Search Results for Computer Security. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2026-03-20T22:37:41Z Computer security and cryptography ent://SD_ILS/0/SD_ILS:296865 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a> John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:607891 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Barker, Ken. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;P&eacute;rez-Sol&agrave;, Cristina. editor. (orcid)0000-0001-7534-1326&#160;Delgado-Segura, Sergi. editor. (orcid)0000-0001-7783-7288<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82349-7">https://doi.org/10.1007/978-3-031-82349-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:610530 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kalutarage, Harsha. editor. (orcid)0000-0001-6430-9558&#160;Yanai, Naoto. editor. (orcid)0000-0002-0817-6188&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Ksieniewicz, Pawe&#322;. editor. (orcid)0000-0001-9578-8395<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82362-6">https://doi.org/10.1007/978-3-031-82362-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:602337 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51476-0">https://doi.org/10.1007/978-3-031-51476-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:602338 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51482-1">https://doi.org/10.1007/978-3-031-51482-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:602345 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50594-2">https://doi.org/10.1007/978-3-031-50594-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III ent://SD_ILS/0/SD_ILS:602346 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51479-1">https://doi.org/10.1007/978-3-031-51479-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602750 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens-Boulahia, Nora. editor. (orcid)0000-0001-8792-0413&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54204-6">https://doi.org/10.1007/978-3-031-54204-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Mammeri, Zoubir, author.<br/>Preferred Shelf Number&#160;QA268 .M34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602834 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Abie, Habtamu. editor. (orcid)0000-0003-0866-5050&#160;Ranise, Silvio. editor. (orcid)0000-0001-7269-9285&#160;Verderame, Luca. editor. (orcid)0000-0001-7155-7429&#160;Cambiaso, Enrico. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54129-2">https://doi.org/10.1007/978-3-031-54129-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605040 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70879-4">https://doi.org/10.1007/978-3-031-70879-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605041 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70890-9">https://doi.org/10.1007/978-3-031-70890-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:605042 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70903-6">https://doi.org/10.1007/978-3-031-70903-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:605052 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70896-1">https://doi.org/10.1007/978-3-031-70896-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:616288 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Foley, Simon N. editor.&#160;Gollmann, Dieter. editor.&#160;Snekkenes, Einar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611601 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Obana, Satoshi. editor. (orcid)0000-0003-4795-4779&#160;Chida, Koji. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:617319 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Rak, Jacek. editor.&#160;Bay, John. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;Popyack, Leonard. editor.&#160;Skormin, Victor. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:618102 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Foley, Simon N. editor.&#160;Gollmann, Dieter. editor.&#160;Snekkenes, Einar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:611623 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Askoxylakis, Ioannis. editor.&#160;Ioannidis, Sotiris. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Meadows, Catherine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:615918 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Askoxylakis, Ioannis. editor.&#160;Ioannidis, Sotiris. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Meadows, Catherine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:610832 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Ogawa, Kazuto. editor.&#160;Yoshioka, Katsunari. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded cryptography. 1 ent://SD_ILS/0/SD_ILS:599697 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael.&#160;Rivain, Mattieu.&#160;O'Flynn, Colin.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 1 : Design and security proofs ent://SD_ILS/0/SD_ILS:598803 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 2 : Cryptanalysis and future directions ent://SD_ILS/0/SD_ILS:598806 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asymmetric cryptography : primitives and protocols ent://SD_ILS/0/SD_ILS:598096 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Pointcheval, David, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A83 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safeguarding satellite communications : issues, challenges, and solutions ent://SD_ILS/0/SD_ILS:600245 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;An, Jianpin, author.<br/>Preferred Shelf Number&#160;TK5104 .A53 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:601805 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Duan, Haixin. editor. (orcid)0000-0003-0083-733X&#160;Debbabi, Mourad. editor.