Search Results for Computer Security. - Narrowed by: 2014
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026te$003dILS$0026ps$003d300?dt=list
2024-12-28T12:57:10Z
Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
ent://SD_ILS/0/SD_ILS:62188
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer Safety, Reliability, and Security SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485676
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Bondavalli, Andrea. editor. Ceccarelli, Andrea. editor. Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10557-4">https://doi.org/10.1007/978-3-319-10557-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
ent://SD_ILS/0/SD_ILS:489123
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Kutylowski, Miroslaw. editor. Vaidya, Jaideep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11203-9">https://doi.org/10.1007/978-3-319-11203-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:482801
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Bondavalli, Andrea. editor. Di Giandomenico, Felicita. editor. (orcid)0000-0002-8760-7299 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10506-2">https://doi.org/10.1007/978-3-319-10506-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What Is Computer Science? An Information Security Perspective
ent://SD_ILS/0/SD_ILS:488536
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Page, Daniel. author. Smart, Nigel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04042-4">https://doi.org/10.1007/978-3-319-04042-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487372
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Yoshida, Maki. editor. Mouri, Koichi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
ent://SD_ILS/0/SD_ILS:487789
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Kutylowski, Miroslaw. editor. Vaidya, Jaideep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11212-1">https://doi.org/10.1007/978-3-319-11212-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487966
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Martinez Perez, Gregorio. editor. Thampi, Sabu M. editor. Ko, Ryan. editor. Shu, Lei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:289151
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:287123
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:290320
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and system security
ent://SD_ILS/0/SD_ILS:306690
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing information security
ent://SD_ILS/0/SD_ILS:306692
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Business continuity and disaster recovery planning for IT professionals
ent://SD_ILS/0/SD_ILS:306695
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Snedaker, Susan. Rima, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:317847
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA 76.9 A25 E43 2014<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
The basics of digital privacy simple tools to protect your personal information and your identity online
ent://SD_ILS/0/SD_ILS:356123
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Cherry, Denny. LaRock, Thomas.<br/>Preferred Shelf Number ONLINE(356123.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The state of the art in intrusion prevention and detection
ent://SD_ILS/0/SD_ILS:356396
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number ONLINE(356396.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482203523">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for multihop wireless networks
ent://SD_ILS/0/SD_ILS:356916
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Khan, Shafiullah, editor. Lloret Mauri, Jaime, editor.<br/>Preferred Shelf Number ONLINE(356916.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466578043">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Unauthorized access the crisis in online privacy and security
ent://SD_ILS/0/SD_ILS:285321
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Sloan, Robert H. Warner, Richard, 1946-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439830147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Distributed networks : intelligence, security, and applications
ent://SD_ILS/0/SD_ILS:285408
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Memon, Qurban Ali, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466559585">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network anomaly detection : a machine learning perspective
ent://SD_ILS/0/SD_ILS:285413
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Bhattacharyya, Dhruba K., author. Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466582095">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime and cyberwarfare
ent://SD_ILS/0/SD_ILS:341980
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Bernik, Igor, author.<br/>Preferred Shelf Number ONLINE(341980.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity for executives : a practical guide
ent://SD_ILS/0/SD_ILS:341997
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Touhill, Gregory J., author. Touhill, C. J., 1938- author.<br/>Preferred Shelf Number ONLINE(341997.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a>
ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a>
MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security
ent://SD_ILS/0/SD_ILS:342168
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Perez, Andre.<br/>Preferred Shelf Number ONLINE(342168.1)<br/>Electronic Access ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a>
MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a>
Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:342584
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number ONLINE(342584.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439810637">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Software test attacks to break mobile and embedded devices
ent://SD_ILS/0/SD_ILS:342868
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Hagar, Jon Duncan, author.<br/>Preferred Shelf Number ONLINE(342868.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466575318">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:354232
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S725 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Data analysis for network cyber-security
ent://SD_ILS/0/SD_ILS:354757
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Adams, Niall M., 1968- Heard, Nicholas.<br/>Preferred Shelf Number TK5105.59 D375 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems
ent://SD_ILS/0/SD_ILS:355352
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Knapp, Eric D. Langill, Joel Thomas.<br/>Preferred Shelf Number ONLINE(355352.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:355770
