Search Results for Computer science. - Narrowed by: E-Book - Online Library - Data encryption (Computer science). - Data protection. - Information systems.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Information$002bsystems.$002509Information$002bsystems.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?
2024-09-10T06:18:11Z
Automatic Malware Analysis An Emulator Based Approach
ent://SD_ILS/0/SD_ILS:331796
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Yin, Heng. author. Song, Dawn. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331796.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Android Malware
ent://SD_ILS/0/SD_ILS:332276
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Jiang, Xuxian. author. Zhou, Yajin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332276.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334132
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Hoepman, Jaap-Henk. editor. Verbauwhede, Ingrid. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334132.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335077
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Susilo, Willy. editor. Reyhanitabar, Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335077.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334184
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Kurosawa, Kaoru. editor. Hanaoka, Goichiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334184.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334720
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Boyd, Colin. editor. Simpson, Leonie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334720.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334746
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Heather, James. editor. Schneider, Steve. editor. Teague, Vanessa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334746.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335088
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Adams, Andrew A. editor. Brenner, Michael. editor. Smith, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335088.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334863
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334863.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197080
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Susilo, Willy. editor. Mu, Yi. editor. Seberry, Jennifer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31448-3">http://dx.doi.org/10.1007/978-3-642-31448-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust, Privacy and Security in Digital Business 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197202
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Fischer-Hübner, Simone. editor. Katsikas, Sokratis. editor. Quirchmayr, Gerald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32287-7">http://dx.doi.org/10.1007/978-3-642-32287-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Systems Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197203
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Chen, Liqun. editor. Yung, Moti. editor. Zhu, Liehuang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32298-3">http://dx.doi.org/10.1007/978-3-642-32298-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Intelligent Information Systems International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195894
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Bouvry, Pascal. editor. Kłopotek, Mieczysław A. editor. Leprévost, Franck. editor. Marciniak, Małgorzata. editor. Mykowiecka, Agnieszka. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25261-7">http://dx.doi.org/10.1007/978-3-642-25261-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Voting and Identity Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197268
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Kiayias, Aggelos. editor. Lipmaa, Helger. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32747-6">http://dx.doi.org/10.1007/978-3-642-32747-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197299
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Visconti, Ivan. editor. Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32928-9">http://dx.doi.org/10.1007/978-3-642-32928-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197303
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Keromytis, Angelos D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32946-3">http://dx.doi.org/10.1007/978-3-642-32946-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197346
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Takagi, Tsuyoshi. editor. Wang, Guilin. editor. Qin, Zhiguang. editor. Jiang, Shaoquan. editor. Yu, Yong. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33272-2">http://dx.doi.org/10.1007/978-3-642-33272-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197541
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Wu, Chuan-Kun. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Systems 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197598
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Mitchell, Chris J. editor. Tomlinson, Allan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35371-0">http://dx.doi.org/10.1007/978-3-642-35371-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193823
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Burmester, Mike. editor. Tsudik, Gene. editor. Magliveras, Spyros. editor. Ilić, Ivana. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-18178-8">http://dx.doi.org/10.1007/978-3-642-18178-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure and Trust Computing, Data Management and Applications 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194993
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Park, James J. editor. Lopez, Javier. editor. Yeo, Sang-Soo. editor. Shon, Taeshik. editor. Taniar, David. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22339-6">http://dx.doi.org/10.1007/978-3-642-22339-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Autonomic and Trusted Computing 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195360
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Calero, Jose M. Alcaraz. editor. Yang, Laurence T. editor. Mármol, Félix Gómez. editor. García Villalba, Luis Javier. editor. Li, Andy Xiaolin. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23496-5">http://dx.doi.org/10.1007/978-3-642-23496-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open Research Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193975
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Camenisch, Jan. editor. Kisimov, Valentin. editor. Dubovitskaya, Maria. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19228-9">http://dx.doi.org/10.1007/978-3-642-19228-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXV 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194997
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Li, Yingjiu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22348-8">http://dx.doi.org/10.1007/978-3-642-22348-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193341
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Xie, Bing. editor. Branke, Juergen. editor. Sadjadi, S. Masoud. editor. Zhang, Daqing. editor. Zhou, Xingshe. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16576-4">http://dx.doi.org/10.1007/978-3-642-16576-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-business and Telecommunications 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189098
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Filipe, Joaquim. editor. Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88653-2">http://dx.doi.org/10.1007/978-3-540-88653-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings.
