta. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35130-3">http://dx.doi.org/10.1007/978-3-642-35130-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197597 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Xiang, Yang. editor.&#160;Lopez, Javier. editor.&#160;Kuo, C.-C. Jay. editor.&#160;Zhou, Wanlei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35362-8">http://dx.doi.org/10.1007/978-3-642-35362-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197598 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Mitchell, Chris J. editor.&#160;Tomlinson, Allan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35371-0">http://dx.doi.org/10.1007/978-3-642-35371-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197603 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Pieprzyk, Josef. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;Manulis, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35404-5">http://dx.doi.org/10.1007/978-3-642-35404-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197604 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Lee, Dong Hoon. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35416-8">http://dx.doi.org/10.1007/978-3-642-35416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Hacks - Intensivkurs Angriff und Verteidigung mit Python ent://SD_ILS/0/SD_ILS:195598 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Ballmann, Bastian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24305-9">http://dx.doi.org/10.1007/978-3-642-24305-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196237 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Danezis, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27576-0">http://dx.doi.org/10.1007/978-3-642-27576-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196240 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Camenisch, Jan. editor.&#160;Kesdogan, Dogan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27585-2">http://dx.doi.org/10.1007/978-3-642-27585-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects of Security and Trust 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:196695 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Barthe, Gilles. editor.&#160;Datta, Anupam. editor.&#160;Etalle, Sandro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29420-4">http://dx.doi.org/10.1007/978-3-642-29420-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197636 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Obaidat, Mohammad S. editor.&#160;Sevillano, Jos&eacute; L. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35755-8">http://dx.doi.org/10.1007/978-3-642-35755-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Ubiquitous Computing ent://SD_ILS/0/SD_ILS:207047 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Khalil, Ismail. editor.&#160;Mantoro, Teddy. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.2991/978-94-91216-71-8">http://dx.doi.org/10.2991/978-94-91216-71-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research ent://SD_ILS/0/SD_ILS:173331 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Keromytis, Angelos D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-9866-8">http://dx.doi.org/10.1007/978-1-4419-9866-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats ent://SD_ILS/0/SD_ILS:173823 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;Wang, X. Sean. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Research Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193975 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Camenisch, Jan. editor.&#160;Kisimov, Valentin. editor.&#160;Dubovitskaya, Maria. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19228-9">http://dx.doi.org/10.1007/978-3-642-19228-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2011 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194024 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Catalano, Dario. editor.&#160;Fazio, Nelly. editor.&#160;Gennaro, Rosario. editor.&#160;Nicolosi, Antonio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19379-8">http://dx.doi.org/10.1007/978-3-642-19379-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194466 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Fehr, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20728-0">http://dx.doi.org/10.1007/978-3-642-20728-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2011 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194876 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Nitaj, Abderrahmane. editor.&#160;Pointcheval, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21969-6">http://dx.doi.org/10.1007/978-3-642-21969-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Trust Computing, Data Management and Applications 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194993 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Park, James J. editor.&#160;Lopez, Javier. editor.&#160;Yeo, Sang-Soo. editor.&#160;Shon, Taeshik. editor.&#160;Taniar, David. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22339-6">http://dx.doi.org/10.1007/978-3-642-22339-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXV 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194997 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Li, Yingjiu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22348-8">http://dx.doi.org/10.1007/978-3-642-22348-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195578 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Rhee, Kyung-Hyune. editor.&#160;Nyang, DaeHun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security VI ent://SD_ILS/0/SD_ILS:195673 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Shi, Yun Q. editor.&#160;Emmanuel, Sabu. editor.&#160;Kankanhalli, Mohan S. editor.&#160;Chang, Shih-Fu. editor.&#160;Radhakrishnan, Regunathan. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24556-5">http://dx.doi.org/10.1007/978-3-642-24556-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195683 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Joye, Marc. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;Tunstall, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195888 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Qing, Sihan. editor.