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Andress, Jason, author.<br/>Preferred Shelf Number ONLINE(355770.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Targeted cyber attacks : multi-staged attacks driven by exploits and malware
ent://SD_ILS/0/SD_ILS:355853
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Sood, Aditya K., author. Enbody, Richard J., author.<br/>Preferred Shelf Number ONLINE(355853.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
ent://SD_ILS/0/SD_ILS:355909
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE(355909.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for service oriented architectures
ent://SD_ILS/0/SD_ILS:356556
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number ONLINE(356556.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466584044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The frugal CISO : using innovation and smart approaches to maximize your security posture
ent://SD_ILS/0/SD_ILS:356624
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Anderson, Kerry Ann, author.<br/>Preferred Shelf Number ONLINE(356624.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482220087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Anonymous communication networks : protecting privacy on the web
ent://SD_ILS/0/SD_ILS:356657
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Peng, Kun, author.<br/>Preferred Shelf Number ONLINE(356657.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:356681
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number ONLINE(356681.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466592155">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:371288
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013
ent://SD_ILS/0/SD_ILS:485061
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Hameurlain, Abdelkader. editor. Küng, Josef. editor. Wagner, Roland. editor. Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589 Thoai, Nam. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45947-8">https://doi.org/10.1007/978-3-662-45947-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485513
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Huang, Xinyi. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485531
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Chau, Michael. editor. Chen, Hsinchun. editor. Wang, G. Alan. editor. Wang, Jau-Hwang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06677-6">https://doi.org/10.1007/978-3-319-06677-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Defense and Situational Awareness
ent://SD_ILS/0/SD_ILS:485697
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Kott, Alexander. editor. Wang, Cliff. editor. Erbacher, Robert F. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11391-3">https://doi.org/10.1007/978-3-319-11391-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 -- October 1, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:485732
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Felber, Pascal. editor. Garg, Vijay. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11764-5">https://doi.org/10.1007/978-3-319-11764-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:485743
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Gritzalis, Dimitris. editor. Kiayias, Aggelos. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12280-9">https://doi.org/10.1007/978-3-319-12280-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:485842
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Chen, Liqun. editor. Mitchell, Chris. editor. (orcid)0000-0002-6118-0055 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-14054-4">https://doi.org/10.1007/978-3-319-14054-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486191
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Bissyandé, Tegawendé F. editor. van Stam, Gertjan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08368-1">https://doi.org/10.1007/978-3-319-08368-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Distributed Computing and Internet Technology 10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:487632
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Natarajan, Raja. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04483-5">https://doi.org/10.1007/978-3-319-04483-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488136
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Kotulski, Zbigniew. editor. Ksiezopolski, Bogdan. editor. Mazur, Katarzyna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488140
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Lloret Mauri, Jaime. editor. Thampi, Sabu M. editor. Rawat, Danda B. editor. Jin, Di. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44966-0">https://doi.org/10.1007/978-3-662-44966-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dynamic Secrets in Communication Security
ent://SD_ILS/0/SD_ILS:488222
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Xiao, Sheng. author. Gong, Weibo. author. Towsley, Don. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Code Breaking in the Pacific
ent://SD_ILS/0/SD_ILS:488233
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Donovan, Peter. author. Mack, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08278-3">https://doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberterrorism Understanding, Assessment, and Response
ent://SD_ILS/0/SD_ILS:488243
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Chen, Thomas M. editor. Jarvis, Lee. editor. Macdonald, Stuart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4939-0962-9">https://doi.org/10.1007/978-1-4939-0962-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity Systems for Human Cognition Augmentation
ent://SD_ILS/0/SD_ILS:488504
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Pino, Robinson E. editor. Kott, Alexander. editor. Shevenell, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10374-7">https://doi.org/10.1007/978-3-319-10374-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automated Firewall Analytics Design, Configuration and Optimization
ent://SD_ILS/0/SD_ILS:488519
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Al-Shaer, Ehab. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10371-6">https://doi.org/10.1007/978-3-319-10371-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488522
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Gladyshev, Pavel. editor. Marrington, Andrew. editor. Baggili, Ibrahim. editor. (orcid)0000-0002-9574-9537 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pervasive Wireless Environments: Detecting and Localizing User Spoofing
ent://SD_ILS/0/SD_ILS:488438
