Search Results for Information Systems. - Narrowed by: Computer science. - Data encryption (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bSystems.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list 2024-07-14T07:29:44Z Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334755 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Janczewski, Lech J. editor.&#160;Wolfe, Henry B. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334755.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334616 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Cavallaro, Lorenzo. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334616.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334958 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Cuzzocrea, Alfredo. editor.&#160;Kittl, Christian. editor.&#160;Simos, Dimitris E. editor.&#160;Weippl, Edgar. editor.&#160;Xu, Lida. editor.<br/>Preferred Shelf Number&#160;ONLINE(334958.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335194 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bagchi, Aditya. editor.&#160;Ray, Indrakshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335194.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Intelligent Information Systems International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195894 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bouvry, Pascal. editor.&#160;K&#322;opotek, Mieczys&#322;aw A. editor.&#160;Lepr&eacute;vost, Franck. editor.&#160;Marciniak, Ma&#322;gorzata. editor.&#160;Mykowiecka, Agnieszka. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25261-7">http://dx.doi.org/10.1007/978-3-642-25261-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196738 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Laud, Peeter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196995 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Askoxylakis, Ioannis. editor.&#160;P&ouml;hls, Henrich C. editor.&#160;Posegga, Joachim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multidisciplinary Research and Practice for Information Systems IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197227 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Quirchmayr, Gerald. editor.&#160;Basl, Josef. editor.&#160;You, Ilsun. editor.&#160;Xu, Lida. editor.&#160;Weippl, Edgar. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32498-7">http://dx.doi.org/10.1007/978-3-642-32498-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197566 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Venkatakrishnan, Venkat. editor.&#160;Goswami, Diganta. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35130-3">http://dx.doi.org/10.1007/978-3-642-35130-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196303 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Aura, Tuomas. editor.&#160;J&auml;rvinen, Kimmo. editor.&#160;Nyberg, Kaisa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193686 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Jha, Somesh. editor.&#160;Mathuria, Anish. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability and Security for Business, Enterprise and Health Information Systems IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195302 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Tjoa, A Min. editor.&#160;Quirchmayr, Gerald. editor.&#160;You, Ilsun. editor.&#160;Xu, Lida. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23300-5">http://dx.doi.org/10.1007/978-3-642-23300-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings ent://SD_ILS/0/SD_ILS:195982 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Jajodia, Sushil. editor.&#160;Mazumdar, Chandan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25560-1">http://dx.doi.org/10.1007/978-3-642-25560-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193620 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Schmidt, Andreas U. editor.&#160;Russello, Giovanni. editor.&#160;Lioy, Antonio. editor.&#160;Prasad, Neeli R. editor.&#160;Lian, Shiguo. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17502-2">http://dx.doi.org/10.1007/978-3-642-17502-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191973 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Samarati, Pierangela. editor.&#160;Tunstall, Michael. editor.&#160;Posegga, Joachim. editor.&#160;Markantonakis, Konstantinos. editor.&#160;Sauveron, Damien. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems, Technology and Management 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191868 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Prasad, Sushil K. editor.&#160;Vin, Harrick M. editor.&#160;Sahni, Sartaj. editor.&#160;Jaiswal, Mahadeo P. editor.&#160;Thipakorn, Bundit. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12035-0">http://dx.doi.org/10.1007/978-3-642-12035-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems, Technology and Management Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189673 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Prasad, Sushil K. editor.&#160;Routray, Susmi. editor.&#160;Khurana, Reema. editor.&#160;Sahni, Sartaj. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00405-6">http://dx.doi.org/10.1007/978-3-642-00405-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings ent://SD_ILS/0/SD_ILS:190785 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Markowitch, Olivier. editor.&#160;Bilas, Angelos. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Mitchell, Chris J. editor.&#160;Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings ent://SD_ILS/0/SD_ILS:191472 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Prakash, Atul. editor.&#160;Sen Gupta, Indranil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10772-6">http://dx.doi.org/10.1007/978-3-642-10772-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190947 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Schmidt, Andreas U. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04434-2">http://dx.doi.org/10.1007/978-3-642-04434-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189347 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Sekar, R. editor.&#160;Pujari, Arun K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186513 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Sauveron, Damien. editor.&#160;Markantonakis, Konstantinos. editor.&#160;Bilas, Angelos. editor.&#160;Quisquater, Jean-Jacques. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187790 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;McDaniel, Patrick. editor.&#160;Gupta, Shyam K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185666 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bagchi, Aditya. editor.&#160;Atluri, Vijayalakshmi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183364 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Jajodia, Sushil. editor.&#160;Mazumdar, Chandan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Data and Security Engineering 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489103 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589&#160;Wagner, Roland. editor.&#160;Neuhold, Erich J. editor.&#160;Takizawa, Makoto. editor.&#160;K&uuml;ng, Josef. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12778-1">https://doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400479 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Negi, Atul. editor. (orcid)0000-0001-5707-130X&#160;Bhatnagar, Raj. editor.&#160;Parida, Laxmi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16&ndash;18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:402675 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kerschbaum, Florian. editor.&#160;Paraboschi, Stefano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risks and Security of Internet and Systems 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400971 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Cuppens, Nora. editor.&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941&#160;Legay, Axel. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-76687-4">https://doi.org/10.1007/978-3-319-76687-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399699 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:399718 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399614 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Catalano, Dario. editor.&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399972 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Su, Chunhua. editor.&#160;Kikuchi, Hiroaki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 17th International Conference, CANS 2018, Naples, Italy, September 30 &ndash; October 3, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399945 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Camenisch, Jan. editor. (orcid)0000-0001-6654-9459&#160;Papadimitratos, Panos. editor. (orcid)0000-0002-3267-5374&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00434-7">https://doi.org/10.1007/978-3-030-00434-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:400566 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Beimel, Amos. editor.&#160;Dziembowski, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400326 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Krimmer, Robert. editor. (orcid)0000-0002-0873-539X&#160;Volkamer, Melanie. editor. (orcid)0000-0003-2674-4043&#160;Cortier, V&eacute;ronique. editor.&#160;Gor&eacute;, Rajeev. editor.&#160;Hapsara, Manik. editor. (orcid)0000-0002-8653-063X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:400334 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Beimel, Amos. editor.