&#160;de Carn&eacute; de Carnavalet, Xavier. editor. (orcid)0000-0003-2664-3963&#160;Luo, Xiapu. editor.&#160;Du, Xiaojiang. editor. (orcid)0000-0003-4235-9671<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64948-6">https://doi.org/10.1007/978-3-031-64948-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2025 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2025, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:609757 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tauman Kalai, Yael. editor.&#160;Kamara, Seny F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-01907-3">https://doi.org/10.1007/978-3-032-01907-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Network Security and Blockchain Technology ICNSBT 2025 ent://SD_ILS/0/SD_ILS:610331 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Giri, Debasis. editor.&#160;Kambourakis, Georgios. editor.&#160;Islam, SK Hafizul. editor. (orcid)0000-0002-2703-0213&#160;Srivastava, Gautam. editor. (orcid)0000-0001-9851-4103&#160;Maitra, Tanmoy. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-6348-4">https://doi.org/10.1007/978-981-96-6348-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605415 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Kohlweiss, Markulf. editor. (orcid)0000-0002-8660-9663&#160;Di Pietro, Roberto. editor. (orcid)0000-0003-1909-0336&#160;Beresford, Alastair. editor. (orcid)0000-0003-0818-6535&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8013-6">https://doi.org/10.1007/978-981-97-8013-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Security and Privacy Protection Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605581 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Chen, Xiaofeng. editor.&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8540-7">https://doi.org/10.1007/978-981-97-8540-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Security and Privacy Protection Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605582 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Chen, Xiaofeng. editor.&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8546-9">https://doi.org/10.1007/978-981-97-8546-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605670 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Mouha, Nicky. editor. (orcid)0000-0001-8861-782X&#160;Nikiforakis, Nick. editor. (orcid)0000-0002-9366-357X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-75757-0">https://doi.org/10.1007/978-3-031-75757-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605671 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Mouha, Nicky. editor. (orcid)0000-0001-8861-782X&#160;Nikiforakis, Nick. editor. (orcid)0000-0002-9366-357X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-75764-8">https://doi.org/10.1007/978-3-031-75764-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematical Foundations for Side-Channel Analysis of Cryptographic Systems ent://SD_ILS/0/SD_ILS:605727 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Cheng, Wei. author. (orcid)0000-0001-9433-7576&#160;Guilley, Sylvain. author. (orcid)0000-0002-5044-3534&#160;Rioul, Olivier. author. (orcid)0000-0002-8681-8916&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64399-6">https://doi.org/10.1007/978-3-031-64399-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:606350 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78023-3">https://doi.org/10.1007/978-3-031-78023-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:606462 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0938-3">https://doi.org/10.1007/978-981-96-0938-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part VIII ent://SD_ILS/0/SD_ILS:606463 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0944-4">https://doi.org/10.1007/978-981-96-0944-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:606477 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0891-1">https://doi.org/10.1007/978-981-96-0891-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part IX ent://SD_ILS/0/SD_ILS:606427 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0947-5">https://doi.org/10.1007/978-981-96-0947-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606436 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0875-1">https://doi.org/10.1007/978-981-96-0875-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part V ent://SD_ILS/0/SD_ILS:606437 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0935-2">https://doi.org/10.1007/978-981-96-0935-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:606438 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0941-3">https://doi.org/10.1007/978-981-96-0941-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606449 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0888-1">https://doi.org/10.1007/978-981-96-0888-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Network Security and Blockchain Technology ICNSBT 2024 ent://SD_ILS/0/SD_ILS:607924 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Giri, Debasis. editor.&#160;Islam, S. K. Hafizul. editor. (orcid)0000-0002-2703-0213&#160;Vasilakos, Athanasios V. editor.