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Yang, Jie. author. Chen, Yingying. author. Trappe, Wade. author. Cheng, Jerry. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07356-9">https://doi.org/10.1007/978-3-319-07356-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Information Systems Engineering Workshops CAiSE 2014 International Workshops, Thessaloniki, Greece, June 16-20, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488707
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Iliadis, Lazaros. editor. Papazoglou, Michael. editor. Pohl, Klaus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07869-4">https://doi.org/10.1007/978-3-319-07869-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberpatterns Unifying Design Patterns with Security and Attack Patterns
ent://SD_ILS/0/SD_ILS:488814
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Blackwell, Clive. editor. Zhu, Hong. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04447-7">https://doi.org/10.1007/978-3-319-04447-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Continued Rise of the Cloud Advances and Trends in Cloud Computing
ent://SD_ILS/0/SD_ILS:488899
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Mahmood, Zaigham. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4471-6452-4">https://doi.org/10.1007/978-1-4471-6452-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488916
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Boureanu, Ioana. editor. Owesarski, Philippe. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488918
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Chow, Sherman S.M. editor. Liu, Joseph K. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488920
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Prouff, Emmanuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10175-0">https://doi.org/10.1007/978-3-319-10175-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488930
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Tryfonas, Theo. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communication Technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488934
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Linawati. editor. Mahendra, Made Sudiana. editor. Neuhold, Erich J. editor. Tjoa, A Min. editor. You, Ilsun. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-55032-4">https://doi.org/10.1007/978-3-642-55032-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Future Internet Services and Systems Current Research
ent://SD_ILS/0/SD_ILS:488944
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Heisel, Maritta. editor. Joosen, Wouter. editor. López, Javier. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07452-8">https://doi.org/10.1007/978-3-319-07452-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Technologies and Policy Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488945
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Preneel, Bart. editor. Ikonomou, Demosthenes. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06749-0">https://doi.org/10.1007/978-3-319-06749-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488947
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Eckert, Claudia. editor. Katsikas, Sokratis K. editor. Pernul, Günther. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09770-1">https://doi.org/10.1007/978-3-319-09770-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology -- CT-RSA 2014 The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489005
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Benaloh, Josh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04852-9">https://doi.org/10.1007/978-3-319-04852-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488954
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author De Cristofaro, Emiliano. editor. Murdoch, Steven J. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08506-7">https://doi.org/10.1007/978-3-319-08506-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II
ent://SD_ILS/0/SD_ILS:488956
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:489016
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489025
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Domingo-Ferrer, Josep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11257-2">https://doi.org/10.1007/978-3-319-11257-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489026
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Mauw, Sjouke. editor. Damsgaard Jensen, Christian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography
ent://SD_ILS/0/SD_ILS:489032
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Shi, Yun Q. editor. Liu, Feng. editor. Yan, Weiqi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489033
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 Saad, Walid. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12601-2">https://doi.org/10.1007/978-3-319-12601-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489038
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Cuellar, Jorge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10329-7">https://doi.org/10.1007/978-3-319-10329-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems -- CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489052
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Batina, Lejla. editor. (orcid)0000-0003-0727-3573 Robshaw, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44709-3">https://doi.org/10.1007/978-3-662-44709-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Global Computing 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489054
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Maffei, Matteo. editor. Tuosto, Emilio. editor. (orcid)0000-0002-7032-3281 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45917-1">https://doi.org/10.1007/978-3-662-45917-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489055
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Teufel, Stephanie. editor. A Min, Tjoa. editor. You, Illsun. editor. Weippl, Edgar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489060
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Hansen, Marit. editor. Hoepman, Jaap-Henk. editor. Leenes, Ronald. editor. Whitehouse, Diane. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-55137-6">https://doi.org/10.1007/978-3-642-55137-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:489066
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Garay, Juan A. editor. Gennaro, Rosario. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44371-2">https://doi.org/10.1007/978-3-662-44371-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489068
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Meier, Willi. editor. Mukhopadhyay, Debdeep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13039-2">https://doi.org/10.1007/978-3-319-13039-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489070
