Search Results for Computer science. - Narrowed by: E-Book - English - 2007 - Data encryption (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026te$003dILS$0026ps$003d300?dt=list 2024-07-03T06:58:54Z Ethical and Social Issues in the Information Age ent://SD_ILS/0/SD_ILS:175498 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84628-659-9">http://dx.doi.org/10.1007/978-1-84628-659-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186107 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Vadhan, Salil P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186461 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Dawson, Ed. editor.&#160;Wong, Duncan S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186886 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Barker, Steve. editor.&#160;Ahn, Gail-Joon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186890 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Xiao, Bin. editor.&#160;Yang, Laurence T. editor.&#160;Ma, Jianhua. editor.&#160;Muller-Schloer, Christian. editor.&#160;Hua, Yu. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings ent://SD_ILS/0/SD_ILS:186912 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;H&auml;mmerli, Bernhard. editor.&#160;Sommer, Robin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187068 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Menezes, Alfred. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Advances in Intrusion Detection 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187122 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Kruegel, Christopher. editor.&#160;Lippmann, Richard. editor.&#160;Clark, Andrew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74320-0">http://dx.doi.org/10.1007/978-3-540-74320-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187146 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Lambrinoudakis, Costas. editor.&#160;Pernul, G&uuml;nther. editor.&#160;Tjoa, A Min. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:187165 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Biham, Eli. editor.&#160;Youssef, Amr M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187216 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Biryukov, Alex. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74619-5">http://dx.doi.org/10.1007/978-3-540-74619-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187246 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Paillier, Pascal. editor.&#160;Verbauwhede, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74735-2">http://dx.doi.org/10.1007/978-3-540-74735-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187368 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Dimitrakos, Theo. editor.&#160;Martinelli, Fabio. editor.&#160;Ryan, Peter Y. A. editor.&#160;Schneider, Steve. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186513 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Sauveron, Damien. editor.&#160;Markantonakis, Konstantinos. editor.&#160;Bilas, Angelos. editor.&#160;Quisquater, Jean-Jacques. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187372 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 10th International Conference, ISC 2007, Valpara&iacute;so, Chile, October 9-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187429 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Garay, Juan A. editor.&#160;Lenstra, Arjen K. editor.&#160;Mambo, Masahiro. editor.&#160;Peralta, Ren&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75496-1">http://dx.doi.org/10.1007/978-3-540-75496-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187473 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Susilo, Willy. editor.&#160;Liu, Joseph K. editor.&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers ent://SD_ILS/0/SD_ILS:187446 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Borisov, Nikita. editor.&#160;Golle, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187681 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Nam, Kil-Hyun. editor.&#160;Rhee, Gwangsoo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187720 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Kurosawa, Kaoru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187744 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Bao, Feng. editor.&#160;Ling, San. editor.&#160;Okamoto, Tatsuaki. editor.&#160;Wang, Huaxiong. editor.&#160;Xing, Chaoping. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings ent://SD_ILS/0/SD_ILS:187766 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Zhang, Hongke. editor.&#160;Olariu, Stephan. editor.&#160;Cao, Jiannong. editor.&#160;Johnson, David B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187767 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Srinathan, K. editor.&#160;Rangan, C. Pandu. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77026-8">http://dx.doi.org/10.1007/978-3-540-77026-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187773 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Qing, Sihan. editor.&#160;Imai, Hideki. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187790 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;McDaniel, Patrick. editor.&#160;Gupta, Shyam K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Directions in Embedded and Ubiquitous Computing EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187792 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Denko, Mieso K. editor.&#160;Shih, Chi-sheng. editor.&#160;Li, Kuan-Ching. editor.&#160;Tsao, Shiao-Li. editor.&#160;Zeng, Qing-An. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77090-9">http://dx.doi.org/10.1007/978-3-540-77090-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187809 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Malcolm, James A. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187819 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Bozta&#351;, Serdar. editor.&#160;Lu, Hsiao-Feng (Francis). editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77224-8">http://dx.doi.org/10.1007/978-3-540-77224-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186340 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Okamoto, Tatsuaki. editor.&#160;Wang, Xiaoyun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186573 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Naor, Moni. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186640 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Katz, Jonathan. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Arithmetic of Finite Fields First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186734 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Carlet, Claude. editor.&#160;Sunar, Berk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73074-3">http://dx.doi.org/10.1007/978-3-540-73074-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security II ent://SD_ILS/0/SD_ILS:186739 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186798 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Stajano, Frank. editor.&#160;Meadows, Catherine. editor.&#160;Capkun, Srdjan. editor.&#160;Moore, Tyler. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186840 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Lopez, Javier. editor.&#160;Samarati, Pierangela. editor.&#160;Ferrer, Josep L. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186859 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Pieprzyk, Josef. editor.&#160;Ghodosi, Hossein. editor.&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2007 First International Conference, Tokyo, Japan, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186868 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Okamoto, Tatsuaki. editor.&#160;Okamoto, Eiji. editor.&#160;Okamoto, Takeshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers ent://SD_ILS/0/SD_ILS:187061 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Camenisch, Jan L. editor.&#160;Collberg, Christian S. editor.&#160;Johnson, Neil F. editor.&#160;Sallee, Phil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design IV FOSAD 2006/2007 Tutorial Lectures ent://SD_ILS/0/SD_ILS:187272 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Aldini, Alessandro. editor.