&#160;Khan, Muhammad Khurram. editor. (orcid)0000-0001-6636-0533&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8051-8">https://doi.org/10.1007/978-981-97-8051-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research 9th International Conference, SSR 2024, Kunming, China, December 16, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607991 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Lu, Xianhui. editor. (orcid)0000-0001-7091-5810&#160;Mitchell, Chris J. editor. (orcid)0000-0002-6118-0055&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-87541-0">https://doi.org/10.1007/978-3-031-87541-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:608242 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91095-1">https://doi.org/10.1007/978-3-031-91095-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:608243 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91098-2">https://doi.org/10.1007/978-3-031-91098-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques Madrid, Spain, May 4-8, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:608244 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91107-1">https://doi.org/10.1007/978-3-031-91107-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:608245 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91124-8">https://doi.org/10.1007/978-3-031-91124-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:608246 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91134-7">https://doi.org/10.1007/978-3-031-91134-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy 3rd International Conference, ICSP 2024, Jamshedpur, India, November 20-21, 2024, Proceedings ent://SD_ILS/0/SD_ILS:608577 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Mesnager, Sihem. editor. (orcid)0000-0003-4008-2031&#160;St&#259;nic&#259;, Pantelimon. editor. (orcid)0000-0002-8622-7120&#160;Debnath, Sumit Kumar. editor. (orcid)0000-0001-6374-1410&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90587-2">https://doi.org/10.1007/978-3-031-90587-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptographic Definitions A Step-by-Step Guide for Beginners ent://SD_ILS/0/SD_ILS:608948 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Guo, Fuchun. author. (orcid)0000-0001-6939-7710&#160;Susilo, Willy. author. (orcid)0000-0002-1562-5105&#160;Nguyen, Khoa. author.&#160;Chen, Xiaofeng. author.&#160;Zhao, Zhen. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91969-5">https://doi.org/10.1007/978-3-031-91969-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber defense : best practices for digital safety ent://SD_ILS/0/SD_ILS:600003 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Edwards, Jason, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E39 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605517 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Duan, Haixin. editor. (orcid)0000-0003-0083-733X&#160;Debbabi, Mourad. editor.&#160;de Carn&eacute; de Carnavalet, Xavier. editor. (orcid)0000-0003-2664-3963&#160;Luo, Xiapu. editor.&#160;Du, Xiaojiang. editor. (orcid)0000-0003-4235-9671<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64954-7">https://doi.org/10.1007/978-3-031-64954-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Biometrics ent://SD_ILS/0/SD_ILS:605790 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Jain, Anil K. author.&#160;Ross, Arun A. author. (orcid)0000-0001-8850-3013&#160;Nandakumar, Karthik. author. (orcid)0000-0002-6274-9725&#160;Swearingen, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61675-4">https://doi.org/10.1007/978-3-031-61675-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Information Security and Applications 5th International Conference, EISA 2024, Changzhou, China, October 18-19, 2024, Proceedings ent://SD_ILS/0/SD_ILS:606946 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Li, Wenjuan. editor. (orcid)0000-0003-3745-5669&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Lopez, Javier. editor. (orcid)0000-0003-4384-5786&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-80419-9">https://doi.org/10.1007/978-3-031-80419-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6-7, 2024 Proceedings ent://SD_ILS/0/SD_ILS:607075 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Horn Iwaya, Leonardo. editor. (orcid)0000-0001-9005-0543&#160;Kamm, Liina. editor. (orcid)0000-0003-1479-2195&#160;Martucci, Leonardo. editor. (orcid)0000-0002-9980-3473&#160;Pulls, Tobias. editor. (orcid)0000-0001-6459-8409&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-79007-2">https://doi.org/10.1007/978-3-031-79007-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable and Practical Security 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25-27, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:607104 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Liu, Joseph K. editor.&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Sun, Shi-Feng. editor.&#160;Liu, Xiaoning. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0957-4">https://doi.org/10.1007/978-981-96-0957-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable and Practical Security 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25-27, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:607122 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Liu, Joseph K. editor.&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Sun, Shi-Feng. editor.&#160;Liu, Xiaoning. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0954-3">https://doi.org/10.1007/978-981-96-0954-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Attacks and Defenses for the Internet-of-Things 7th International Conference, ADIoT 2024, Hangzhou, China, December 13-14, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607638 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;Shao, Jun. editor. (orcid)0000-0001-8352-0973&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-85593-1">https://doi.org/10.1007/978-3-031-85593-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Social Networks and Big Data 10th International Symposium, SocialSec 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607720 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Al-kfairy, Mousa. editor. (orcid)0000-0003-3180-3861&#160;Aldwairi, Monther. editor. (orcid)0000-0003-1150-2404&#160;Raymond Choo, Kim-Kwang. editor. (orcid)0000-0001-9208-5336&#160;Tubishat, Mohammad. editor. (orcid)0000-0003-1464-8345&#160;Alrabaee, Saed. editor. (orcid)0000-0001-8842-493X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3774-4">https://doi.org/10.1007/978-981-96-3774-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part V ent://SD_ILS/0/SD_ILS:608267 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91092-0">https://doi.org/10.1007/978-3-031-91092-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part VIII ent://SD_ILS/0/SD_ILS:608268 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91101-9">https://doi.org/10.1007/978-3-031-91101-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:608269 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91131-6">https://doi.org/10.1007/978-3-031-91131-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:608363 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Lin, Dongdai. editor.&#160;Wang, Meiqin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4731-6">https://doi.org/10.1007/978-981-96-4731-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:608364 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Lin, Dongdai. editor.&#160;Wang, Meiqin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4734-7">https://doi.org/10.1007/978-981-96-4734-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:608986 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Fischlin, Marc. editor. (orcid)0000-0003-0597-8297&#160;Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-95764-2">https://doi.org/10.1007/978-3-031-95764-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2025 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:609748 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tauman Kalai, Yael. editor.&#160;Kamara, Seny F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-01881-6">https://doi.org/10.1007/978-3-032-01881-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2025 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2025, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:609749 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tauman Kalai, Yael. editor.&#160;Kamara, Seny F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-01884-7">https://doi.org/10.1007/978-3-032-01884-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Voting 9th International Joint Conference, E-Vote-ID 2024, Tarragona, Spain, October 2-4, 2024, Proceedings ent://SD_ILS/0/SD_ILS:605279 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Duenas-Cid, David. editor. (orcid)0000-0002-0451-4514&#160;Roenne, Peter. editor. (orcid)0000-0002-2785-8301&#160;Volkamer, Melanie. editor. (orcid)0000-0003-2674-4043&#160;Budurushi, Jurlind. editor. (orcid)0000-0002-6732-4400&#160;Blom, Michelle. editor. (orcid)0000-0002-0459-9917<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-72244-8">https://doi.org/10.1007/978-3-031-72244-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605357 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Kohlweiss, Markulf. editor. (orcid)0000-0002-8660-9663&#160;Di Pietro, Roberto. editor. (orcid)0000-0003-1909-0336&#160;Beresford, Alastair. editor. (orcid)0000-0003-0818-6535&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8016-7">https://doi.org/10.1007/978-981-97-8016-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606243 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78017-2">https://doi.org/10.1007/978-3-031-78017-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:606283 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78020-2">https://doi.org/10.1007/978-3-031-78020-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606319 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78011-0">https://doi.org/10.1007/978-3-031-78011-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part IV ent://SD_ILS/0/SD_ILS:606498 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0894-2">https://doi.org/10.1007/978-981-96-0894-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:609005 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Fischlin, Marc. editor. (orcid)0000-0003-0597-8297&#160;Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-95767-3">https://doi.org/10.1007/978-3-031-95767-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609039 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Fischlin, Marc. editor. (orcid)0000-0003-0597-8297&#160;Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-95761-1">https://doi.org/10.1007/978-3-031-95761-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609259 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9095-4">https://doi.org/10.1007/978-981-96-9095-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:609277 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9098-5">https://doi.org/10.1007/978-981-96-9098-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:609291 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9101-2">https://doi.org/10.1007/978-981-96-9101-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2025 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2025, Proceedings, Part V ent://SD_ILS/0/SD_ILS:609750 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tauman Kalai, Yael. editor.&#160;Kamara, Seny F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-01901-1">https://doi.org/10.1007/978-3-032-01901-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2025 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2025, Proceedings, Part VIII ent://SD_ILS/0/SD_ILS:609751 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tauman Kalai, Yael. editor.