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393 Lioudakis, Georgios. editor. Cuppens-Boulahia, Nora. editor. Foley, Simon. editor. Fitzgerald, William M. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54568-9">https://doi.org/10.1007/978-3-642-54568-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
On the Move to Meaningful Internet Systems: OTM 2014 Conferences Confederated International Conferences: CoopIS and ODBASE 2014, Amantea, Italy, October 27-31, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489077
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Meersman, Robert. editor. Panetto, Herve. editor. (orcid)0000-0002-5537-2261 Dillon, Tharam. editor. Missikoff, Michele. editor. Liu, Lin. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45563-0">https://doi.org/10.1007/978-3-662-45563-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489080
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Dietrich, Sven. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08509-8">https://doi.org/10.1007/978-3-319-08509-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and System Security 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489091
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Au, Man Ho. editor. Carminati, Barbara. editor. Kuo, C.-C. Jay. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11698-3">https://doi.org/10.1007/978-3-319-11698-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Data and Security Engineering 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489103
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589 Wagner, Roland. editor. Neuhold, Erich J. editor. Takizawa, Makoto. editor. Küng, Josef. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12778-1">https://doi.org/10.1007/978-3-319-12778-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489108
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Lin, Dongdai. editor. Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942 Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489121
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Katsikas, Sokratis. editor. Agudo, Isaac. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-53997-8">https://doi.org/10.1007/978-3-642-53997-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489201
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Cuppens-Boulahia, Nora. editor. Cuppens, Frederic. editor. Jajodia, Sushil. editor. Abou El Kalam, Anas. editor. Sans, Thierry. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489223
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Moriai, Shiho. editor. (orcid)0000-0002-6072-6183 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43933-3">https://doi.org/10.1007/978-3-662-43933-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489261
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Lange, Tanja. editor. Lauter, Kristin. editor. Lisoněk, Petr. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43414-7">https://doi.org/10.1007/978-3-662-43414-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489603
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Shi, Yun Qing. editor. Kim, Hyoung-Joong. editor. Pérez-González, Fernando. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43886-2">https://doi.org/10.1007/978-3-662-43886-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Business and Telecommunications International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:482710
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Obaidat, Mohammad S. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44791-8">https://doi.org/10.1007/978-3-662-44791-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485594
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Holz, Thorsten. editor. (orcid)0000-0002-2783-1264 Ioannidis, Sotiris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08593-7">https://doi.org/10.1007/978-3-319-08593-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:485543
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Jonker, Willem. editor. Petković, Milan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06811-4">https://doi.org/10.1007/978-3-319-06811-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:485545
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Pointcheval, David. editor. Vergnaud, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06734-6">https://doi.org/10.1007/978-3-319-06734-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wired/Wireless Internet Communications 12th International Conference, WWIC 2014, Paris, France, May 26-28, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485784
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Mellouk, Abdelhamid. editor. Fowler, Scott. editor. Daachi, Boubaker. editor. Hoceini, Said. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13174-0">https://doi.org/10.1007/978-3-319-13174-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485793
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Chow, Sherman S.M. editor. Camenisch, Jan. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure and Trustworthy Service Composition The Aniketos Approach
ent://SD_ILS/0/SD_ILS:485813
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Brucker, Achim. editor. Dalpiaz, Fabiano. editor. (orcid)0000-0003-4480-3887 Giorgini, Paolo. editor. Meland, Per Håkon. editor. Rios, Erkuden. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13518-2">https://doi.org/10.1007/978-3-319-13518-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486701
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Sideridis, Alexander B. editor. Kardasiadou, Zoe. editor. Yialouris, Constantine P. editor. Zorkadis, Vasilios. editor. (orcid)0000-0003-4399-2495 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11710-2">https://doi.org/10.1007/978-3-319-11710-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Hardening An Automated Approach to Improving Network Security
ent://SD_ILS/0/SD_ILS:486885
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Wang, Lingyu. author. Albanese, Massimiliano. author. Jajodia, Sushil. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04612-9">https://doi.org/10.1007/978-3-319-04612-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Global Computing 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486886
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Abadi, Martín. editor. Lluch Lafuente, Alberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-05119-2">https://doi.org/10.1007/978-3-319-05119-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486887
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Kim, Yongdae. editor. Lee, Heejo. editor. Perrig, Adrian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-05149-9">https://doi.org/10.1007/978-3-319-05149-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486893
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Cao, Zhenfu. editor. Zhang, Fangguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:486912
