Search Results for Computer science. - Narrowed by: English - Online Library - Computer Communication Networks. - Data encryption (Computer science). - Data structures (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2024-09-11T19:10:17Z
Theoretical Computer Science Essays in Memory of Shimon Even
ent://SD_ILS/0/SD_ILS:183542
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Goldreich, Oded. editor. Rosenberg, Arnold L. editor. Selman, Alan L. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11685654">http://dx.doi.org/10.1007/11685654</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Android Malware
ent://SD_ILS/0/SD_ILS:332276
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Jiang, Xuxian. author. Zhou, Yajin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332276.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Authentication Problems and Solutions
ent://SD_ILS/0/SD_ILS:331610
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Jakobsson, Markus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331610.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Location Privacy Protection in Mobile Networks
ent://SD_ILS/0/SD_ILS:332468
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Liu, Xinxin. author. Li, Xiaolin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332468.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Deterrence and IT Protection for Critical Infrastructures
ent://SD_ILS/0/SD_ILS:332909
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Martellini, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332909.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research
ent://SD_ILS/0/SD_ILS:173331
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-9866-8">http://dx.doi.org/10.1007/978-1-4419-9866-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Software and Systems 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334236
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Jürjens, Jan. editor. Livshits, Benjamin. editor. Scandariato, Riccardo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334236.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36563-8">http://dx.doi.org/10.1007/978-3-642-36563-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334707
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Jacobson, Michael. editor. Locasto, Michael. editor. Mohassel, Payman. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334707.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197053
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Bao, Feng. editor. Samarati, Pierangela. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Arithmetic of Finite Fields 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197122
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Özbudak, Ferruh. editor. Rodríguez-Henríquez, Francisco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31662-3">http://dx.doi.org/10.1007/978-3-642-31662-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Software and Systems 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196370
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Barthe, Gilles. editor. Livshits, Benjamin. editor. Scandariato, Riccardo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28166-2">http://dx.doi.org/10.1007/978-3-642-28166-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196995
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Askoxylakis, Ioannis. editor. Pöhls, Henrich C. editor. Posegga, Joachim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197072
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Mitrokotsa, Aikaterini. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31410-0">http://dx.doi.org/10.1007/978-3-642-31410-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197411
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Domingo-Ferrer, Josep. editor. Tinnirello, Ilenia. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33627-0">http://dx.doi.org/10.1007/978-3-642-33627-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197478
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Chim, Tat Wing. editor. Yuen, Tsz Hon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197603
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Pieprzyk, Josef. editor. Sadeghi, Ahmad-Reza. editor. Manulis, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35404-5">http://dx.doi.org/10.1007/978-3-642-35404-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2010, Corfu, Greece, September 22-24, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193101
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Domingo-Ferrer, Josep. editor. Magkos, Emmanouil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15838-4">http://dx.doi.org/10.1007/978-3-642-15838-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195249
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Robles, Rosslin John. editor. Balitanas, Maricel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23141-4">http://dx.doi.org/10.1007/978-3-642-23141-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Advances in Intrusion Detection 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195403
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Sommer, Robin. editor. Balzarotti, Davide. editor. Maier, Gregor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23644-0">http://dx.doi.org/10.1007/978-3-642-23644-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Software and Systems Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:193943
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Erlingsson, Úlfar. editor. Wieringa, Roel. editor. Zannone, Nicola. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19125-1">http://dx.doi.org/10.1007/978-3-642-19125-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195888
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Qing, Sihan. editor. Susilo, Willy. editor. Wang, Guilin. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195966
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Lin, Dongdai. editor. Tsudik, Gene. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25513-7">http://dx.doi.org/10.1007/978-3-642-25513-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
