Search Results for Data encryption (Computer science) - Narrowed by: 2008
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?
2024-11-19T05:42:14Z
Progress in Cryptology – AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185381
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189188
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Schulzrinne, Henning. editor. State, Radu. editor. Niccolini, Saverio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings
ent://SD_ILS/0/SD_ILS:189415
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Shi, Yun Q. editor. Kim, Hyoung-Joong. editor. Katzenbeisser, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network-Aware Security for Group Communications
ent://SD_ILS/0/SD_ILS:166640
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Sun, Yan. author. Trappe, Wade. author. Liu, K. J. R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68848-0">http://dx.doi.org/10.1007/978-0-387-68848-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vulnerability Analysis and Defense for the Internet
ent://SD_ILS/0/SD_ILS:167162
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Singh, Abhishek. editor. Singh, Baibhav. editor. Joseph, Hirosh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Preserving Data Mining Models and Algorithms
ent://SD_ILS/0/SD_ILS:166794
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Aggarwal, Charu C. editor. Yu, Philip S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-70992-5">http://dx.doi.org/10.1007/978-0-387-70992-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Biometrics
ent://SD_ILS/0/SD_ILS:166799
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Jain, Anil K. editor. Flynn, Patrick. editor. Ross, Arun A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-71041-9">http://dx.doi.org/10.1007/978-0-387-71041-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing Biometrics Applications
ent://SD_ILS/0/SD_ILS:166745
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Shoniregun, Charles A. author. Crosier, Stephen. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Cards, Tokens, Security and Applications
ent://SD_ILS/0/SD_ILS:166922
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Mayes, Keith E. author. Markantonakis, Konstantinos. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Telecommunications Networks
ent://SD_ILS/0/SD_ILS:166945
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Traynor, Patrick. author. McDaniel, Patrick. author. Porta, Thomas La. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Internet-Security aus Software-Sicht Ein Leitfaden zur Software-Erstellung für sicherheitskritische Bereiche
ent://SD_ILS/0/SD_ILS:185643
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Kriha, Walter. author. Schmitz, Roland. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68906-5">http://dx.doi.org/10.1007/978-3-540-68906-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185647
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Bellovin, Steven M. editor. Gennaro, Rosario. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185981
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Zamboni, Diego. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185962
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Mu, Yi. editor. Susilo, Willy. editor. Seberry, Jennifer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:186153
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-71039-4">http://dx.doi.org/10.1007/978-3-540-71039-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188159
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Canetti, Ran. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Algorithmic Number Theory 8th International Symposium, ANTS-VIII Banff, Canada, May 17-22, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:188439
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Poorten, Alfred J. editor. Stein, Andreas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79456-1">http://dx.doi.org/10.1007/978-3-540-79456-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:188456
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Pei, Dingyi. editor. Yung, Moti. editor. Lin, Dongdai. editor. Wu, Chuankun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:188765
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Furnell, Steven. editor. Katsikas, Sokratis K. editor. Lioy, Antonio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and Parallel Computing IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188995
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Cao, Jian. editor. Li, Minglu. editor. Wu, Min-You. editor. Chen, Jinjun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88140-7">http://dx.doi.org/10.1007/978-3-540-88140-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189031
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Jajodia, Sushil. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Research in Cryptology Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189035
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Lucks, Stefan. editor. Sadeghi, Ahmad-Reza. editor. Wolf, Christopher. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88353-1">http://dx.doi.org/10.1007/978-3-540-88353-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:189044
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Buchmann, Johannes. editor. Ding, Jintai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189329
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Chowdhury, Dipanwita Roy. editor. Rijmen, Vincent. editor. Das, Abhijit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189347
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Sekar, R. editor. Pujari, Arun K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:185771
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Rong, Chunming. editor. Jaatun, Martin Gilje. editor. Sandnes, Frode Eika. editor. Yang, Laurence T. editor. Ma, Jianhua. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185814
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Jahankhani, Hamid. editor. Revett, Kenneth. editor. Palmer-Brown, Dominic. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:185843
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Mjølsnes, Stig F. editor. Mauw, Sjouke. editor. Katsikas, Sokratis K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Arithmetic of Finite Fields 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:185849
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Gathen, Joachim. editor. Imaña, José Luis. editor. Koç, Çetin Kaya. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69499-1">http://dx.doi.org/10.1007/978-3-540-69499-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligence and Security Informatics Techniques and Applications
ent://SD_ILS/0/SD_ILS:185738
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Chen, Hsinchun. editor. Yang, Christopher C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69209-6">http://dx.doi.org/10.1007/978-3-540-69209-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:185991
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Atluri, Vijay. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:186015
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Borisov, Nikita. editor. Goldberg, Ian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Random Curves Journeys of a Mathematician
ent://SD_ILS/0/SD_ILS:187049