&#160;Dziembowski, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485743 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Gritzalis, Dimitris. editor.&#160;Kiayias, Aggelos. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12280-9">https://doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489016 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489026 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Mauw, Sjouke. editor.&#160;Damsgaard Jensen, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485545 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Pointcheval, David. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06734-6">https://doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487487 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;De Decker, Bart. editor.&#160;Z&uacute;quete, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488918 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Chow, Sherman S.M. editor.&#160;Liu, Joseph K. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II ent://SD_ILS/0/SD_ILS:488956 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:489420 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Padr&oacute;, Carles. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487274 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Schmidt, Kai-Uwe. editor.&#160;Winterhof, Arne. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12325-7">https://doi.org/10.1007/978-3-319-12325-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489471 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Abadi, Mart&iacute;n. editor.&#160;Kremer, Steve. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54792-8">https://doi.org/10.1007/978-3-642-54792-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Cloud Computing Principles and Practice ent://SD_ILS/0/SD_ILS:331022 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Hill, Richard. author.&#160;Hirsch, Laurie. author.&#160;Lake, Peter. author.&#160;Moshiri, Siavash. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331022.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical and Social Issues in the Information Age ent://SD_ILS/0/SD_ILS:331112 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331112.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4990-3">http://dx.doi.org/10.1007/978-1-4471-4990-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333021 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Zia, Tanveer. editor.&#160;Zomaya, Albert. editor.&#160;Varadharajan, Vijay. editor.&#160;Mao, Morley. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333021.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334097 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Knudsen, Lars R. editor.&#160;Wu, Huapeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334097.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334301 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Mustofa, Khabib. editor.&#160;Neuhold, Erich J. editor.&#160;Tjoa, A Min. editor.&#160;Weippl, Edgar. editor.&#160;You, Ilsun. editor.<br/>Preferred Shelf Number&#160;ONLINE(334301.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36818-9">http://dx.doi.org/10.1007/978-3-642-36818-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334305 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Basin, David. editor.&#160;Mitchell, John C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334305.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Infocomm Technology 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012. Revised Papers ent://SD_ILS/0/SD_ILS:334561 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Guyot, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334561.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38227-7">http://dx.doi.org/10.1007/978-3-642-38227-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334514 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;J&oslash;sang, Audun. editor.&#160;Samarati, Pierangela. editor.&#160;Petrocchi, Marinella. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334514.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38004-4">http://dx.doi.org/10.1007/978-3-642-38004-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334519 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Deng, Robert H. editor.&#160;Feng, Tao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334519.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334635 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Gaborit, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334635.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334638 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Lopez, Javier. editor.&#160;Huang, Xinyi. editor.&#160;Sandhu, Ravi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334638.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and Trustworthy Computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334696 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Huth, Michael. editor.&#160;Asokan, N. editor.&#160;&#268;apkun, Srdjan. editor.&#160;Flechais, Ivan. editor.&#160;Coles-Kemp, Lizzie. editor.<br/>Preferred Shelf Number&#160;ONLINE(334696.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38908-5">http://dx.doi.org/10.1007/978-3-642-38908-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334707.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334710 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Doyen, Guillaume. editor.&#160;Waldburger, Martin. editor.&#160;&#268;eleda, Pavel. editor.&#160;Sperotto, Anna. editor.&#160;Stiller, Burkhard. editor.<br/>Preferred Shelf Number&#160;ONLINE(334710.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38998-6">http://dx.doi.org/10.1007/978-3-642-38998-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334720 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Boyd, Colin. editor.&#160;Simpson, Leonie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334720.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334726 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Cristofaro, Emiliano. editor.&#160;Wright, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334726.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334746 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Heather, James. editor.&#160;Schneider, Steve. editor.&#160;Teague, Vanessa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334746.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334878 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Capitani di Vimercati, Sabrina. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334878.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334880 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334880.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334909 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Crampton, Jason. editor.&#160;Jajodia, Sushil. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335057 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Accorsi, Rafael. editor.&#160;Ranise, Silvio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335057.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41098-7">http://dx.doi.org/10.1007/978-3-642-41098-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335063 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335063.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335076 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Gierlichs, Benedikt. editor.&#160;Guilley, Sylvain. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335076.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335077 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Susilo, Willy. editor.&#160;Reyhanitabar, Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335077.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335088 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Adams, Andrew A. editor.&#160;Brenner, Michael. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335088.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing Risk and Information Security Protect to Enable ent://SD_ILS/0/SD_ILS:330694 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Harkins, Malcolm. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330694.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-5114-9">http://dx.doi.org/10.1007/978-1-4302-5114-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334184 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kurosawa, Kaoru. editor.&#160;Hanaoka, Goichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334184.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334187 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kirchner, Matthias. editor.&#160;Ghosal, Dipak. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334187.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36373-3">http://dx.doi.org/10.1007/978-3-642-36373-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334132 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Hoepman, Jaap-Henk. editor.&#160;Verbauwhede, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334132.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334145 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James A. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334145.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334316 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Keromytis, Angelos D. editor.&#160;Pietro, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334316.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334399 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Leeuw, Elisabeth. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334399.