&#160;Kamara, Seny F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-01913-4">https://doi.org/10.1007/978-3-032-01913-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2025 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609754 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tauman Kalai, Yael. editor.&#160;Kamara, Seny F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-01855-7">https://doi.org/10.1007/978-3-032-01855-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2025 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:609755 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tauman Kalai, Yael. editor.&#160;Kamara, Seny F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-01878-6">https://doi.org/10.1007/978-3-032-01878-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2025 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2025, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:609756 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tauman Kalai, Yael. editor.&#160;Kamara, Seny F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-01887-8">https://doi.org/10.1007/978-3-032-01887-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cybersecurity A Multidisciplinary Challenge ent://SD_ILS/0/SD_ILS:601841 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Sharp, Robin. author. (orcid)0000-0002-8593-267X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41463-3">https://doi.org/10.1007/978-3-031-41463-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings ent://SD_ILS/0/SD_ILS:601940 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Fritsch, Lothar. editor.&#160;Hassan, Ismail. editor.&#160;Paintsil, Ebenezer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47748-5">https://doi.org/10.1007/978-3-031-47748-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Network Security and Blockchain Technology ICNSBT 2023 ent://SD_ILS/0/SD_ILS:602048 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Mandal, Jyotsna Kumar. editor. (orcid)0000-0001-9447-647X&#160;Jana, Biswapati. editor.&#160;Lu, Tzu-Chuen. editor. (orcid)0000-0001-7305-4622&#160;De, Debashis. editor. (orcid)0000-0002-9688-9806&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-4433-0">https://doi.org/10.1007/978-981-99-4433-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Information Security and Applications 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings ent://SD_ILS/0/SD_ILS:602288 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Shao, Jun. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9614-8">https://doi.org/10.1007/978-981-99-9614-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602673 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Ge, Chunpeng. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0945-8">https://doi.org/10.1007/978-981-97-0945-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602684 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Ge, Chunpeng. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0942-7">https://doi.org/10.1007/978-981-97-0942-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:603492 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58723-8">https://doi.org/10.1007/978-3-031-58723-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Execution Environments ent://SD_ILS/0/SD_ILS:604058 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Shepherd, Carlton. author.&#160;Markantonakis, Konstantinos. author. (orcid)0000-0003-3975-9033&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55561-9">https://doi.org/10.1007/978-3-031-55561-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:604086 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Andreoni, Martin. editor. (orcid)0000-0002-4170-4341&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61489-7">https://doi.org/10.1007/978-3-031-61489-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> x86 software reverse-engineering, cracking, and counter-measures ent://SD_ILS/0/SD_ILS:598920 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Domas, Stephanie, author.&#160;Domas, Christopher, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Preferred Shelf Number&#160;HE194 .C93 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H84 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 19th IMA International Conference, IMACC 2023, London, UK, December 12-14, 2023, Proceedings ent://SD_ILS/0/SD_ILS:602089 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Quaglia, Elizabeth A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47818-5">https://doi.org/10.1007/978-3-031-47818-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2023 ent://SD_ILS/0/SD_ILS:603303 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Chaturvedi, Atul. editor.&#160;Hasan, Sartaj Ul. editor. (orcid)0000-0002-7962-3221&#160;Roy, Bimal Kumar. editor.&#160;Tsaban, Boaz. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0641-9">https://doi.org/10.1007/978-981-97-0641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - AFRICACRYPT 2024 15th International Conference on Cryptology in Africa, Douala, Cameroon, July 10-12, 2024, Proceedings ent://SD_ILS/0/SD_ILS:604188 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Vaudenay, Serge. editor. (orcid)0000-0001-9185-1449&#160;Petit, Christophe. editor. (orcid)0000-0003-3482-6743&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64381-1">https://doi.org/10.1007/978-3-031-64381-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 22nd International Conference, CARDIS 2023, Amsterdam, The Netherlands, November 14-16, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:602653 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Bhasin, Shivam. editor.