Search Results for Computer science. - Narrowed by: Data Encryption.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bEncryption.$002509Data$002bEncryption.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list
2024-12-22T17:10:30Z
Ethical and Social Issues in the Information Age
ent://SD_ILS/0/SD_ILS:331112
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331112.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-4990-3">http://dx.doi.org/10.1007/978-1-4471-4990-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Android Malware
ent://SD_ILS/0/SD_ILS:332276
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Jiang, Xuxian. author. Zhou, Yajin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332276.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
ent://SD_ILS/0/SD_ILS:332461
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Tang, Jin. author. Cheng, Yu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332461.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Location Privacy Protection in Mobile Networks
ent://SD_ILS/0/SD_ILS:332468
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Liu, Xinxin. author. Li, Xiaolin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332468.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Assessment in Vehicular Networks
ent://SD_ILS/0/SD_ILS:332479
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Du, Suguo. author. Zhu, Haojin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332479.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Deterrence and IT Protection for Critical Infrastructures
ent://SD_ILS/0/SD_ILS:332909
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Martellini, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332909.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Authentication Problems and Solutions
ent://SD_ILS/0/SD_ILS:331610
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Jakobsson, Markus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331610.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automatic Malware Analysis An Emulator Based Approach
ent://SD_ILS/0/SD_ILS:331796
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Yin, Heng. author. Song, Dawn. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331796.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Systems 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:332976
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Bloem, Roderick. editor. Lipp, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332976.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03491-1">http://dx.doi.org/10.1007/978-3-319-03491-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334132
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Hoepman, Jaap-Henk. editor. Verbauwhede, Ingrid. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334132.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334145
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Christianson, Bruce. editor. Malcolm, James A. editor. Matyáš, Vashek. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334145.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334301
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Mustofa, Khabib. editor. Neuhold, Erich J. editor. Tjoa, A Min. editor. Weippl, Edgar. editor. You, Ilsun. editor.<br/>Preferred Shelf Number ONLINE(334301.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36818-9">http://dx.doi.org/10.1007/978-3-642-36818-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334305
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Basin, David. editor. Mitchell, John C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334305.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334470
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Kwon, Taekyoung. editor. Lee, Mun-Kyu. editor. Kwon, Daesung. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334470.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Infocomm Technology 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012. Revised Papers
ent://SD_ILS/0/SD_ILS:334561
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Guyot, Vincent. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334561.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38227-7">http://dx.doi.org/10.1007/978-3-642-38227-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334613
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Kutyłowski, Mirosław. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334613.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334616
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334616.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334620
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Youssef, Amr. editor. Nitaj, Abderrahmane. editor. Hassanien, Aboul Ella. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334620.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334635
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Gaborit, Philippe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334635.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334767
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Wang, Lingyu. editor. Shafiq, Basit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334767.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334746
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Heather, James. editor. Schneider, Steve. editor. Teague, Vanessa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334746.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334863
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334863.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334878
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Capitani di Vimercati, Sabrina. editor. Mitchell, Chris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334878.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334880
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Prouff, Emmanuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334880.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I
ent://SD_ILS/0/SD_ILS:334881
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Canetti, Ran. editor. Garay, Juan A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334881.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40041-4">http://dx.doi.org/10.1007/978-3-642-40041-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II
ent://SD_ILS/0/SD_ILS:334888
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Canetti, Ran. editor. Garay, Juan A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334888.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40084-1">http://dx.doi.org/10.1007/978-3-642-40084-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Watermaking 11th International Workshop, IWDW 2012, Shanghai, China, October 31 – November 3, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334892
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Shi, Yun Q. editor. Kim, Hyoung-Joong. editor. Pérez-González, Fernando. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334892.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40099-5">http://dx.doi.org/10.1007/978-3-642-40099-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334909
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Crampton, Jason. editor. Jajodia, Sushil. editor. Mayes, Keith. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334909.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334932
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Bertoni, Guido. editor. Coron, Jean-Sébastien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334932.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40349-1">http://dx.doi.org/10.1007/978-3-642-40349-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334938
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Avoine, Gildas. editor. Kara, Orhun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334938.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334958
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Cuzzocrea, Alfredo. editor. Kittl, Christian. editor. Simos, Dimitris E. editor. Weippl, Edgar. editor. Xu, Lida. editor.<br/>Preferred Shelf Number ONLINE(334958.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Engineering and Intelligence Informatics CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334975