e-Business and Telecommunications 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194254
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Obaidat, Mohammad S. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20077-9">http://dx.doi.org/10.1007/978-3-642-20077-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Advances in Intrusion Detection 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192992
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Jha, Somesh. editor. Sommer, Robin. editor. Kreibich, Christian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15512-3">http://dx.doi.org/10.1007/978-3-642-15512-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Software and Systems Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191790
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Massacci, Fabio. editor. Wallach, Dan. editor. Zannone, Nicola. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11747-3">http://dx.doi.org/10.1007/978-3-642-11747-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Arithmetic of Finite Fields Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192452
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Hasan, M. Anwar. editor. Helleseth, Tor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13797-6">http://dx.doi.org/10.1007/978-3-642-13797-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193656
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Heng, Swee-Huay. editor. Wright, Rebecca N. editor. Goi, Bok-Min. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17619-7">http://dx.doi.org/10.1007/978-3-642-17619-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193666
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Soriano, Miguel. editor. Qing, Sihan. editor. López, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-business and Telecommunications 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189098
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Filipe, Joaquim. editor. Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88653-2">http://dx.doi.org/10.1007/978-3-540-88653-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190377
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Park, Jong Hyuk. editor. Chen, Hsiao-Hwa. editor. Atiquzzaman, Mohammed. editor. Lee, Changhoon. editor. Kim, Tai-hoon. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02617-1">http://dx.doi.org/10.1007/978-3-642-02617-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190382
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Park, Jong Hyuk. editor. Zhan, Justin. editor. Lee, Changhoon. editor. Wang, Guilin. editor. Kim, Tai-hoon. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02633-1">http://dx.doi.org/10.1007/978-3-642-02633-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ad-Hoc, Mobile and Wireless Networks 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190928
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Ruiz, Pedro M. editor. Garcia-Luna-Aceves, Jose Joaquin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04383-3">http://dx.doi.org/10.1007/978-3-642-04383-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
e-Business and Telecommunications International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191190
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Filipe, Joaquim. editor. Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05197-5">http://dx.doi.org/10.1007/978-3-642-05197-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Security Technology International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191311
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Kim, Haeng-kon. editor. Kim, Tai-hoon. editor. Kiumi, Akingbehin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10240-0">http://dx.doi.org/10.1007/978-3-642-10240-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190173
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Abdalla, Michel. editor. Pointcheval, David. editor. Fouque, Pierre-Alain. editor. Vergnaud, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191095
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Christianson, Bruce. editor. Crispo, Bruno. editor. Malcolm, James A. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04904-0">http://dx.doi.org/10.1007/978-3-642-04904-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190634
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Degano, Pierpaolo. editor. Viganò, Luca. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03459-6">http://dx.doi.org/10.1007/978-3-642-03459-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings
ent://SD_ILS/0/SD_ILS:190785
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Markowitch, Olivier. editor. Bilas, Angelos. editor. Hoepman, Jaap-Henk. editor. Mitchell, Chris J. editor. Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191494
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Ślęzak, Dominik. editor. Kim, Tai-hoon. editor. Fang, Wai-Chi. editor. Arnett, Kirk P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - INDOCRYPT 2009 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191427
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Roy, Bimal. editor. Sendrier, Nicolas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10628-6">http://dx.doi.org/10.1007/978-3-642-10628-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191592
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Qing, Sihan. editor. Mitchell, Chris J. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11145-7">http://dx.doi.org/10.1007/978-3-642-11145-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:189090
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Chen, Liqun. editor. Ryan, Mark D. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and Parallel Computing IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188995
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Cao, Jian. editor. Li, Minglu. editor. Wu, Min-You. editor. Chen, Jinjun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88140-7">http://dx.doi.org/10.1007/978-3-540-88140-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Certification and Security in Inter-Organizational E-Service