&#160;Susilo, Willy. editor.&#160;Wang, Guilin. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195900 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Baras, John S. editor.&#160;Katz, Jonathan. editor.&#160;Altman, Eitan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25280-8">http://dx.doi.org/10.1007/978-3-642-25280-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195901 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Chen, Liqun. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25283-9">http://dx.doi.org/10.1007/978-3-642-25283-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 &ndash; December 2, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195937 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Yang, Bo-Yin.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25405-5">http://dx.doi.org/10.1007/978-3-642-25405-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195966 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Lin, Dongdai. editor.&#160;Tsudik, Gene. editor.&#160;Wang, Xiaoyun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25513-7">http://dx.doi.org/10.1007/978-3-642-25513-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings ent://SD_ILS/0/SD_ILS:195982 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Jajodia, Sushil. editor.&#160;Mazumdar, Chandan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25560-1">http://dx.doi.org/10.1007/978-3-642-25560-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantitative Security Risk Assessment of Enterprise Networks ent://SD_ILS/0/SD_ILS:174032 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Ou, Xinming. author.&#160;Singhal, Anoop. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1860-3">http://dx.doi.org/10.1007/978-1-4614-1860-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Networking 12th International Conference, ICDCN 2011, Bangalore, India, January 2-5, 2011. Proceedings ent://SD_ILS/0/SD_ILS:193675 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Aguilera, Marcos K. editor.&#160;Yu, Haifeng. editor.&#160;Vaidya, Nitin H. editor.&#160;Srinivasan, Vikram. editor.&#160;Choudhury, Romit Roy. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17679-1">http://dx.doi.org/10.1007/978-3-642-17679-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193686 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Jha, Somesh. editor.&#160;Mathuria, Anish. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2011 The Cryptographers&rsquo; Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings ent://SD_ILS/0/SD_ILS:193925 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kiayias, Aggelos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19074-2">http://dx.doi.org/10.1007/978-3-642-19074-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193761 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Chung, Yongwha. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17955-6">http://dx.doi.org/10.1007/978-3-642-17955-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194086 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Ishai, Yuval. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19571-6">http://dx.doi.org/10.1007/978-3-642-19571-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:194143 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Degano, Pierpaolo. editor.&#160;Etalle, Sandro. editor.&#160;Guttman, Joshua. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19751-2">http://dx.doi.org/10.1007/978-3-642-19751-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 &ndash; June 1, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194568 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Bao, Feng. editor.&#160;Weng, Jian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomic and Trusted Computing 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195360 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Calero, Jose M. Alcaraz. editor.&#160;Yang, Laurence T. editor.&#160;M&aacute;rmol, F&eacute;lix G&oacute;mez. editor.&#160;Garc&iacute;a Villalba, Luis Javier. editor.&#160;Li, Andy Xiaolin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23496-5">http://dx.doi.org/10.1007/978-3-642-23496-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; INDOCRYPT 2011 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195988 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Bernstein, Daniel J. editor.&#160;Chatterjee, Sanjit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25578-6">http://dx.doi.org/10.1007/978-3-642-25578-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196143 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27257-8">http://dx.doi.org/10.1007/978-3-642-27257-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Internet ent://SD_ILS/0/SD_ILS:204521 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Salgarelli, Luca. editor.&#160;Bianchi, Giuseppe. editor.&#160;Blefari-Melazzi, Nicola. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-88-470-1818-1">http://dx.doi.org/10.1007/978-88-470-1818-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2010, Corfu, Greece, September 22-24, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193101 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Domingo-Ferrer, Josep. editor.&#160;Magkos, Emmanouil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15838-4">http://dx.doi.org/10.1007/978-3-642-15838-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:193265 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Bao, Feng. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;Jing, Jiwu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16342-5">http://dx.doi.org/10.1007/978-3-642-16342-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2011 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194380 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Paterson, Kenneth G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20465-4">http://dx.doi.org/10.1007/978-3-642-20465-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-M&aacute;laga, Spain, June 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194663 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Herrero, &Aacute;lvaro. editor.