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Cuzzocrea, Alfredo. editor. Kittl, Christian. editor. Simos, Dimitris E. editor. Weippl, Edgar. editor. Xu, Lida. editor.<br/>Preferred Shelf Number ONLINE(334975.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40588-4">http://dx.doi.org/10.1007/978-3-642-40588-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335057
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Accorsi, Rafael. editor. Ranise, Silvio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335057.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41098-7">http://dx.doi.org/10.1007/978-3-642-41098-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335066
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Palamidessi, Catuscia. editor. Ryan, Mark D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335066.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41157-1">http://dx.doi.org/10.1007/978-3-642-41157-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335076
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Gierlichs, Benedikt. editor. Guilley, Sylvain. editor. Mukhopadhyay, Debdeep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335076.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335077
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Susilo, Willy. editor. Reyhanitabar, Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335077.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335088
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Adams, Andrew A. editor. Brenner, Michael. editor. Smith, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335088.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Radio Frequency Identification Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335090
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Hutter, Michael. editor. Schmidt, Jörn-Marc. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335090.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41332-2">http://dx.doi.org/10.1007/978-3-642-41332-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335098
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335098.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335107
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Bologna, Sandro. editor. Hämmerli, Bernhard. editor. Gritzalis, Dimitris. editor. Wolthusen, Stephen. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335107.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335111
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Riis Nielson, Hanne. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335111.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41488-6">http://dx.doi.org/10.1007/978-3-642-41488-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols XXI 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335142
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Christianson, Bruce. editor. Malcolm, James. editor. Stajano, Frank. editor. Anderson, Jonathan. editor. Bonneau, Joseph. editor.<br/>Preferred Shelf Number ONLINE(335142.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41717-7">http://dx.doi.org/10.1007/978-3-642-41717-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
ent://SD_ILS/0/SD_ILS:335154
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Fischlin, Marc. editor. Katzenbeisser, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335154.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings
ent://SD_ILS/0/SD_ILS:332957
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Abdalla, Michel. editor. Nita-Rotaru, Cristina. editor. Dahab, Ricardo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332957.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:332978
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Paul, Goutam. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332978.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03515-4">http://dx.doi.org/10.1007/978-3-319-03515-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace Safety and Security 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:332984
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Wang, Guojun. editor. Ray, Indrakshi. editor. Feng, Dengguo. editor. Rajarajan, Muttukrishnan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332984.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03584-0">http://dx.doi.org/10.1007/978-3-319-03584-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May 28 – June 2, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334049
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Yuan, Yuyu. editor. Wu, Xu. editor. Lu, Yueming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334049.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35795-4">http://dx.doi.org/10.1007/978-3-642-35795-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2013 The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334122
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Dawson, Ed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334122.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography – Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334179
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Abdalla, Michel. editor. Lange, Tanja. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334179.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334184
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Kurosawa, Kaoru. editor. Hanaoka, Goichiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334184.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Hiding 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334187
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Kirchner, Matthias. editor. Ghosal, Dipak. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334187.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36373-3">http://dx.doi.org/10.1007/978-3-642-36373-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Software and Systems 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334236
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Jürjens, Jan. editor. Livshits, Benjamin. editor. Scandariato, Riccardo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334236.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36563-8">http://dx.doi.org/10.1007/978-3-642-36563-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334242
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Sahai, Amit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334242.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334401
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Mangard, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334401.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – EUROCRYPT 2013 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334587
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Johansson, Thomas. editor. Nguyen, Phong Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334587.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38348-9">http://dx.doi.org/10.1007/978-3-642-38348-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Trust Management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334514
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Jøsang, Audun. editor. Samarati, Pierangela. editor. Petrocchi, Marinella. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334514.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38004-4">http://dx.doi.org/10.1007/978-3-642-38004-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334519
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Deng, Robert H. editor. Feng, Tao. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334519.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334638
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Lopez, Javier. editor. Huang, Xinyi. editor. Sandhu, Ravi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334638.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:332941
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Qing, Sihan. editor. Zhou, Jianying. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332941.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334078
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Pietro, Roberto. editor. Herranz, Javier. editor. Damiani, Ernesto. editor. State, Radu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334078.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35890-6">http://dx.doi.org/10.1007/978-3-642-35890-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334097