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Koblitz, Neal. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74078-0">http://dx.doi.org/10.1007/978-3-540-74078-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptography – PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188130
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Cramer, Ronald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188292
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Smart, Nigel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
RFID Security and Privacy Concepts, Protocols, and Architectures
ent://SD_ILS/0/SD_ILS:188328
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Henrici, Dirk. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79076-1">http://dx.doi.org/10.1007/978-3-540-79076-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:188336
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Chen, Liqun. editor. Mu, Yi. editor. Susilo, Willy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2008 The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188378
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Malkin, Tal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188543
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Onieva, Jose A. editor. Sauveron, Damien. editor. Chaumette, Serge. editor. Gollmann, Dieter. editor. Markantonakis, Konstantinos. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188588
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems – CHES 2008 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188570
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Oswald, Elisabeth. editor. Rohatgi, Pankaj. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85053-3">http://dx.doi.org/10.1007/978-3-540-85053-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188624
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Wagner, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:188645
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Tsudik, Gene. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188654
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Jonker, Willem. editor. Petković, Milan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography – Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188716
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Galbraith, Steven D. editor. Paterson, Kenneth G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188792
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Ostrovsky, Rafail. editor. Prisco, Roberto. editor. Visconti, Ivan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188801
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Wu, Tzong-Chen. editor. Lei, Chin-Laung. editor. Rijmen, Vincent. editor. Lee, Der-Tsai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85886-7">http://dx.doi.org/10.1007/978-3-540-85886-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188803
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Grimaud, Gilles. editor. Standaert, François-Xavier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sequences and Their Applications - SETA 2008 5th International Conference Lexington, KY, USA, September 14-18, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:188808
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Golomb, Solomon W. editor. Parker, Matthew G. editor. Pott, Alexander. editor. Winterhof, Arne. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85912-3">http://dx.doi.org/10.1007/978-3-540-85912-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188832
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Akar, Nail. editor. Pioro, Michal. editor. Skianis, Charalabos. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188841
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Lippmann, Richard. editor. Kirda, Engin. editor. Trachtenberg, Ari. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Coding Theory and Applications Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188850
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Barbero, Ángela. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-87448-5">http://dx.doi.org/10.1007/978-3-540-87448-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:189090
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Chen, Liqun. editor. Ryan, Mark D. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189113
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Baek, Joonsang. editor. Bao, Feng. editor. Chen, Kefei. editor. Lai, Xuejia. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88733-1">http://dx.doi.org/10.1007/978-3-540-88733-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189304
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Franklin, Matthew K. editor. Hui, Lucas Chi Kwong. editor. Wong, Duncan S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematical Methods in Computer Science Essays in Memory of Thomas Beth
ent://SD_ILS/0/SD_ILS:189380
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Calmet, Jacques. editor. Geiselmann, Willi. editor. Müller-Quade, Jörn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89994-5">http://dx.doi.org/10.1007/978-3-540-89994-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189164
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Solanki, Kaushal. editor. Sullivan, Kenneth. editor. Madhow, Upamanyu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Attack and Cyber Security Beyond the Hacker
ent://SD_ILS/0/SD_ILS:167459
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Stolfo, Salvatore J. editor. Bellovin, Steven M. editor. Keromytis, Angelos D. editor. Hershkop, Shlomo. editor. Smith, Sean W. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An Introduction to Mathematical Cryptography
ent://SD_ILS/0/SD_ILS:167545
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Silverman, J.H. author. Pipher, Jill. author. Hoffstein, Jeffrey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Database Security Applications and Trends
ent://SD_ILS/0/SD_ILS:166409
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Gertz, Michael. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptanalytic Attacks on RSA
ent://SD_ILS/0/SD_ILS:166422
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:185674
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Lipp, Peter. editor. Sadeghi, Ahmad-Reza. editor. Koch, Klaus-Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68979-9">http://dx.doi.org/10.1007/978-3-540-68979-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security III
ent://SD_ILS/0/SD_ILS:185689
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Shi, Yun Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Einführung in die Kryptographie
ent://SD_ILS/0/SD_ILS:187160
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Buchmann, Johannes. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74452-8">http://dx.doi.org/10.1007/978-3-540-74452-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers
ent://SD_ILS/0/SD_ILS:189212
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Lopez, Javier. editor. Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189234
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Pieprzyk, Josef. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multimedia content encryption techniques and applications
ent://SD_ILS/0/SD_ILS:285952
2024-11-19T05:42:14Z
2024-11-19T05:42:14Z
Author Lian, Shiguo.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420065282">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>