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Chakraborty, Rajat Subhra. editor. Matyas, Vashek. editor. Schaumont, Patrick. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy vs. Security
ent://SD_ILS/0/SD_ILS:487072
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Stalla-Bourdillon, Sophie. author. Phillips, Joshua. author. Ryan, Mark D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:487382
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Kimppa, Kai. editor. Whitehouse, Diane. editor. Kuusela, Tiina. editor. Phahlamohlaka, Jackie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44208-1">https://doi.org/10.1007/978-3-662-44208-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fundamentals of Sketch-Based Passwords A General Framework
ent://SD_ILS/0/SD_ILS:487393
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Riggan, Benjamin S. author. Snyder, Wesley E. author. Wang, Cliff. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13629-5">https://doi.org/10.1007/978-3-319-13629-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487278
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Mu, Yi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud management and security
ent://SD_ILS/0/SD_ILS:341816
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Abbadi, Imad M., author.<br/>Preferred Shelf Number ONLINE(341816.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a>
<a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a>
Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security management a critical thinking approach
ent://SD_ILS/0/SD_ILS:342845
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Preferred Shelf Number ONLINE(342845.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466561786">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:342886
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author DeFranco, Joanna F., author.<br/>Preferred Shelf Number ONLINE(342886.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466564541">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber reconnaissance, surveillance, and defense
ent://SD_ILS/0/SD_ILS:355450
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Shimonski, Robert.<br/>Preferred Shelf Number ONLINE(355450.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Online security for the business traveler
ent://SD_ILS/0/SD_ILS:355575
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355575.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building an information security awareness program defending against social engineering and technical threats
ent://SD_ILS/0/SD_ILS:355618
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Gardner, Bill (Bill G.) Thomas, Valerie (Information security consultant)<br/>Preferred Shelf Number ONLINE(355618.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199675">http://www.sciencedirect.com/science/book/9780124199675</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Collaboration with cloud computing : security, social media, and unified communications
ent://SD_ILS/0/SD_ILS:355829
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Messier, Ric, author.<br/>Preferred Shelf Number ONLINE(355829.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security careers skills, compensation, and career paths
ent://SD_ILS/0/SD_ILS:356043
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Walker, Stephen W. Foushee, James E.<br/>Preferred Shelf Number ONLINE(356043.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Conducting network penetration and espionage in a global environment
ent://SD_ILS/0/SD_ILS:356516
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Middleton, Bruce, 1953- author.<br/>Preferred Shelf Number ONLINE(356516.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482206487">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Electronic Identity
ent://SD_ILS/0/SD_ILS:484375
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author de Andrade, Norberto Nuno Gomes. author. Chen-Wilson, Lisha. author. Argles, David. author. Wills, Gary. author. Schiano di Zenise, Michele. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4471-6449-4">https://doi.org/10.1007/978-1-4471-6449-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:484564
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Abdalla, Michel. editor. (orcid)0000-0002-2447-4329 De Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Science and Cybersecurity
ent://SD_ILS/0/SD_ILS:484756
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Pino, Robinson E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Smart Embedded Devices, Platforms and Applications
ent://SD_ILS/0/SD_ILS:484765
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Markantonakis, Konstantinos. editor. Mayes, Keith. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-7915-4">https://doi.org/10.1007/978-1-4614-7915-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Distributed Denial of Service Attack and Defense
ent://SD_ILS/0/SD_ILS:484833
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Yu, Shui. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-9491-1">https://doi.org/10.1007/978-1-4614-9491-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Research in Attacks, Intrusions and Defenses 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485702
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Stavrou, Angelos. editor. Bos, Herbert. editor. Portokalidis, Georgios. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11379-1">https://doi.org/10.1007/978-3-319-11379-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485714
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Bernsmed, Karin. editor. Fischer-Hübner, Simone. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11599-3">https://doi.org/10.1007/978-3-319-11599-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485776
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Joux, Antoine. editor. Youssef, Amr. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primer on Client-Side Web Security
ent://SD_ILS/0/SD_ILS:487022
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author De Ryck, Philippe. author. Desmet, Lieven. author. Piessens, Frank. author. Johns, Martin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12226-7">https://doi.org/10.1007/978-3-319-12226-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:487487
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author De Decker, Bart. editor. Zúquete, André. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488530
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Zhou, Jianying. editor. Gal-Oz, Nurit. editor. Zhang, Jie. editor. Gudes, Ehud. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43813-8">https://doi.org/10.1007/978-3-662-43813-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488984