&#160;Gorrieri, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74810-6">http://dx.doi.org/10.1007/978-3-540-74810-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 &mdash; 26, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187283 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Biskup, Joachim. editor.&#160;L&oacute;pez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187892 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Alkassar, Ammar. editor.&#160;Volkamer, Melanie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187904 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Kim, Sehun. editor.&#160;Yung, Moti. editor.&#160;Lee, Hyung-Woo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187827 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Galbraith, Steven D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187851 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Adams, Carlisle. editor.&#160;Miri, Ali. editor.&#160;Wiener, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:187854 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Dietrich, Sven. editor.&#160;Dhamija, Rachna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187856 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Furon, Teddy. editor.&#160;Cayre, Fran&ccedil;ois. editor.&#160;Do&euml;rr, Gwena&euml;l. editor.&#160;Bas, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences, Subsequences, and Consequences International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers ent://SD_ILS/0/SD_ILS:187862 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Golomb, Solomon W. editor.&#160;Gong, Guang. editor.&#160;Helleseth, Tor. editor.&#160;Song, Hong-Yeop. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77404-4">http://dx.doi.org/10.1007/978-3-540-77404-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:186175 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Lee, Jae Kwang. editor.&#160;Yi, Okyeon. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Binary Quadratic Forms An Algorithmic Approach ent://SD_ILS/0/SD_ILS:184937 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Buchmann, Johannes. author.&#160;Vollmer, Ulrich. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-46368-9">http://dx.doi.org/10.1007/978-3-540-46368-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:185185 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Delfs, Hans. author.&#160;Knebl, Helmut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded Java Security Security for Mobile Devices ent://SD_ILS/0/SD_ILS:175522 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Debbabi, Mourad. author.&#160;Saleh, Mohamed. author.&#160;Talhi, Chamseddine. author.&#160;Zhioua, Sami. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84628-711-4">http://dx.doi.org/10.1007/978-1-84628-711-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Forensic Computing ent://SD_ILS/0/SD_ILS:175532 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Sammes, Tony. author.&#160;Jenkinson, Brian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84628-732-9">http://dx.doi.org/10.1007/978-1-84628-732-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Terrestrial Trunked Radio - Tetra A Global Security Tool ent://SD_ILS/0/SD_ILS:186206 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Stavroulakis, Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-71192-9">http://dx.doi.org/10.1007/3-540-71192-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management in Decentralized Systems ent://SD_ILS/0/SD_ILS:165430 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Yu, Ting. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Network Security ent://SD_ILS/0/SD_ILS:165912 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Xiao, Yang. editor.&#160;Shen, Xuemin Sherman. editor.&#160;Du, Ding-Zhu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-33112-6">http://dx.doi.org/10.1007/978-0-387-33112-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Preserving Privacy in On-Line Analytical Processing (OLAP) ent://SD_ILS/0/SD_ILS:166336 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Wang, Lingyu. author.&#160;Jajodia, Sushil. author.&#160;Wijesekera, Duminda. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Power Analysis Attacks Revealing the Secrets of Smart Cards ent://SD_ILS/0/SD_ILS:166230 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Mangard, Stefan. author.&#160;Oswald, Elisabeth. author.&#160;Popp, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-38162-6">http://dx.doi.org/10.1007/978-0-387-38162-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security Policies and Procedures ent://SD_ILS/0/SD_ILS:166393 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Frye, Douglas W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reliable Face Recognition Methods System Design, Impementation and Evaluation ent://SD_ILS/0/SD_ILS:166247 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Wechsler, Harry. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-38464-1">http://dx.doi.org/10.1007/978-0-387-38464-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Synchronizing Internet Protocol Security (SIPSec) ent://SD_ILS/0/SD_ILS:166600 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Shoniregun, Charles A. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Online Business Security Systems ent://SD_ILS/0/SD_ILS:166641 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Williams, Godfried B. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Variable-length Codes for Data Compression ent://SD_ILS/0/SD_ILS:175645 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84628-959-0">http://dx.doi.org/10.1007/978-1-84628-959-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security with Noisy Data On Private Biometrics, Secure Key Storage and Anti-Counterfeiting ent://SD_ILS/0/SD_ILS:175657 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Tuyls, Pim. editor.&#160;Skoric, Boris. editor.&#160;Kevenaar, Tom. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84628-984-2">http://dx.doi.org/10.1007/978-1-84628-984-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Compression The Complete Reference ent://SD_ILS/0/SD_ILS:175468 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84628-603-2">http://dx.doi.org/10.1007/978-1-84628-603-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decrypted Secrets Methods and Maxims of Cryptology ent://SD_ILS/0/SD_ILS:185053 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Bauer, Friedrich L. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Internet Security ent://SD_ILS/0/SD_ILS:165679 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Vacca, John R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malware Detection ent://SD_ILS/0/SD_ILS:166294 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Christodorescu, Mihai. editor.&#160;Jha, Somesh. editor.&#160;Maughan, Douglas. editor.&#160;Song, Dawn. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:166296 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Bleumer, Gerrit. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks ent://SD_ILS/0/SD_ILS:166337 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Poovendran, Radha. editor.&#160;Roy, Sumit. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:166353 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Liu, Donggang. author.&#160;Ning, Peng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Warehousing and Data Mining Techniques for Cyber Security ent://SD_ILS/0/SD_ILS:166379 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Singhal, Anoop. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economics of Identity Theft: Avoidance, Causes and Possible Cures ent://SD_ILS/0/SD_ILS:166606 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Camp, L. Jean. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:166560 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Flegel, Ulrich. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Geometry, Coding Theory and Cryptography ent://SD_ILS/0/SD_ILS:169437 2024-07-03T06:58:54Z 2024-07-03T06:58:54Z Author&#160;Garcia, Arnaldo. editor.&#160;Stichtenoth, Henning. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>