ent://SD_ILS/0/SD_ILS:189738
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Chen, Liqun. editor. Mitchell, Chris J. editor. Martin, Andrew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00587-9">http://dx.doi.org/10.1007/978-3-642-00587-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190173
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Abdalla, Michel. editor. Pointcheval, David. editor. Fouque, Pierre-Alain. editor. Vergnaud, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Autonomic and Trusted Computing 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190404
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author González Nieto, Juan. editor. Reif, Wolfgang. editor. Wang, Guojun. editor. Indulska, Jadwiga. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02704-8">http://dx.doi.org/10.1007/978-3-642-02704-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Voting and Identity Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190847
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Ryan, Peter Y. A. editor. Schoenmakers, Berry. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04135-8">http://dx.doi.org/10.1007/978-3-642-04135-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191053
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Jøsang, Audun. editor. Maseng, Torleiv. editor. Knapskog, Svein Johan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04766-4">http://dx.doi.org/10.1007/978-3-642-04766-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:185674
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Lipp, Peter. editor. Sadeghi, Ahmad-Reza. editor. Koch, Klaus-Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68979-9">http://dx.doi.org/10.1007/978-3-540-68979-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185647
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Bellovin, Steven M. editor. Gennaro, Rosario. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:189044
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Buchmann, Johannes. editor. Ding, Jintai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189164
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Solanki, Kaushal. editor. Sullivan, Kenneth. editor. Madhow, Upamanyu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:185771
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Rong, Chunming. editor. Jaatun, Martin Gilje. editor. Sandnes, Frode Eika. editor. Yang, Laurence T. editor. Ma, Jianhua. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185814
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Jahankhani, Hamid. editor. Revett, Kenneth. editor. Palmer-Brown, Dominic. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186890
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Xiao, Bin. editor. Yang, Laurence T. editor. Ma, Jianhua. editor. Muller-Schloer, Christian. editor. Hua, Yu. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers
ent://SD_ILS/0/SD_ILS:187061
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Camenisch, Jan L. editor. Collberg, Christian S. editor. Johnson, Neil F. editor. Sallee, Phil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
ent://SD_ILS/0/SD_ILS:187165
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Biham, Eli. editor. Youssef, Amr M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:187851
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Adams, Carlisle. editor. Miri, Ali. editor. Wiener, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:187856
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Furon, Teddy. editor. Cayre, François. editor. Doërr, Gwenaël. editor. Bas, Patrick. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings
ent://SD_ILS/0/SD_ILS:187766
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Zhang, Hongke. editor. Olariu, Stephan. editor. Cao, Jiannong. editor. Johnson, David B. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186640
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Katz, Jonathan. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186798
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Stajano, Frank. editor. Meadows, Catherine. editor. Capkun, Srdjan. editor. Moore, Tyler. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:185732
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Buttyán, Levente. editor. Gligor, Virgil D. editor. Westhoff, Dirk. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11964254">http://dx.doi.org/10.1007/11964254</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400326
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Krimmer, Robert. editor. (orcid)0000-0002-0873-539X Volkamer, Melanie. editor. (orcid)0000-0003-2674-4043 Cortier, Véronique. editor. Goré, Rajeev. editor. Hapsara, Manik. editor. (orcid)0000-0002-8653-063X<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335063
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335063.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and the Networked Society
ent://SD_ILS/0/SD_ILS:332915
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Gregory, Mark A. author. Glance, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332915.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics VIII 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197449
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33962-2">http://dx.doi.org/10.1007/978-3-642-33962-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats
ent://SD_ILS/0/SD_ILS:173823
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Swarup, Vipin. editor. Wang, Cliff. editor. Wang, X. Sean. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Intrusion Detection and Prevention Concepts and Techniques
ent://SD_ILS/0/SD_ILS:167906
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Ghorbani, Ali A. author. Lu, Wei. author. Tavallaee, Mahbod. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88771-5">http://dx.doi.org/10.1007/978-0-387-88771-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Situational Awareness Issues and Research
ent://SD_ILS/0/SD_ILS:171874
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Jajodia, Sushil. editor. Liu, Peng. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open Source Software for Digital Forensics
ent://SD_ILS/0/SD_ILS:172432
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Huebner, Ewa. editor. Zanero, Stefano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-5803-7">http://dx.doi.org/10.1007/978-1-4419-5803-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Threats in Cyber Security
ent://SD_ILS/0/SD_ILS:172782
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Probst, Christian W. editor. Hunker, Jeffrey. editor. Gollmann, Dieter. editor. Bishop, Matt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Multi-Party Non-Repudiation Protocols and Applications
ent://SD_ILS/0/SD_ILS:167284
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Onieva, José A. author. Lopez, Javier. author. Zhou, Jianying. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identifying Malicious Code Through Reverse Engineering
ent://SD_ILS/0/SD_ILS:167947
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Singh, Abhishek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191214
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Chen, Yan. editor. Dimitriou, Tassos D. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05284-2">http://dx.doi.org/10.1007/978-3-642-05284-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Initiatives to Secure Cyberspace An Emerging Landscape
ent://SD_ILS/0/SD_ILS:164783
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Portnoy, Michael. editor. Goodman, Seymour. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open Source Systems Security Certification
ent://SD_ILS/0/SD_ILS:167460
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Damiani, Ernesto. author. Ardagna, Claudio Agostino. author. El Ioini, Nabil. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77324-7">http://dx.doi.org/10.1007/978-0-387-77324-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vulnerability Analysis and Defense for the Internet
ent://SD_ILS/0/SD_ILS:167162
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Singh, Abhishek. editor. Singh, Baibhav. editor. Joseph, Hirosh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Attack and Cyber Security Beyond the Hacker
ent://SD_ILS/0/SD_ILS:167459
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Stolfo, Salvatore J. editor. Bellovin, Steven M. editor. Keromytis, Angelos D. editor. Hershkop, Shlomo. editor. Smith, Sean W. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Preserving Data Mining Models and Algorithms
ent://SD_ILS/0/SD_ILS:166794
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Aggarwal, Charu C. editor. Yu, Philip S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-70992-5">http://dx.doi.org/10.1007/978-0-387-70992-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Online Business Security Systems
ent://SD_ILS/0/SD_ILS:166641
2024-09-10T06:18:11Z
2024-09-10T06:18:11Z
Author Williams, Godfried B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>