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Christin, Nicolas. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488985
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Nguyen, Phong Q. editor. Oswald, Elisabeth. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-55220-5">https://doi.org/10.1007/978-3-642-55220-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488986
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Lee, Hyang-Sook. editor. Han, Dong-Guk. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures
ent://SD_ILS/0/SD_ILS:488996
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Aldini, Alessandro. editor. Lopez, Javier. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Service-Oriented and Cloud Computing Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489000
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Villari, Massimo. editor. Zimmermann, Wolf. editor. Lau, Kung-Kiu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44879-3">https://doi.org/10.1007/978-3-662-44879-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488957
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Christianson, Bruce. editor. Malcolm, James. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45921-8">https://doi.org/10.1007/978-3-662-45921-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 -- July 3, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488960
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Sperotto, Anna. editor. Doyen, Guillaume. editor. Latré, Steven. editor. Charalambides, Marinos. editor. Stiller, Burkhard. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43862-6">https://doi.org/10.1007/978-3-662-43862-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488961
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Krawczyk, Hugo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Interactive Theorem Proving 5th International Conference, ITP 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489018
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Klein, Gerwin. editor. Gamboa, Ruben. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08970-6">https://doi.org/10.1007/978-3-319-08970-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488971
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Böhme, Rainer. editor. Brenner, Michael. editor. Moore, Tyler. editor. Smith, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488975
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Lindell, Yehuda. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488978
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Francillon, Aurélien. editor. Rohatgi, Pankaj. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08302-5">https://doi.org/10.1007/978-3-319-08302-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Business Software Current Trends in Business Software Development
ent://SD_ILS/0/SD_ILS:489323
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Brunetti, Gino. editor. Feld, Thomas. editor. Heuser, Lutz. editor. Schnitter, Joachim. editor. Webel, Christian. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04144-5">https://doi.org/10.1007/978-3-319-04144-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:489420
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Padró, Carles. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489471
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Abadi, Martín. editor. Kremer, Steve. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54792-8">https://doi.org/10.1007/978-3-642-54792-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489496
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Butts, Jonathan. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45355-1">https://doi.org/10.1007/978-3-662-45355-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobility Data Management and Exploration
ent://SD_ILS/0/SD_ILS:489503
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Pelekis, Nikos. author. Theodoridis, Yannis. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4939-0392-4">https://doi.org/10.1007/978-1-4939-0392-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489506
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Atluri, Vijay. editor. Pernul, Günther. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43936-4">https://doi.org/10.1007/978-3-662-43936-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489541
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Naccache, David. editor. Sauveron, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489545
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Prakash, Atul. editor. Shyamasundar, Rudrapatna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in Switzerland
ent://SD_ILS/0/SD_ILS:489573
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Dunn Cavelty, Myriam. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10620-5">https://doi.org/10.1007/978-3-319-10620-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:489575
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Garay, Juan A. editor. Gennaro, Rosario. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44381-1">https://doi.org/10.1007/978-3-662-44381-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Execution on Mobile Devices
ent://SD_ILS/0/SD_ILS:487333
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Vasudevan, Amit. author. McCune, Jonathan M. author. Newsome, James. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-8190-4">https://doi.org/10.1007/978-1-4614-8190-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487453
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Mosca, Michele. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11659-4">https://doi.org/10.1007/978-3-319-11659-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Visual Cryptography for Image Processing and Security Theory, Methods, and Applications
ent://SD_ILS/0/SD_ILS:487455
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Liu, Feng. author. Yan, Wei Qi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09644-5">https://doi.org/10.1007/978-3-319-09644-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud Computing Challenges, Limitations and R&D Solutions
ent://SD_ILS/0/SD_ILS:487747
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Mahmood, Zaigham. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10530-7">https://doi.org/10.1007/978-3-319-10530-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:487762
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Danger, Jean Luc. editor. Debbabi, Mourad. editor. Marion, Jean-Yves. editor. Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393 Zincir Heywood, Nur. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-05302-8">https://doi.org/10.1007/978-3-319-05302-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:487826