&#160;Roche, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54409-5">https://doi.org/10.1007/978-3-031-54409-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:603382 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58716-0">https://doi.org/10.1007/978-3-031-58716-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:603383 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58737-5">https://doi.org/10.1007/978-3-031-58737-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part V ent://SD_ILS/0/SD_ILS:603384 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58740-5">https://doi.org/10.1007/978-3-031-58740-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:603385 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58751-1">https://doi.org/10.1007/978-3-031-58751-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:603386 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58754-2">https://doi.org/10.1007/978-3-031-58754-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:604032 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Andreoni, Martin. editor. (orcid)0000-0002-4170-4341&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61486-6">https://doi.org/10.1007/978-3-031-61486-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2022 ent://SD_ILS/0/SD_ILS:601864 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Roy, Bimal Kumar. editor.&#160;Chaturvedi, Atul. editor.&#160;Tsaban, Boaz. editor.&#160;Hasan, Sartaj Ul. editor. (orcid)0000-0002-7962-3221&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-2229-1">https://doi.org/10.1007/978-981-99-2229-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:603434 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58734-4">https://doi.org/10.1007/978-3-031-58734-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2024 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:604730 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Reyzin, Leonid. editor.&#160;Stebila, Douglas. editor. (orcid)0000-0001-9443-3170&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68382-4">https://doi.org/10.1007/978-3-031-68382-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2024 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:604733 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Reyzin, Leonid. editor.&#160;Stebila, Douglas. editor. (orcid)0000-0001-9443-3170&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68376-3">https://doi.org/10.1007/978-3-031-68376-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2024 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:604734 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Reyzin, Leonid. editor.&#160;Stebila, Douglas. editor. (orcid)0000-0001-9443-3170&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68379-4">https://doi.org/10.1007/978-3-031-68379-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2024 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:604735 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Reyzin, Leonid. editor.&#160;Stebila, Douglas. editor. (orcid)0000-0001-9443-3170&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68385-5">https://doi.org/10.1007/978-3-031-68385-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2024 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part V ent://SD_ILS/0/SD_ILS:604736 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Reyzin, Leonid. editor.&#160;Stebila, Douglas. editor. (orcid)0000-0001-9443-3170&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68388-6">https://doi.org/10.1007/978-3-031-68388-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2024 44th Annual International Cryptology Conference, CRYPTO 2024, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part VIII ent://SD_ILS/0/SD_ILS:604737 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Reyzin, Leonid. editor.&#160;Stebila, Douglas. editor. (orcid)0000-0001-9443-3170&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68397-8">https://doi.org/10.1007/978-3-031-68397-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2024 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part IX ent://SD_ILS/0/SD_ILS:604738 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Reyzin, Leonid. editor.&#160;Stebila, Douglas. editor. (orcid)0000-0001-9443-3170&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68400-5">https://doi.org/10.1007/978-3-031-68400-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2024 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part X ent://SD_ILS/0/SD_ILS:604739 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Reyzin, Leonid. editor.&#160;Stebila, Douglas. editor. (orcid)0000-0001-9443-3170&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68403-6">https://doi.org/10.1007/978-3-031-68403-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2024 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:604742 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Reyzin, Leonid. editor.&#160;Stebila, Douglas. editor. (orcid)0000-0001-9443-3170&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68391-6">https://doi.org/10.1007/978-3-031-68391-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2024 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:604743 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Reyzin, Leonid. editor.&#160;Stebila, Douglas. editor. (orcid)0000-0001-9443-3170&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68394-7">https://doi.org/10.1007/978-3-031-68394-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchains A Handbook on Fundamentals, Platforms and Applications ent://SD_ILS/0/SD_ILS:602803 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Ruj, Sushmita. editor.&#160;Kanhere, Salil S. editor.