ent://SD_ILS/0/SD_ILS:165086
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Nardelli, Enrico. editor. Talamo, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy, Security and Trust within the Context of Pervasive Computing
ent://SD_ILS/0/SD_ILS:164923
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Robinson, Philip. editor. Vogt, Harald. editor. Wagealla, Waleed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE(331766.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum Attacks on Public-Key Cryptosystems
ent://SD_ILS/0/SD_ILS:330828
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330828.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Signatures
ent://SD_ILS/0/SD_ILS:165432
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Katz, Jonathan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-27712-7">http://dx.doi.org/10.1007/978-0-387-27712-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security
ent://SD_ILS/0/SD_ILS:167094
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Huang, Scott C.-H. editor. MacCallum, David. editor. Du, Ding-Zhu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-73821-5">http://dx.doi.org/10.1007/978-0-387-73821-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encryption for Digital Content
ent://SD_ILS/0/SD_ILS:171850
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Kiayias, Aggelos. author. Pehlivanoglu, Serdar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Situational Awareness Issues and Research
ent://SD_ILS/0/SD_ILS:171874
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Jajodia, Sushil. editor. Liu, Peng. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191712
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Gu, Qijun. editor. Zang, Wanyu. editor. Yu, Meng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191714
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Weerasinghe, Dasun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Threats in Cyber Security
ent://SD_ILS/0/SD_ILS:172782
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Probst, Christian W. editor. Hunker, Jeffrey. editor. Gollmann, Dieter. editor. Bishop, Matt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Initiatives to Secure Cyberspace An Emerging Landscape
ent://SD_ILS/0/SD_ILS:164783
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Portnoy, Michael. editor. Goodman, Seymour. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primality Testing and Integer Factorization in Public-Key Cryptography
ent://SD_ILS/0/SD_ILS:167452
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Personal Satellite Services International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190890
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Sithamparanathan, Kandeepan. editor. Marchese, Mario. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04260-7">http://dx.doi.org/10.1007/978-3-642-04260-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190947
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Schmidt, Andreas U. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04434-2">http://dx.doi.org/10.1007/978-3-642-04434-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Multi-Party Non-Repudiation Protocols and Applications
ent://SD_ILS/0/SD_ILS:167284
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Onieva, José A. author. Lopez, Javier. author. Zhou, Jianying. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Key Establishment
ent://SD_ILS/0/SD_ILS:167859
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Choo, Kim-Kwang Raymond. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-87969-7">http://dx.doi.org/10.1007/978-0-387-87969-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identifying Malicious Code Through Reverse Engineering
ent://SD_ILS/0/SD_ILS:167947
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Singh, Abhishek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189928
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Gritzalis, Dimitris. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01244-0">http://dx.doi.org/10.1007/978-3-642-01244-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191214
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Chen, Yan. editor. Dimitriou, Tassos D. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05284-2">http://dx.doi.org/10.1007/978-3-642-05284-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Database Security Applications and Trends
ent://SD_ILS/0/SD_ILS:166409
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Gertz, Michael. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptanalytic Attacks on RSA
ent://SD_ILS/0/SD_ILS:166422
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network-Aware Security for Group Communications
ent://SD_ILS/0/SD_ILS:166640
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Sun, Yan. author. Trappe, Wade. author. Liu, K. J. R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68848-0">http://dx.doi.org/10.1007/978-0-387-68848-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Attack and Cyber Security Beyond the Hacker
ent://SD_ILS/0/SD_ILS:167459
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Stolfo, Salvatore J. editor. Bellovin, Steven M. editor. Keromytis, Angelos D. editor. Hershkop, Shlomo. editor. Smith, Sean W. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Cards, Tokens, Security and Applications
ent://SD_ILS/0/SD_ILS:166922
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Mayes, Keith E. author. Markantonakis, Konstantinos. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Telecommunications Networks
ent://SD_ILS/0/SD_ILS:166945
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Traynor, Patrick. author. McDaniel, Patrick. author. Porta, Thomas La. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vulnerability Analysis and Defense for the Internet
ent://SD_ILS/0/SD_ILS:167162
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Singh, Abhishek. editor. Singh, Baibhav. editor. Joseph, Hirosh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Management in Decentralized Systems