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Christianson, Bruce. editor. Malcolm, James. editor. Matyáš, Vashek. editor. Švenda, Petr. editor. Stajano, Frank. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12400-1">https://doi.org/10.1007/978-3-319-12400-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Cloud Storage Systems
ent://SD_ILS/0/SD_ILS:487858
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Yang, Kan. author. Jia, Xiaohua. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy and Trust in Cloud Systems
ent://SD_ILS/0/SD_ILS:487946
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Nepal, Surya. editor. Pathan, Mukaddim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Cloud Computing
ent://SD_ILS/0/SD_ILS:487956
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Jajodia, Sushil. editor. Kant, Krishna. editor. Samarati, Pierangela. editor. Singhal, Anoop. editor. Swarup, Vipin. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-9278-8">https://doi.org/10.1007/978-1-4614-9278-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488011
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Batten, Lynn. editor. Li, Gang. editor. (orcid)0000-0003-1583-641X Niu, Wenjia. editor. Warren, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45670-5">https://doi.org/10.1007/978-3-662-45670-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488089
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Cleary, Frances. editor. Felici, Massimo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12574-9">https://doi.org/10.1007/978-3-319-12574-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Large-Scale Data Analytics
ent://SD_ILS/0/SD_ILS:488092
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Gkoulalas-Divanis, Aris. editor. Labbi, Abderrahim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-9242-9">https://doi.org/10.1007/978-1-4614-9242-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics X 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488324
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44952-3">https://doi.org/10.1007/978-3-662-44952-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Cloud Computing
ent://SD_ILS/0/SD_ILS:488472
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Krcmar, Helmut. editor. Reussner, Ralf. editor. Rumpe, Bernhard. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12718-7">https://doi.org/10.1007/978-3-319-12718-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Framework
ent://SD_ILS/0/SD_ILS:488478
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Ben Ayed, Ghazi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08231-8">https://doi.org/10.1007/978-3-319-08231-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Hash Function BLAKE
ent://SD_ILS/0/SD_ILS:488367
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Aumasson, Jean-Philippe. author. Meier, Willi. author. Phan, Raphael C.-W. author. Henzen, Luca. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing Platforms TPM2.0 in Context
ent://SD_ILS/0/SD_ILS:488634
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Proudler, Graeme. author. Chen, Liqun. author. Dalton, Chris. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Business and Telecommunications International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488647
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Obaidat, Mohammad S. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44788-8">https://doi.org/10.1007/978-3-662-44788-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013
ent://SD_ILS/0/SD_ILS:488884
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Krishnan, G. Sai Sundara. editor. Anitha, R. editor. Lekshmi, R. S. editor. Kumar, M. Senthil. editor. Bonato, Anthony. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486671
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Saxena, Nitesh. editor. Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13066-8">https://doi.org/10.1007/978-3-319-13066-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Passive and Active Measurement 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:486874
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Faloutsos, Michalis. editor. Kuzmanovic, Aleksandar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04918-2">https://doi.org/10.1007/978-3-319-04918-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Computing and Services International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:487154
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Yuan, Yuyu. editor. Wu, Xu. editor. Lu, Yueming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43908-1">https://doi.org/10.1007/978-3-662-43908-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence in Digital Forensics: Forensic Investigation and Applications
ent://SD_ILS/0/SD_ILS:487168
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Muda, Azah Kamilah. editor. Choo, Yun-Huoy. editor. Abraham, Ajith. editor. N. Srihari, Sargur. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-05885-6">https://doi.org/10.1007/978-3-319-05885-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
ent://SD_ILS/0/SD_ILS:487178
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Hassanien, Aboul Ella. editor. Kim, Tai-Hoon. editor. Kacprzyk, Janusz. editor. Awad, Ali Ismail. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43616-5">https://doi.org/10.1007/978-3-662-43616-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Technologies and Policy First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:487210
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Preneel, Bart. editor. Ikonomou, Demosthenes. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54069-1">https://doi.org/10.1007/978-3-642-54069-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conference
ent://SD_ILS/0/SD_ILS:487216
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-658-06708-3">https://doi.org/10.1007/978-3-658-06708-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Networks and Distributed Systems International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:487617
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Jahangir, Amir Hossein. editor. Movaghar, Ali. editor. Asadi, Hossein. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10903-9">https://doi.org/10.1007/978-3-319-10903-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Touchless Palmprint Recognition Systems
ent://SD_ILS/0/SD_ILS:488861
2024-12-28T12:57:10Z
2024-12-28T12:57:10Z
Author Genovese, Angelo. author. Piuri, Vincenzo. author. Scotti, Fabio. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10365-5">https://doi.org/10.1007/978-3-319-10365-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>