&#160;Conti, Mauro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-32146-7">https://doi.org/10.1007/978-3-031-32146-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 - March 1, 2024, Proceedings ent://SD_ILS/0/SD_ILS:603949 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Bouzefrane, Samia. editor. (orcid)0000-0002-0979-1289&#160;Sauveron, Damien. editor. (orcid)0000-0001-7948-6143&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-60391-4">https://doi.org/10.1007/978-3-031-60391-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encrypted Network Traffic Analysis ent://SD_ILS/0/SD_ILS:604421 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Cherukuri, Aswani Kumar. author. (orcid)0000-0001-8455-9108&#160;Ikram, Sumaiya Thaseen. author. (orcid)0000-0001-8906-2010&#160;Li, Gang. author.&#160;Liu, Xiao. author. (orcid)0000-0001-8400-5754&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-62909-9">https://doi.org/10.1007/978-3-031-62909-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605093 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Galdi, Clemente. editor. (orcid)0000-0002-2988-700X&#160;Phan, Duong Hieu. editor. (orcid)0000-0003-1136-4064&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-71070-4">https://doi.org/10.1007/978-3-031-71070-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605094 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Galdi, Clemente. editor. (orcid)0000-0002-2988-700X&#160;Phan, Duong Hieu. editor. (orcid)0000-0003-1136-4064&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-71073-5">https://doi.org/10.1007/978-3-031-71073-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:557931 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Alencar, Marcelo S., 1957- author.<br/>Preferred Shelf Number&#160;TK5102.94 .A44 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337768">https://www.taylorfrancis.com/books/9781003337768</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Preferred Shelf Number&#160;HD30.2 .S5325 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in applications of computational intelligence and the Internet of Things (IoT) : cryptography and network security in IoTs ent://SD_ILS/0/SD_ILS:577899 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Chowdhury, Rajdeep, editor.&#160;Niranjan, S. K., editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003127482">https://www.taylorfrancis.com/books/9781003127482</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D38 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking multifactor authentication ent://SD_ILS/0/SD_ILS:596326 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G75 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD61.5 .M675 2021 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:596276 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Carey, Marcus J. (Cybersecurity professional)&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C3673 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking connected cars : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:595843 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Knight, Alissa, author.<br/>Preferred Shelf Number&#160;TL152.8 .K65 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:595279 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tounsi, Wiem, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C93 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity ent://SD_ILS/0/SD_ILS:595415 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C368 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:595418 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Quade, Phil.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain for distributed systems security ent://SD_ILS/0/SD_ILS:595146 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Shetty, Sachin, editor.&#160;Kamhoua, Charles A., edtior.&#160;Njilla, Laurent L., editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56 B56 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:618120 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61437-3">https://doi.org/10.1007/978-3-319-61437-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611592 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical and Social Issues in the Information Age ent://SD_ILS/0/SD_ILS:611657 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70712-9">https://doi.org/10.1007/978-3-319-70712-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security Metrics ent://SD_ILS/0/SD_ILS:613251 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Wang, Lingyu. author. (orcid)0000-0002-7441-7541&#160;Jajodia, Sushil. author. (orcid)0000-0003-3210-558X&#160;Singhal, Anoop. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66505-4">https://doi.org/10.1007/978-3-319-66505-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory and Models for Cyber Situation Awareness ent://SD_ILS/0/SD_ILS:616045 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Liu, Peng. editor.&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61152-5">https://doi.org/10.1007/978-3-319-61152-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:618109 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;Hartenstein, Hannes. editor.&#160;Herrera-Joancomart&iacute;, Jordi. editor. (orcid)0000-0002-4935-4681&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67816-0">https://doi.org/10.1007/978-3-319-67816-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebasti&aacute;n, Spain, July 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616097 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Caballero, Juan. editor.&#160;Zurutuza, Urko. editor.