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334401 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Mangard, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334401.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334470 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kwon, Taekyoung. editor.&#160;Lee, Mun-Kyu. editor.&#160;Kwon, Daesung. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334470.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334767 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Wang, Lingyu. editor.&#160;Shafiq, Basit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334767.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334863 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334863.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Engineering and Intelligence Informatics CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334975 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Cuzzocrea, Alfredo. editor.&#160;Kittl, Christian. editor.&#160;Simos, Dimitris E. editor.&#160;Weippl, Edgar. editor.&#160;Xu, Lida. editor.<br/>Preferred Shelf Number&#160;ONLINE(334975.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40588-4">http://dx.doi.org/10.1007/978-3-642-40588-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335002 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Decker, Bart. editor.&#160;Dittmann, Jana. editor.&#160;Kraetzer, Christian. editor.&#160;Vielhauer, Claus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335002.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335066 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Palamidessi, Catuscia. editor.&#160;Ryan, Mark D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335066.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41157-1">http://dx.doi.org/10.1007/978-3-642-41157-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I ent://SD_ILS/0/SD_ILS:335157 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335157.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II ent://SD_ILS/0/SD_ILS:335160 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335160.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded Multimedia Security Systems Algorithms and Architectures ent://SD_ILS/0/SD_ILS:330984 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Pande, Amit. author.&#160;Zambreno, Joseph. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4459-5">http://dx.doi.org/10.1007/978-1-4471-4459-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automatic Malware Analysis An Emulator Based Approach ent://SD_ILS/0/SD_ILS:331796 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Yin, Heng. author.&#160;Song, Dawn. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331796.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Malware ent://SD_ILS/0/SD_ILS:332276 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Jiang, Xuxian. author.&#160;Zhou, Yajin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332276.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Deterrence and IT Protection for Critical Infrastructures ent://SD_ILS/0/SD_ILS:332909 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Martellini, Maurizio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and the Networked Society ent://SD_ILS/0/SD_ILS:332915 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Gregory, Mark A. author.&#160;Glance, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332915.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday ent://SD_ILS/0/SD_ILS:335154 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Fischlin, Marc. editor.&#160;Katzenbeisser, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335154.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334078 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Pietro, Roberto. editor.&#160;Herranz, Javier. editor.&#160;Damiani, Ernesto. editor.&#160;State, Radu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334078.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35890-6">http://dx.doi.org/10.1007/978-3-642-35890-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy Preserving in Social Networks ent://SD_ILS/0/SD_ILS:335299 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Chbeir, Richard. editor.&#160;Al Bouna, Bechara. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335299.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-7091-0894-9">http://dx.doi.org/10.1007/978-3-7091-0894-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196237 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Danezis, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27576-0">http://dx.doi.org/10.1007/978-3-642-27576-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday ent://SD_ILS/0/SD_ILS:196428 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196588 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Pointcheval, David. editor.&#160;Johansson, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29011-4">http://dx.doi.org/10.1007/978-3-642-29011-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196613 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Ryan, Mark D. editor.&#160;Smyth, Ben. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29101-2">http://dx.doi.org/10.1007/978-3-642-29101-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management VI 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196782 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Dimitrakos, Theo. editor.&#160;Moona, Rajat. editor.&#160;Patel, Dhiren. editor.&#160;McKnight, D. Harrison. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29852-3">http://dx.doi.org/10.1007/978-3-642-29852-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196791 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Danezis, George. editor.&#160;Dietrich, Sven. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29889-9">http://dx.doi.org/10.1007/978-3-642-29889-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196796 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Schindler, Werner. editor.&#160;Huss, Sorin A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29912-4">http://dx.doi.org/10.1007/978-3-642-29912-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196805 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Meadows, Catherine. editor.&#160;Fernandez-Gago, Carmen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29963-6">http://dx.doi.org/10.1007/978-3-642-29963-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NETWORKING 2012 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part I ent://SD_ILS/0/SD_ILS:196820 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bestak, Robert. editor.&#160;Kencl, Lukas. editor.&#160;Li, Li Erran. editor.&#160;Widmer, Joerg. editor.&#160;Yin, Hao. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30045-5">http://dx.doi.org/10.1007/978-3-642-30045-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NETWORKING 2012 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part II ent://SD_ILS/0/SD_ILS:196821 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bestak, Robert. editor.&#160;Kencl, Lukas. editor.&#160;Li, Li Erran. editor.&#160;Widmer, Joerg. editor.&#160;Yin, Hao. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30054-7">http://dx.doi.org/10.1007/978-3-642-30054-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196822 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Fischlin, Marc. editor.&#160;Buchmann, Johannes. editor.&#160;Manulis, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30057-8">http://dx.doi.org/10.1007/978-3-642-30057-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Global Computing 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:196823 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bruni, Roberto. editor.&#160;Sassone, Vladimiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30065-3">http://dx.doi.org/10.1007/978-3-642-30065-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences and Their Applications &ndash; SETA 2012 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196928 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Helleseth, Tor. editor.&#160;Jedwab, Jonathan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30615-0">http://dx.doi.org/10.1007/978-3-642-30615-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and Trustworthy Computing 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196986 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Katzenbeisser, Stefan. editor.&#160;Weippl, Edgar. editor.&#160;Camp, L. Jean. editor.&#160;Volkamer, Melanie. editor.&#160;Reiter, Mike. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30921-2">http://dx.doi.org/10.1007/978-3-642-30921-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197072 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Mitrokotsa, Aikaterini. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31410-0">http://dx.doi.org/10.1007/978-3-642-31410-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197080 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Susilo, Willy. editor.&#160;Mu, Yi. editor.&#160;Seberry, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31448-3">http://dx.doi.org/10.1007/978-3-642-31448-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management for Life 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197123 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Camenisch, Jan. editor.&#160;Crispo, Bruno. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Leenes, Ronald. editor.&#160;Russello, Giovanni. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31668-5">http://dx.doi.org/10.1007/978-3-642-31668-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197053 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bao, Feng. editor.&#160;Samarati, Pierangela. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197152 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Rajarajan, Muttukrishnan. editor.&#160;Piper, Fred. editor.&#160;Wang, Haining. editor.&#160;Kesidis, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31909-9">http://dx.doi.org/10.1007/978-3-642-31909-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197153 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kim, Howon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197168 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Safavi-Naini, Reihaneh. editor.&#160;Canetti, Ran. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32009-5">http://dx.doi.org/10.1007/978-3-642-32009-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Watermarking 10th International Workshop, IWDW 2011, Atlantic City, NY, October 23-26, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197189 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Shi, Yun Qing. editor.&#160;Kim, Hyoung-Joong. editor.&#160;Perez-Gonzalez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32205-1">http://dx.doi.org/10.1007/978-3-642-32205-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197201 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Smith, Adam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32284-6">http://dx.doi.org/10.1007/978-3-642-32284-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197202 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Katsikas, Sokratis. editor.&#160;Quirchmayr, Gerald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32287-7">http://dx.doi.org/10.1007/978-3-642-32287-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197203 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Chen, Liqun. editor.&#160;Yung, Moti. editor.&#160;Zhu, Liehuang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32298-3">http://dx.doi.org/10.1007/978-3-642-32298-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Voting and Identity Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197268 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kiayias, Aggelos. editor.&#160;Lipmaa, Helger. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32747-6">http://dx.doi.org/10.1007/978-3-642-32747-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197329 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Foresti, Sara. editor.&#160;Yung, Moti. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33167-1">http://dx.doi.org/10.1007/978-3-642-33167-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics VIII 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197449 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33962-2">http://dx.doi.org/10.1007/978-3-642-33962-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197464 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Canteaut, Anne. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34047-5">http://dx.doi.org/10.1007/978-3-642-34047-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197475 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Hanaoka, Goichiro. editor.&#160;Yamauchi, Toshihiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 &ndash; November 2, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197492 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;J&oslash;sang, Audun. editor.&#160;Carlsson, Bengt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34210-3">http://dx.doi.org/10.1007/978-3-642-34210-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197516 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bogdanov, Andrey. editor.&#160;Sanadhya, Somitra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34416-9">http://dx.doi.org/10.1007/978-3-642-34416-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197529 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Xu, Li. editor.&#160;Bertino, Elisa. editor.&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34601-9">http://dx.doi.org/10.1007/978-3-642-34601-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197536 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Blyth, Jim. editor.&#160;Dietrich, Sven. editor.&#160;Camp, L. Jean. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34638-5">http://dx.doi.org/10.1007/978-3-642-34638-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 &ndash; December 3, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197541 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Wu, Chuan-Kun. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197557 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Galbraith, Steven. editor.&#160;Nandi, Mridul. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34931-7">http://dx.doi.org/10.1007/978-3-642-34931-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197559 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Wang, Xiaoyun. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multiple Access Communications 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197560 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bellalta, Boris. editor.&#160;Vinel, Alexey. editor.&#160;Jonsson, Magnus. editor.&#160;Barcelo, Jaume. editor.&#160;Maslennikov, Roman. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34976-8">http://dx.doi.org/10.1007/978-3-642-34976-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Applications for Security, Control and System Engineering International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197586 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kim, Tai-hoon. editor.&#160;Stoica, Adrian. editor.&#160;Fang, Wai-chi. editor.&#160;Vasilakos, Thanos. editor.&#160;Villalba, Javier Garc&iacute;a. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35264-5">http://dx.doi.org/10.1007/978-3-642-35264-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197597 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Xiang, Yang. editor.&#160;Lopez, Javier. editor.&#160;Kuo, C.-C. Jay. editor.&#160;Zhou, Wanlei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35362-8">http://dx.doi.org/10.1007/978-3-642-35362-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197598 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Mitchell, Chris J. editor.&#160;Tomlinson, Allan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35371-0">http://dx.doi.org/10.1007/978-3-642-35371-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197604 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Lee, Dong Hoon. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35416-8">http://dx.doi.org/10.1007/978-3-642-35416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Applications for Bio-technology, Multimedia, and Ubiquitous City International Conferences MulGraB, BSBT and IUrC 2012 Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197610 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kim, Tai-hoon. editor.&#160;Kang, Jeong-Jin. editor.&#160;Grosky, William I. editor.&#160;Arslan, Tughrul. editor.&#160;Pissinou, Niki. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35521-9">http://dx.doi.org/10.1007/978-3-642-35521-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XX 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197629 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;Stajano, Frank. editor.&#160;Anderson, Jonathan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35694-0">http://dx.doi.org/10.1007/978-3-642-35694-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ad Hoc Networks Third International ICST Conference, ADHOCNETS 2011, Paris, France, September 21-23, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196611 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Simplot-Ryl, David. editor.&#160;Dias de Amorim, Marcelo. editor.&#160;Giordano, Silvia. editor.&#160;Helmy, Ahmed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29096-1">http://dx.doi.org/10.1007/978-3-642-29096-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection Information Infrastructure Models, Analysis, and Defense ent://SD_ILS/0/SD_ILS:196564 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Lopez, Javier. editor.&#160;Setola, Roberto. editor.&#160;Wolthusen, Stephen D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28920-0">http://dx.doi.org/10.1007/978-3-642-28920-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196771 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Petkova-Nikova, Svetla. editor.&#160;Pashalidis, Andreas. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29804-2">http://dx.doi.org/10.1007/978-3-642-29804-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy Research 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196886 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Gritzalis, Dimitris. editor.&#160;Furnell, Steven. editor.&#160;Theoharidou, Marianthi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30436-1">http://dx.doi.org/10.1007/978-3-642-30436-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RFID. Security and Privacy 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195902 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Juels, Ari. editor.&#160;Paar, Christof. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25286-0">http://dx.doi.org/10.1007/978-3-642-25286-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196240 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Camenisch, Jan. editor.