&#160;Corchado, Emilio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21323-6">http://dx.doi.org/10.1007/978-3-642-21323-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194789 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Joux, Antoine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21702-9">http://dx.doi.org/10.1007/978-3-642-21702-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Networks 18th Conference, CN 2011, Ustron, Poland, June 14-18, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194812 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kwiecie&#324;, Andrzej. editor.&#160;Gaj, Piotr. editor.&#160;Stera, Piotr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21771-5">http://dx.doi.org/10.1007/978-3-642-21771-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194726 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Lai, Xuejia. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21518-6">http://dx.doi.org/10.1007/978-3-642-21518-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194738 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Lopez, Javier. editor.&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wired/Wireless Internet Communications 9th IFIP TC 6 International Conference, WWIC 2011, Vilanova i la Geltr&uacute;, Spain, June 15-17, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194740 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Masip-Bruin, Xavier. editor.&#160;Verchere, Dominique. editor.&#160;Tsaoussidis, Vassilis. editor.&#160;Yannuzzi, Marcelo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21560-5">http://dx.doi.org/10.1007/978-3-642-21560-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194968 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Hopper, Nicholas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22263-4">http://dx.doi.org/10.1007/978-3-642-22263-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:195089 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Camenisch, Jan. editor.&#160;Lambrinoudakis, Costas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22633-5">http://dx.doi.org/10.1007/978-3-642-22633-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Parallel and Distributed Computing and Networks International Conference, PDCN 2010, Chongqing, China, December 13-14, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:195111 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Qi, Luo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22706-6">http://dx.doi.org/10.1007/978-3-642-22706-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2011 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195141 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Rogaway, Phillip. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22792-9">http://dx.doi.org/10.1007/978-3-642-22792-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VI FOSAD Tutorial Lectures ent://SD_ILS/0/SD_ILS:195231 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Aldini, Alessandro. editor.&#160;Gorrieri, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23082-0">http://dx.doi.org/10.1007/978-3-642-23082-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 30th International Conference,SAFECOMP 2011, Naples, Italy, September 19-22, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195586 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Flammini, Francesco. editor.&#160;Bologna, Sandro. editor.&#160;Vittorini, Valeria. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24270-0">http://dx.doi.org/10.1007/978-3-642-24270-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 5th International Conference, ProvSec 2011, Xi&rsquo;an, China, October 16-18, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195600 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Boyen, Xavier. editor.&#160;Chen, Xiaofeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24316-5">http://dx.doi.org/10.1007/978-3-642-24316-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 13th International Symposium, SSS 2011, Grenoble, France, October 10-12, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195671 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;D&eacute;fago, Xavier. editor.&#160;Petit, Franck. editor.&#160;Villain, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24550-3">http://dx.doi.org/10.1007/978-3-642-24550-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195856 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Iwata, Tetsu. editor.&#160;Nishigaki, Masakatsu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Spyware and Adware ent://SD_ILS/0/SD_ILS:167516 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192420 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:192673 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kurosawa, Kaoru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14496-7">http://dx.doi.org/10.1007/978-3-642-14496-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192684 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Atallah, Mikhail J. editor.&#160;Hopper, Nicholas J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14527-8">http://dx.doi.org/10.1007/978-3-642-14527-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:192708 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Chen, Liqun. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14597-1">http://dx.doi.org/10.1007/978-3-642-14597-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information, Security and Cryptology &ndash; ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192649 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Lee, Donghoon. editor.&#160;Hong, Seokhie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - INDOCRYPT 2010 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193590 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Gong, Guang. editor.&#160;Gupta, Kishan Chand. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17401-8">http://dx.doi.org/10.1007/978-3-642-17401-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings ent://SD_ILS/0/SD_ILS:193606 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Joye, Marc. editor.&#160;Miyaji, Atsuko. editor.&#160;Otsuka, Akira. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17455-1">http://dx.doi.org/10.1007/978-3-642-17455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193666 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Soriano, Miguel. editor.&#160;Qing, Sihan. editor.&#160;L&oacute;pez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encryption for Digital Content ent://SD_ILS/0/SD_ILS:171850 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kiayias, Aggelos. author.&#160;Pehlivanoglu, Serdar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economics of Information Security and Privacy ent://SD_ILS/0/SD_ILS:172736 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Moore, Tyler. editor.&#160;Pym, David. editor.&#160;Ioannidis, Christos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-6967-5">http://dx.doi.org/10.1007/978-1-4419-6967-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider Threats in Cyber Security ent://SD_ILS/0/SD_ILS:172782 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Probst, Christian W. editor.&#160;Hunker, Jeffrey. editor.&#160;Gollmann, Dieter. editor.&#160;Bishop, Matt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191613 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Roudier, Yves. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11207-2">http://dx.doi.org/10.1007/978-3-642-11207-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Networking 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191651 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kant, Krishna. editor.&#160;Pemmaraju, Sriram V. editor.&#160;Sivalingam, Krishna M. editor.&#160;Wu, Jie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11322-2">http://dx.doi.org/10.1007/978-3-642-11322-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2010 Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192074 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Bernstein, Daniel J. editor.&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12678-9">http://dx.doi.org/10.1007/978-3-642-12678-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192123 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kwak, Jin. editor.&#160;Deng, Robert H. editor.&#160;Won, Yoojae. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12827-1">http://dx.doi.org/10.1007/978-3-642-12827-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192157 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Sendrier, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12929-2">http://dx.doi.org/10.1007/978-3-642-12929-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2010 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 &ndash; June 3, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192256 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Gilbert, Henri. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13190-5">http://dx.doi.org/10.1007/978-3-642-13190-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192472 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Hong, Seokhie. editor.&#160;Iwata, Tetsu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13858-4">http://dx.doi.org/10.1007/978-3-642-13858-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Networks 17th Conference, CN 2010, Ustro&#324;, Poland, June 15-19, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192473 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Kwiecie&#324;, Andrzej. editor.&#160;Gaj, Piotr. editor.&#160;Stera, Piotr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13861-4">http://dx.doi.org/10.1007/978-3-642-13861-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Networked Services and Applications - Engineering, Control and Management 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192508 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Aagesen, Finn Arve. editor.&#160;Knapskog, Svein Johan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13971-0">http://dx.doi.org/10.1007/978-3-642-13971-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192544 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Steinfeld, Ron. editor.&#160;Hawkes, Philip. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192932 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Garay, Juan A. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15317-4">http://dx.doi.org/10.1007/978-3-642-15317-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193160 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Dolev, Shlomi. editor.&#160;Cobb, Jorge. editor.&#160;Fischer, Michael. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16023-3">http://dx.doi.org/10.1007/978-3-642-16023-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193296 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Martinelli, Fabio. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16441-5">http://dx.doi.org/10.1007/978-3-642-16441-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi&rsquo;an, China, October 26-29, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193341 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Xie, Bing. editor.&#160;Branke, Juergen. editor.&#160;Sadjadi, S. Masoud. editor.&#160;Zhang, Daqing. editor.&#160;Zhou, Xingshe. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16576-4">http://dx.doi.org/10.1007/978-3-642-16576-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193421 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Ors Yalcin, Siddika Berna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16822-2">http://dx.doi.org/10.1007/978-3-642-16822-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193422 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Echizen, Isao. editor.&#160;Kunihiro, Noboru. editor.&#160;Sasaki, Ryoichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191714 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Weerasinghe, Dasun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ad Hoc Networks First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191780 2024-11-06T23:18:05Z 2024-11-06T23:18:05Z Author&#160;Zheng, Jun. editor.&#160;Mao, Shiwen. editor.&#160;Midkiff, Scott F. editor.&#160;Zhu, Hua. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11723-7">http://dx.doi.org/10.1007/978-3-642-11723-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>