&#160;Rodr&iacute;guez, Ricardo J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21-22, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:618129 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;B&eacute;cue, Adrien. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611549 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Social Engineering Based Scams ent://SD_ILS/0/SD_ILS:613967 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Jakobsson, Markus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Fingerprinting ent://SD_ILS/0/SD_ILS:614393 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Wang, Cliff. editor.&#160;Gerdes, Ryan M. editor.&#160;Guan, Yong. editor.&#160;Kasera, Sneha Kumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616156 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Barthe, Gilles. editor.&#160;Markatos, Evangelos. editor.&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:611803 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor.&#160;Aldini, Alessandro. editor. (orcid)0000-0002-7250-5011&#160;Martinelli, Fabio. editor.&#160;Suri, Neeraj. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:611890 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethics in Computing A Concise Module ent://SD_ILS/0/SD_ILS:617386 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29106-2">https://doi.org/10.1007/978-3-319-29106-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:617849 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Aldini, Alessandro. editor. (orcid)0000-0002-7250-5011&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:364315 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Katz, Jonathan, 1974-&#160;Lindell, Yehuda.<br/>Preferred Shelf Number&#160;QA76.9.A25 K36 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:543620 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Mukhopadhyay, Debdeep, author.&#160;Subhra, Rajat, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M85 2015<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> How i discovered World War II's greatest spy and other stories of intelligence and code ent://SD_ILS/0/SD_ILS:540734 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Kahn, David, eauthor.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;D810 .S7<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466562042">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The InfoSec Handbook An Introduction to Information Security ent://SD_ILS/0/SD_ILS:618581 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Nayak, Umesha. author.&#160;Rao, Umesh Hodeghatta. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6383-8">https://doi.org/10.1007/978-1-4302-6383-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:618584 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Ruan, Xiaoyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for wireless sensor networks using identity-based cryptography ent://SD_ILS/0/SD_ILS:544612 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Patil, Harsh Kupwade., author.&#160;Szygenda, Stephen A.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P38 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:146922 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Heiderich, Mario.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">http://www.sciencedirect.com/science/book/9781597496049</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:386241 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Kahate, Atul.<br/>Preferred Shelf Number&#160;TK5105.59 K12 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:298025 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:146450 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data-driven block ciphers for fast telecommunication systems ent://SD_ILS/0/SD_ILS:546948 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Moldovyan, Nick., author.&#160;Moldovyan, Alex.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M664 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420054125">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Applied cryptanalysis breaking ciphers in the real world ent://SD_ILS/0/SD_ILS:249508 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Stamp, Mark.&#160;Low, Richard M., 1967-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Beginning cryptography with Java ent://SD_ILS/0/SD_ILS:144203 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Hook, David, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction a handbook for the 21st century ent://SD_ILS/0/SD_ILS:301860 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction : a handbook for the 21st century ent://SD_ILS/0/SD_ILS:593044 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-<br/>Preferred Shelf Number&#160;QA76.9 .A25 B79 2005<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a> <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Investigator's guide to steganography ent://SD_ILS/0/SD_ILS:541281 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Kipper, Gregory., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 K544 2004<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203504765">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:253900 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:108014 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Schneier, Bruce.<br/>Preferred Shelf Number&#160;QA76.9.A25 S35 1996<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Contemporary cryptology the science of information integrity ent://SD_ILS/0/SD_ILS:249661 2026-03-20T22:37:41Z 2026-03-20T22:37:41Z Author&#160;Simmons, Gustavus J.&#160;Institute of Electrical and Electronics Engineers.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>