Search Results for Computer science. - Narrowed by: SpringerLink (Online service) - E-Book - 2014 - Computer security. - Data encryption (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-09-10T23:52:07Z Trustworthy Execution on Mobile Devices ent://SD_ILS/0/SD_ILS:487333 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Vasudevan, Amit. author.&#160;McCune, Jonathan M. author.&#160;Newsome, James. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-8190-4">https://doi.org/10.1007/978-1-4614-8190-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Cloud Storage Systems ent://SD_ILS/0/SD_ILS:487858 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Yang, Kan. author.&#160;Jia, Xiaohua. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488011 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Batten, Lynn. editor.&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;Niu, Wenjia. editor.&#160;Warren, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45670-5">https://doi.org/10.1007/978-3-662-45670-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488136 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Kotulski, Zbigniew. editor.&#160;Ksiezopolski, Bogdan. editor.&#160;Mazur, Katarzyna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487966 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Martinez Perez, Gregorio. editor.&#160;Thampi, Sabu M. editor.&#160;Ko, Ryan. editor.&#160;Shu, Lei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:484564 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485513 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Huang, Xinyi. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:485543 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06811-4">https://doi.org/10.1007/978-3-319-06811-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485545 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Pointcheval, David. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06734-6">https://doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Defense and Situational Awareness ent://SD_ILS/0/SD_ILS:485697 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Kott, Alexander. editor.&#160;Wang, Cliff. editor.&#160;Erbacher, Robert F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11391-3">https://doi.org/10.1007/978-3-319-11391-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 19th Nordic Conference, NordSec 2014, Troms&oslash;, Norway, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485714 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Bernsmed, Karin. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11599-3">https://doi.org/10.1007/978-3-319-11599-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485842 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Chen, Liqun. editor.&#160;Mitchell, Chris. editor. (orcid)0000-0002-6118-0055&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14054-4">https://doi.org/10.1007/978-3-319-14054-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487453 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11659-4">https://doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics X 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488324 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44952-3">https://doi.org/10.1007/978-3-662-44952-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Hash Function BLAKE ent://SD_ILS/0/SD_ILS:488367 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Aumasson, Jean-Philippe. author.&#160;Meier, Willi. author.&#160;Phan, Raphael C.-W. author.&#160;Henzen, Luca. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Future Internet Services and Systems Current Research ent://SD_ILS/0/SD_ILS:488944 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Heisel, Maritta. editor.&#160;Joosen, Wouter. editor.&#160;L&oacute;pez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07452-8">https://doi.org/10.1007/978-3-319-07452-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488954 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;De Cristofaro, Emiliano. editor.&#160;Murdoch, Steven J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08506-7">https://doi.org/10.1007/978-3-319-08506-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II ent://SD_ILS/0/SD_ILS:488956 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488957 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45921-8">https://doi.org/10.1007/978-3-662-45921-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488961 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Krawczyk, Hugo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488971 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Brenner, Michael. editor.&#160;Moore, Tyler. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems -- CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489052 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Batina, Lejla. editor. (orcid)0000-0003-0727-3573&#160;Robshaw, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44709-3">https://doi.org/10.1007/978-3-662-44709-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489091 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Au, Man Ho. editor.&#160;Carminati, Barbara. editor.&#160;Kuo, C.-C. Jay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11698-3">https://doi.org/10.1007/978-3-319-11698-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Data and Security Engineering 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489103 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589&#160;Wagner, Roland. editor.&#160;Neuhold, Erich J. editor.&#160;Takizawa, Makoto. editor.&#160;K&uuml;ng, Josef. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12778-1">https://doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489223 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43933-3">https://doi.org/10.1007/978-3-662-43933-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489261 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Lange, Tanja. editor.&#160;Lauter, Kristin. editor.&#160;Lison&#283;k, Petr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43414-7">https://doi.org/10.1007/978-3-662-43414-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:489420 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Padr&oacute;, Carles. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489471 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Abadi, Mart&iacute;n. editor.&#160;Kremer, Steve. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54792-8">https://doi.org/10.1007/978-3-642-54792-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489541 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Naccache, David. editor.&#160;Sauveron, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489545 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Prakash, Atul. editor.&#160;Shyamasundar, Rudrapatna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:489575 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Garay, Juan A. editor.&#160;Gennaro, Rosario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44381-1">https://doi.org/10.1007/978-3-662-44381-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489603 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Shi, Yun Qing. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43886-2">https://doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487278 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485793 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Chow, Sherman S.M. editor.&#160;Camenisch, Jan. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486671 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Saxena, Nitesh. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13066-8">https://doi.org/10.1007/978-3-319-13066-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487487 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;De Decker, Bart. editor.&#160;Z&uacute;quete, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:487789 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11212-1">https://doi.org/10.1007/978-3-319-11212-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487826 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;&Scaron;venda, Petr. editor.&#160;Stajano, Frank. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12400-1">https://doi.org/10.1007/978-3-319-12400-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:487946 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Nepal, Surya. editor.&#160;Pathan, Mukaddim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487762 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Danger, Jean Luc. editor.&#160;Debbabi, Mourad. editor.&#160;Marion, Jean-Yves. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Zincir Heywood, Nur. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05302-8">https://doi.org/10.1007/978-3-319-05302-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dynamic Secrets in Communication Security ent://SD_ILS/0/SD_ILS:488222 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Xiao, Sheng. author.&#160;Gong, Weibo. author.&#160;Towsley, Don. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code Breaking in the Pacific ent://SD_ILS/0/SD_ILS:488233 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Donovan, Peter. author.&#160;Mack, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08278-3">https://doi.org/10.1007/978-3-319-08278-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Science and Cybersecurity ent://SD_ILS/0/SD_ILS:484756 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Pino, Robinson E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485743 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Gritzalis, Dimitris. editor.&#160;Kiayias, Aggelos. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12280-9">https://doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485776 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Joux, Antoine. editor.&#160;Youssef, Amr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486887 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Kim, Yongdae. editor.&#160;Lee, Heejo. editor.&#160;Perrig, Adrian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05149-9">https://doi.org/10.1007/978-3-319-05149-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486893 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Cao, Zhenfu. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:486912 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Matyas, Vashek. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487372 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Yoshida, Maki. editor.&#160;Mouri, Koichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Firewall Analytics Design, Configuration and Optimization ent://SD_ILS/0/SD_ILS:488519 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Al-Shaer, Ehab. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10371-6">https://doi.org/10.1007/978-3-319-10371-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:488634 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Proudler, Graeme. author.&#160;Chen, Liqun. author.&#160;Dalton, Chris. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488916 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Boureanu, Ioana. editor.&#160;Owesarski, Philippe. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488918 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Chow, Sherman S.M. editor.&#160;Liu, Joseph K. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488920 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10175-0">https://doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488984 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Christin, Nicolas. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488985 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Nguyen, Phong Q. editor.&#160;Oswald, Elisabeth. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55220-5">https://doi.org/10.1007/978-3-642-55220-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488986 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Lee, Hyang-Sook. editor.&#160;Han, Dong-Guk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:488996 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Aldini, Alessandro. editor.&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology -- CT-RSA 2014 The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489005 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Benaloh, Josh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04852-9">https://doi.org/10.1007/978-3-319-04852-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489016 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489026 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Mauw, Sjouke. editor.&#160;Damsgaard Jensen, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488975 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Lindell, Yehuda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488978 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Francillon, Aur&eacute;lien. editor.&#160;Rohatgi, Pankaj. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08302-5">https://doi.org/10.1007/978-3-319-08302-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:489032 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Shi, Yun Q. editor.&#160;Liu, Feng. editor.&#160;Yan, Weiqi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489066 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Garay, Juan A. editor.&#160;Gennaro, Rosario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44371-2">https://doi.org/10.1007/978-3-662-44371-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489068 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Meier, Willi. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13039-2">https://doi.org/10.1007/978-3-319-13039-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489108 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Lin, Dongdai. editor.&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489121 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Katsikas, Sokratis. editor.&#160;Agudo, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-53997-8">https://doi.org/10.1007/978-3-642-53997-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:489123 2024-09-10T23:52:07Z 2024-09-10T23:52:07Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11203-9">https://doi.org/10.1007/978-3-319-11203-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>