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Knudsen, Lars R. editor. Wu, Huapeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334097.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust and Trustworthy Computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334696
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Huth, Michael. editor. Asokan, N. editor. Čapkun, Srdjan. editor. Flechais, Ivan. editor. Coles-Kemp, Lizzie. editor.<br/>Preferred Shelf Number ONLINE(334696.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38908-5">http://dx.doi.org/10.1007/978-3-642-38908-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334707
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Jacobson, Michael. editor. Locasto, Michael. editor. Mohassel, Payman. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334707.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334710
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Doyen, Guillaume. editor. Waldburger, Martin. editor. Čeleda, Pavel. editor. Sperotto, Anna. editor. Stiller, Burkhard. editor.<br/>Preferred Shelf Number ONLINE(334710.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38998-6">http://dx.doi.org/10.1007/978-3-642-38998-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334720
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Boyd, Colin. editor. Simpson, Leonie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334720.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334726
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Cristofaro, Emiliano. editor. Wright, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334726.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335002
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Decker, Bart. editor. Dittmann, Jana. editor. Kraetzer, Christian. editor. Vielhauer, Claus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335002.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:335157
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335157.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:335160
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335194
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Bagchi, Aditya. editor. Ray, Indrakshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335194.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335197
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Stam, Martijn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335197.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters
ent://SD_ILS/0/SD_ILS:330758
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Futral, William. author. Greene, James. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330758.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-6149-0">http://dx.doi.org/10.1007/978-1-4302-6149-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum Attacks on Public-Key Cryptosystems
ent://SD_ILS/0/SD_ILS:330828
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330828.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Embedded Multimedia Security Systems Algorithms and Architectures
ent://SD_ILS/0/SD_ILS:330984
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Pande, Amit. author. Zambreno, Joseph. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330984.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-4459-5">http://dx.doi.org/10.1007/978-1-4471-4459-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Biometrics
ent://SD_ILS/0/SD_ILS:331177
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Campisi, Patrizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331177.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-5230-9">http://dx.doi.org/10.1007/978-1-4471-5230-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automated Security Management
ent://SD_ILS/0/SD_ILS:332865
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Al-Shaer, Ehab. editor. Ou, Xinming. editor. Xie, Geoffrey. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332865.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-01433-3">http://dx.doi.org/10.1007/978-3-319-01433-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and the Networked Society
ent://SD_ILS/0/SD_ILS:332915
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Gregory, Mark A. author. Glance, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332915.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334316
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Keromytis, Angelos D. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334316.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ad Hoc Networks 4th International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334331
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Zheng, Jun. editor. Mitton, Nathalie. editor. Li, Jun. editor. Lorenz, Pascal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334331.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36958-2">http://dx.doi.org/10.1007/978-3-642-36958-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334755
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Janczewski, Lech J. editor. Wolfe, Henry B. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334755.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Preserving in Social Networks
ent://SD_ILS/0/SD_ILS:335299
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Chbeir, Richard. editor. Al Bouna, Bechara. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335299.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-7091-0894-9">http://dx.doi.org/10.1007/978-3-7091-0894-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:333021
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Zia, Tanveer. editor. Zomaya, Albert. editor. Varadharajan, Vijay. editor. Mao, Morley. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333021.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless Network Security Theories and Applications
ent://SD_ILS/0/SD_ILS:334222
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Chen, Lei. author. Ji, Jiahuang. author. Zhang, Zihong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334222.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36511-9">http://dx.doi.org/10.1007/978-3-642-36511-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334399
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Fischer-Hübner, Simone. editor. Leeuw, Elisabeth. editor. Mitchell, Chris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334399.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust Management VII 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334582
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Fernández-Gago, Carmen. editor. Martinelli, Fabio. editor. Pearson, Siani. editor. Agudo, Isaac. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334582.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38323-6">http://dx.doi.org/10.1007/978-3-642-38323-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334505
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Singh, Karan. editor. Awasthi, Amit K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334505.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37949-9">http://dx.doi.org/10.1007/978-3-642-37949-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Expert Oracle Application Express Security
ent://SD_ILS/0/SD_ILS:330631
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Spendolini, Scott. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330631.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-4732-6">http://dx.doi.org/10.1007/978-1-4302-4732-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing Risk and Information Security Protect to Enable
ent://SD_ILS/0/SD_ILS:330694
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Harkins, Malcolm. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330694.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-5114-9">http://dx.doi.org/10.1007/978-1-4302-5114-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Cloud Computing Principles and Practice
ent://SD_ILS/0/SD_ILS:331022
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Hill, Richard. author. Hirsch, Laurie. author. Lake, Peter. author. Moshiri, Siavash. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331022.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE(331766.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335063
2024-12-22T17:10:30Z
2024-12-22T17:10:30Z
Author Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335063.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>