ent://SD_ILS/0/SD_ILS:165430
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Yu, Ting. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security Policies and Procedures
ent://SD_ILS/0/SD_ILS:166393
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Frye, Douglas W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Synchronizing Internet Protocol Security (SIPSec)
ent://SD_ILS/0/SD_ILS:166600
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Online Business Security Systems
ent://SD_ILS/0/SD_ILS:166641
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Williams, Godfried B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Internet Security
ent://SD_ILS/0/SD_ILS:165679
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Vacca, John R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Power Analysis Attacks Revealing the Secrets of Smart Cards
ent://SD_ILS/0/SD_ILS:166230
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Mangard, Stefan. author. Oswald, Elisabeth. author. Popp, Thomas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-38162-6">http://dx.doi.org/10.1007/978-0-387-38162-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware Detection
ent://SD_ILS/0/SD_ILS:166294
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Christodorescu, Mihai. editor. Jha, Somesh. editor. Maughan, Douglas. editor. Song, Dawn. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Electronic Postage Systems Technology, Security, Economics
ent://SD_ILS/0/SD_ILS:166296
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Bleumer, Gerrit. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Preserving Privacy in On-Line Analytical Processing (OLAP)
ent://SD_ILS/0/SD_ILS:166336
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Wang, Lingyu. author. Jajodia, Sushil. author. Wijesekera, Duminda. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ent://SD_ILS/0/SD_ILS:166337
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Poovendran, Radha. editor. Roy, Sumit. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Wireless Sensor Networks
ent://SD_ILS/0/SD_ILS:166353
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Liu, Donggang. author. Ning, Peng. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Intrusion Detection Through Visualization
ent://SD_ILS/0/SD_ILS:165418
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Axelsson, Stefan. author. Sands, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Access Control Systems Security, Identity Management and Trust Models
ent://SD_ILS/0/SD_ILS:165433
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Benantar, Messaoud. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Wireless Network Security
ent://SD_ILS/0/SD_ILS:165680
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Vacca, John R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hop Integrity in the Internet
ent://SD_ILS/0/SD_ILS:165645
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Huang, Chin-Tser. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Preserving Data Mining
ent://SD_ILS/0/SD_ILS:165653
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Vaidya, Jaideep. author. Zhu, Yu Michael. author. Clifton, Christopher W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Viruses and Malware
ent://SD_ILS/0/SD_ILS:166010
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CryptoGraphics Exploiting Graphics Cards for Security
ent://SD_ILS/0/SD_ILS:166011
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Cook, Debra L. author. Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quality of Protection Security Measurements and Metrics
ent://SD_ILS/0/SD_ILS:166159
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Gollmann, Dieter. editor. Massacci, Fabio. editor. Yautsiukhin, Artsiom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Applications for Communications Security
ent://SD_ILS/0/SD_ILS:165205
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Vaudenay, Serge. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Exercise Book
ent://SD_ILS/0/SD_ILS:165571
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Baigèneres, Thomas. author. Lu, Yi. author. Vaudenay, Serge. author. Junod, Pascal. author. Monnerat, Jean. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Computer Security
ent://SD_ILS/0/SD_ILS:175390
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Salomon, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Group Communications over Data Networks
ent://SD_ILS/0/SD_ILS:164839
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Zou, Xukai. author. Ramamurthy, Byrav. author. Magliveras, Spyros S. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection and Correlation Challenges and Solutions
ent://SD_ILS/0/SD_ILS:164919
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Kruegel, Christopher. author. Valeur, Fredrik. author. Vigna, Giovanni. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing Platforms: Design and Applications
ent://SD_ILS/0/SD_ILS:164994
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Smith, Sean W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b103637">http://dx.doi.org/10.1007/b103637</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security in the 21st Century
ent://SD_ILS/0/SD_ILS:165001
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Lee, D. T. editor. Shieh, S. P. editor. Tygar, J. D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom
ent://SD_ILS/0/SD_ILS:165055
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Chadwick, David. editor. Preneel, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105674">http://dx.doi.org/10.1007/b105674</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multimedia Encryption and Watermarking
ent://SD_ILS/0/SD_ILS:165226
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Furht, Borko. author. Muharemagic, Edin. author. Socek, Daniel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)
ent://SD_ILS/0/SD_ILS:165267
2024-09-11T19:10:17Z
2024-09-11T19:10:17Z
Author Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>