&#160;Kesdogan, Dogan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27585-2">http://dx.doi.org/10.1007/978-3-642-27585-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:196291 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Jung, Souhwan. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27890-7">http://dx.doi.org/10.1007/978-3-642-27890-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196294 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Lafourcade, Pascal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27901-0">http://dx.doi.org/10.1007/978-3-642-27901-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Internet Technology 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196340 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Ramanujam, R. editor.&#160;Ramaswamy, Srini. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28073-3">http://dx.doi.org/10.1007/978-3-642-28073-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings ent://SD_ILS/0/SD_ILS:196497 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Degano, Pierpaolo. editor.&#160;Guttman, Joshua D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28641-4">http://dx.doi.org/10.1007/978-3-642-28641-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects of Security and Trust 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:196695 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Barthe, Gilles. editor.&#160;Datta, Anupam. editor.&#160;Etalle, Sandro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29420-4">http://dx.doi.org/10.1007/978-3-642-29420-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneus Security 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196555 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Capitani di Vimercati, Sabrina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28879-1">http://dx.doi.org/10.1007/978-3-642-28879-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings ent://SD_ILS/0/SD_ILS:197101 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Garcia-Alfaro, Joaquin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31540-4">http://dx.doi.org/10.1007/978-3-642-31540-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197124 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Wright, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31680-7">http://dx.doi.org/10.1007/978-3-642-31680-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197280 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Decker, Bart. editor.&#160;Chadwick, David W. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32805-3">http://dx.doi.org/10.1007/978-3-642-32805-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197291 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32873-2">http://dx.doi.org/10.1007/978-3-642-32873-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197299 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Visconti, Ivan. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32928-9">http://dx.doi.org/10.1007/978-3-642-32928-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197303 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Keromytis, Angelos D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32946-3">http://dx.doi.org/10.1007/978-3-642-32946-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197346 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Wang, Guilin. editor.&#160;Qin, Zhiguang. editor.&#160;Jiang, Shaoquan. editor.&#160;Yu, Yong. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33272-2">http://dx.doi.org/10.1007/978-3-642-33272-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Spyware and Adware ent://SD_ILS/0/SD_ILS:167516 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Preserving Privacy in Data Outsourcing ent://SD_ILS/0/SD_ILS:172941 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Foresti, Sara. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7659-8">http://dx.doi.org/10.1007/978-1-4419-7659-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193823 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Burmester, Mike. editor.&#160;Tsudik, Gene. editor.&#160;Magliveras, Spyros. editor.&#160;Ili&#263;, Ivana. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-18178-8">http://dx.doi.org/10.1007/978-3-642-18178-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Privacy PRIME - Privacy and Identity Management for Europe ent://SD_ILS/0/SD_ILS:193918 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Camenisch, Jan. editor.&#160;Leenes, Ronald. editor.&#160;Sommer, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19050-6">http://dx.doi.org/10.1007/978-3-642-19050-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Research Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193975 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Camenisch, Jan. editor.&#160;Kisimov, Valentin. editor.&#160;Dubovitskaya, Maria. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19228-9">http://dx.doi.org/10.1007/978-3-642-19228-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194013 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor.&#160;Cavalli, Ana. editor.&#160;Leneutre, Jean. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19348-4">http://dx.doi.org/10.1007/978-3-642-19348-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2011 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194024 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Catalano, Dario. editor.&#160;Fazio, Nelly. editor.&#160;Gennaro, Rosario. editor.&#160;Nicolosi, Antonio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19379-8">http://dx.doi.org/10.1007/978-3-642-19379-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:194143 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Degano, Pierpaolo. editor.&#160;Etalle, Sandro. editor.&#160;Guttman, Joshua. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19751-2">http://dx.doi.org/10.1007/978-3-642-19751-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2011 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194380 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Paterson, Kenneth G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20465-4">http://dx.doi.org/10.1007/978-3-642-20465-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195022 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Holz, Thorsten. editor.&#160;Bos, Herbert. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22424-9">http://dx.doi.org/10.1007/978-3-642-22424-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195029 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Cuellar, Jorge. editor.&#160;Lopez, Javier. editor.&#160;Barthe, Gilles. editor.&#160;Pretschner, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22444-7">http://dx.doi.org/10.1007/978-3-642-22444-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195047 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Parampalli, Udaya. editor.&#160;Hawkes, Philip. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22497-3">http://dx.doi.org/10.1007/978-3-642-22497-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Network Security and Applications 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011 ent://SD_ILS/0/SD_ILS:195058 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Wyld, David C. editor.&#160;Wozniak, Michal. editor.&#160;Chaki, Nabendu. editor.&#160;Meghanathan, Natarajan. editor.&#160;Nagamalai, Dhinaharan. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22540-6">http://dx.doi.org/10.1007/978-3-642-22540-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NETWORKING 2011 Workshops International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, Valencia, Spain, May 13, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195220 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Casares-Giner, Vicente. editor.&#160;Manzoni, Pietro. editor.&#160;Pont, Ana. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23041-7">http://dx.doi.org/10.1007/978-3-642-23041-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VI FOSAD Tutorial Lectures ent://SD_ILS/0/SD_ILS:195231 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Aldini, Alessandro. editor.&#160;Gorrieri, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23082-0">http://dx.doi.org/10.1007/978-3-642-23082-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection V 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195772 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24864-1">http://dx.doi.org/10.1007/978-3-642-24864-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195901 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Chen, Liqun. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25283-9">http://dx.doi.org/10.1007/978-3-642-25283-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195931 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Lee, Dong Hoon. editor.&#160;Wang, Xiaoyun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 &ndash; December 2, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195937 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Yang, Bo-Yin.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25405-5">http://dx.doi.org/10.1007/978-3-642-25405-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196143 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27257-8">http://dx.doi.org/10.1007/978-3-642-27257-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NETWORKING 2011 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part I ent://SD_ILS/0/SD_ILS:194477 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Domingo-Pascual, Jordi. editor.&#160;Manzoni, Pietro. editor.&#160;Palazzo, Sergio. editor.&#160;Pont, Ana. editor.&#160;Scoglio, Caterina. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20757-0">http://dx.doi.org/10.1007/978-3-642-20757-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management for Life 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194481 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Duquenoy, Penny. editor.&#160;Hansen, Marit. editor.&#160;Leenes, Ronald. editor.&#160;Zhang, Ge. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20769-3">http://dx.doi.org/10.1007/978-3-642-20769-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NETWORKING 2011 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part II ent://SD_ILS/0/SD_ILS:194490 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Domingo-Pascual, Jordi. editor.&#160;Manzoni, Pietro. editor.&#160;Palazzo, Sergio. editor.&#160;Pont, Ana. editor.&#160;Scoglio, Caterina. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20798-3">http://dx.doi.org/10.1007/978-3-642-20798-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 &ndash; June 1, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194568 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bao, Feng. editor.&#160;Weng, Jian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194571 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Ardagna, Claudio A. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Challenges in Security and Privacy for Academia and Industry 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194696 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Camenisch, Jan. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Murayama, Yuko. editor.&#160;Portmann, Armand. editor.&#160;Rieder, Carlos. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21424-0">http://dx.doi.org/10.1007/978-3-642-21424-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194738 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Lopez, Javier. editor.&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and Trustworthy Computing 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194753 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;McCune, Jonathan M. editor.&#160;Balacheff, Boris. editor.&#160;Perrig, Adrian. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;Sasse, Angela. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21599-5">http://dx.doi.org/10.1007/978-3-642-21599-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Trust Computing, Data Management and Applications 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194993 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Park, James J. editor.&#160;Lopez, Javier. editor.&#160;Yeo, Sang-Soo. editor.&#160;Shon, Taeshik. editor.&#160;Taniar, David. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22339-6">http://dx.doi.org/10.1007/978-3-642-22339-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194968 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Hopper, Nicholas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22263-4">http://dx.doi.org/10.1007/978-3-642-22263-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Warehousing and Knowledge Discovery 13th International Conference, DaWaK 2011, Toulouse, France, August 29-September 2,2011. Proceedings ent://SD_ILS/0/SD_ILS:195375 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Cuzzocrea, Alfredo. editor.&#160;Dayal, Umeshwar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23544-3">http://dx.doi.org/10.1007/978-3-642-23544-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings ent://SD_ILS/0/SD_ILS:195377 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23556-6">http://dx.doi.org/10.1007/978-3-642-23556-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomic and Trusted Computing 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195360 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Calero, Jose M. Alcaraz. editor.&#160;Yang, Laurence T. editor.&#160;M&aacute;rmol, F&eacute;lix G&oacute;mez. editor.&#160;Garc&iacute;a Villalba, Luis Javier. editor.&#160;Li, Andy Xiaolin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23496-5">http://dx.doi.org/10.1007/978-3-642-23496-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195578 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Rhee, Kyung-Hyune. editor.&#160;Nyang, DaeHun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics VII 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 &ndash; February 2, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195579 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24212-0">http://dx.doi.org/10.1007/978-3-642-24212-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 5th International Conference, ProvSec 2011, Xi&rsquo;an, China, October 16-18, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195600 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Boyen, Xavier. editor.&#160;Chen, Xiaofeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24316-5">http://dx.doi.org/10.1007/978-3-642-24316-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings ent://SD_ILS/0/SD_ILS:195723 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Decker, Bart. editor.&#160;Lapon, Jorn. editor.&#160;Naessens, Vincent. editor.&#160;Uhl, Andreas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24712-5">http://dx.doi.org/10.1007/978-3-642-24712-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195856 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Iwata, Tetsu. editor.&#160;Nishigaki, Masakatsu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats ent://SD_ILS/0/SD_ILS:173823 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;Wang, X. Sean. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2011 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194876 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Nitaj, Abderrahmane. editor.&#160;Pointcheval, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21969-6">http://dx.doi.org/10.1007/978-3-642-21969-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVI 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:194926 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James A. editor.&#160;Matyas, Vashek. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22137-8">http://dx.doi.org/10.1007/978-3-642-22137-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management V 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29 &ndash; July 1, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194946 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Wakeman, Ian. editor.&#160;Gudes, Ehud. editor.&#160;Jensen, Christian Damsgaard. editor.&#160;Crampton, Jason. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22200-9">http://dx.doi.org/10.1007/978-3-642-22200-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXV 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194997 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Li, Yingjiu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22348-8">http://dx.doi.org/10.1007/978-3-642-22348-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:195089 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Camenisch, Jan. editor.&#160;Lambrinoudakis, Costas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22633-5">http://dx.doi.org/10.1007/978-3-642-22633-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2011 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195141 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Rogaway, Phillip. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22792-9">http://dx.doi.org/10.1007/978-3-642-22792-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Spaces and Next Generation Wired/Wireless Networking 11th International Conference, NEW2AN 2011, and 4th Conference on Smart Spaces, ruSMART 2011, St. Petersburg, Russia, August 22-25, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195166 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Balandin, Sergey. editor.&#160;Koucheryavy, Yevgeni. editor.&#160;Hu, Honglin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22875-9">http://dx.doi.org/10.1007/978-3-642-22875-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195171 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Furnell, Steven. editor.&#160;Lambrinoudakis, Costas. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22890-2">http://dx.doi.org/10.1007/978-3-642-22890-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:193265 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bao, Feng. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;Jing, Jiwu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16342-5">http://dx.doi.org/10.1007/978-3-642-16342-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193761 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Chung, Yongwha. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17955-6">http://dx.doi.org/10.1007/978-3-642-17955-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Watermarking 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193883 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kim, Hyoung-Joong. editor.&#160;Shi, Yun Qing. editor.&#160;Barni, Mauro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-18405-5">http://dx.doi.org/10.1007/978-3-642-18405-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194087 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Biryukov, Alex. editor.&#160;Gong, Guang. editor.&#160;Stinson, Douglas R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19574-7">http://dx.doi.org/10.1007/978-3-642-19574-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194466 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Fehr, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20728-0">http://dx.doi.org/10.1007/978-3-642-20728-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194726 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Lai, Xuejia. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21518-6">http://dx.doi.org/10.1007/978-3-642-21518-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papers ent://SD_ILS/0/SD_ILS:194786 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Xenakis, Christos. editor.&#160;Wolthusen, Stephen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21694-7">http://dx.doi.org/10.1007/978-3-642-21694-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194789 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Joux, Antoine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21702-9">http://dx.doi.org/10.1007/978-3-642-21702-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Advances in Intrusion Detection 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195403 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Sommer, Robin. editor.&#160;Balzarotti, Davide. editor.&#160;Maier, Gregor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23644-0">http://dx.doi.org/10.1007/978-3-642-23644-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multiple Access Communications 4th International Workshop, MACOM 2011, Trento, Italy, September 12-13, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195449 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Sacchi, Claudio. editor.&#160;Bellalta, Boris. editor.&#160;Vinel, Alexey. editor.&#160;Schlegel, Christian. editor.&#160;Granelli, Fabrizio. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23795-9">http://dx.doi.org/10.1007/978-3-642-23795-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2011 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings ent://SD_ILS/0/SD_ILS:195458 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Atluri, Vijay. editor.&#160;Diaz, Claudia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23822-2">http://dx.doi.org/10.1007/978-3-642-23822-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195683 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Joye, Marc. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;Tunstall, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; INDOCRYPT 2011 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195988 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bernstein, Daniel J. editor.&#160;Chatterjee, Sanjit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25578-6">http://dx.doi.org/10.1007/978-3-642-25578-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XIX 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196068 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Malcolm, James. editor.&#160;Stajano, Frank. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25867-1">http://dx.doi.org/10.1007/978-3-642-25867-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Technology International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:196121 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kim, Tai-hoon. editor.&#160;Adeli, Hojjat. editor.&#160;Fang, Wai-chi. editor.&#160;Villalba, Javier Garc&iacute;a. editor.&#160;Arnett, Kirk P. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27189-2">http://dx.doi.org/10.1007/978-3-642-27189-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Intrusion Detection and Prevention Concepts and Techniques ent://SD_ILS/0/SD_ILS:167906 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Ghorbani, Ali A. author.&#160;Lu, Wei. author.&#160;Tavallaee, Mahbod. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-88771-5">http://dx.doi.org/10.1007/978-0-387-88771-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Source Software for Digital Forensics ent://SD_ILS/0/SD_ILS:172432 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Huebner, Ewa. editor.&#160;Zanero, Stefano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-5803-7">http://dx.doi.org/10.1007/978-1-4419-5803-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive Cryptographic Access Control ent://SD_ILS/0/SD_ILS:172654 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kayem, Anne V. D. M. author.&#160;Akl, Selim G. author.&#160;Martin, Patrick. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-6655-1">http://dx.doi.org/10.1007/978-1-4419-6655-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider Threats in Cyber Security ent://SD_ILS/0/SD_ILS:172782 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Probst, Christian W. editor.&#160;Hunker, Jeffrey. editor.&#160;Gollmann, Dieter. editor.&#160;Bishop, Matt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Towards Trustworthy Elections New Directions in Electronic Voting ent://SD_ILS/0/SD_ILS:192176 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Chaum, David. editor.&#160;Jakobsson, Markus. editor.&#160;Rivest, Ronald L. editor.&#160;Ryan, Peter Y. A. editor.&#160;Benaloh, Josh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12980-3">http://dx.doi.org/10.1007/978-3-642-12980-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192312 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bandyopadhyay, Samir Kumar. editor.&#160;Adi, Wael. editor.&#160;Kim, Tai-hoon. editor.&#160;Xiao, Yang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13365-7">http://dx.doi.org/10.1007/978-3-642-13365-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192472 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Hong, Seokhie. editor.&#160;Iwata, Tetsu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13858-4">http://dx.doi.org/10.1007/978-3-642-13858-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and Trustworthy Computing Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192475 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Acquisti, Alessandro. editor.&#160;Smith, Sean W. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13869-0">http://dx.doi.org/10.1007/978-3-642-13869-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Networked Services and Applications - Engineering, Control and Management 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192508 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Aagesen, Finn Arve. editor.&#160;Knapskog, Svein Johan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13971-0">http://dx.doi.org/10.1007/978-3-642-13971-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers ent://SD_ILS/0/SD_ILS:192634 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Rome, Erich. editor.&#160;Bloomfield, Robin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14379-3">http://dx.doi.org/10.1007/978-3-642-14379-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information, Security and Cryptology &ndash; ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192649 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Lee, Donghoon. editor.&#160;Hong, Seokhie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:192708 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Chen, Liqun. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14597-1">http://dx.doi.org/10.1007/978-3-642-14597-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2010 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192716 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Rabin, Tal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14623-7">http://dx.doi.org/10.1007/978-3-642-14623-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192877 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Katsikas, Sokratis. editor.&#160;Lopez, Javier. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15152-1">http://dx.doi.org/10.1007/978-3-642-15152-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192982 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Berleur, Jacques. editor.&#160;Hercheui, Magda David. editor.&#160;Hilty, Lorenz M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15479-9">http://dx.doi.org/10.1007/978-3-642-15479-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192988 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Gritzalis, Dimitris. editor.&#160;Preneel, Bart. editor.&#160;Theoharidou, Marianthi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15497-3">http://dx.doi.org/10.1007/978-3-642-15497-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics VI Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192990 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Chow, Kam-Pui. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15506-2">http://dx.doi.org/10.1007/978-3-642-15506-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192838 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Sion, Radu. editor.&#160;Curtmola, Reza. editor.&#160;Dietrich, Sven. editor.&#160;Kiayias, Aggelos. editor.&#160;Miret, Josep M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14992-4">http://dx.doi.org/10.1007/978-3-642-14992-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - INDOCRYPT 2010 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193590 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Gong, Guang. editor.&#160;Gupta, Kishan Chand. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17401-8">http://dx.doi.org/10.1007/978-3-642-17401-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ad Hoc Networks Second International Conference, ADHOCNETS 2010, Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193771 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Zheng, Jun. editor.&#160;Simplot-Ryl, David. editor.&#160;Leung, Victor C. M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17994-5">http://dx.doi.org/10.1007/978-3-642-17994-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191613 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Roudier, Yves. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11207-2">http://dx.doi.org/10.1007/978-3-642-11207-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Replication Theory and Practice ent://SD_ILS/0/SD_ILS:191641 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Charron-Bost, Bernadette. editor.&#160;Pedone, Fernando. editor.&#160;Schiper, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11294-2">http://dx.doi.org/10.1007/978-3-642-11294-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2010 Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192074 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bernstein, Daniel J. editor.&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12678-9">http://dx.doi.org/10.1007/978-3-642-12678-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192157 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Sendrier, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12929-2">http://dx.doi.org/10.1007/978-3-642-12929-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NETWORKING 2010 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192169 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Crovella, Mark. editor.&#160;Feeney, Laura Marie. editor.&#160;Rubenstein, Dan. editor.&#160;Raghavan, S. V. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12963-6">http://dx.doi.org/10.1007/978-3-642-12963-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2010 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192187 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Nguyen, Phong Q. editor.&#160;Pointcheval, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13013-7">http://dx.doi.org/10.1007/978-3-642-13013-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management IV 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192336 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Nishigaki, Masakatsu. editor.&#160;J&oslash;sang, Audun. editor.&#160;Murayama, Yuko. editor.&#160;Marsh, Stephen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13446-3">http://dx.doi.org/10.1007/978-3-642-13446-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 &ndash; June 2, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192271 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Decker, Bart. editor.&#160;Schaum&uuml;ller-Bichl, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13241-4">http://dx.doi.org/10.1007/978-3-642-13241-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192580 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kreibich, Christian. editor.&#160;Jahnke, Marko. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14215-4">http://dx.doi.org/10.1007/978-3-642-14215-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management for Life 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192602 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Bezzi, Michele. editor.&#160;Duquenoy, Penny. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Hansen, Marit. editor.&#160;Zhang, Ge. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14282-6">http://dx.doi.org/10.1007/978-3-642-14282-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192932 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Garay, Juan A. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15317-4">http://dx.doi.org/10.1007/978-3-642-15317-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Government, E-Services and Global Processes Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192940 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Janssen, Marijn. editor.&#160;Lamersdorf, Winfried. editor.&#160;Pries-Heje, Jan. editor.&#160;Rosemann, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15346-4">http://dx.doi.org/10.1007/978-3-642-15346-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multiple Access Communications Third International Workshop, MACOM 2010, Barcelona, Spain, September 13-14, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192966 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Vinel, Alexey. editor.&#160;Bellalta, Boris. editor.&#160;Sacchi, Claudio. editor.&#160;Lyakhov, Andrey. editor.&#160;Telek, Mikl&oacute;s. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15428-7">http://dx.doi.org/10.1007/978-3-642-15428-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Security, Safety, and Sustainability 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193062 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Tenreiro de Magalh&atilde;es, S&eacute;rgio. editor.&#160;Jahankhani, Hamid. editor.&#160;Hessami, Ali G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15717-2">http://dx.doi.org/10.1007/978-3-642-15717-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences and Their Applications &ndash; SETA 2010 6th International Conference, Paris, France, September 13-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193113 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Carlet, Claude. editor.&#160;Pott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15874-2">http://dx.doi.org/10.1007/978-3-642-15874-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193205 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Jajodia, Sushil. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16161-2">http://dx.doi.org/10.1007/978-3-642-16161-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193245 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Heng, Swee-Huay. editor.&#160;Kurosawa, Kaoru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16280-0">http://dx.doi.org/10.1007/978-3-642-16280-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193296 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Martinelli, Fabio. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16441-5">http://dx.doi.org/10.1007/978-3-642-16441-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi&rsquo;an, China, October 26-29, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193341 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Xie, Bing. editor.&#160;Branke, Juergen. editor.&#160;Sadjadi, S. Masoud. editor.&#160;Zhang, Daqing. editor.&#160;Zhou, Xingshe. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16576-4">http://dx.doi.org/10.1007/978-3-642-16576-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193421 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Ors Yalcin, Siddika Berna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16822-2">http://dx.doi.org/10.1007/978-3-642-16822-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193422 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Echizen, Isao. editor.&#160;Kunihiro, Noboru. editor.&#160;Sasaki, Ryoichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Situational Awareness Issues and Research ent://SD_ILS/0/SD_ILS:171874 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Jajodia, Sushil. editor.&#160;Liu, Peng. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192123 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kwak, Jin. editor.&#160;Deng, Robert H. editor.&#160;Won, Yoojae. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12827-1">http://dx.doi.org/10.1007/978-3-642-12827-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects in Security and Trust 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192004 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Degano, Pierpaolo. editor.&#160;Guttman, Joshua D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12459-4">http://dx.doi.org/10.1007/978-3-642-12459-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Application 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192017 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Gollmann, Dieter. editor.&#160;Lanet, Jean-Louis. editor.&#160;Iguchi-Cartigny, Julien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12510-2">http://dx.doi.org/10.1007/978-3-642-12510-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethics and Policy of Biometrics Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers ent://SD_ILS/0/SD_ILS:192044 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kumar, Ajay. editor.&#160;Zhang, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12595-9">http://dx.doi.org/10.1007/978-3-642-12595-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2010 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 &ndash; June 3, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192256 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Gilbert, Henri. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13190-5">http://dx.doi.org/10.1007/978-3-642-13190-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Architecting Critical Systems First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings ent://SD_ILS/0/SD_ILS:192374 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Giese, Holger. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13556-9">http://dx.doi.org/10.1007/978-3-642-13556-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192387 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Chen, Hsinchun. editor.&#160;Chau, Michael. editor.&#160;Li, Shu-hsing. editor.&#160;Urs, Shalini. editor.&#160;Srinivasa, Srinath. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13601-6">http://dx.doi.org/10.1007/978-3-642-13601-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personal Satellite Services Second International ICST Confernce, PSATS 2010, Rome, Italy, February 2010 Revised Selected Papers ent://SD_ILS/0/SD_ILS:192393 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Sithamparanathan, Kandeepan. editor.&#160;Marchese, Mario. editor.&#160;Ruggieri, Marina. editor.&#160;Bisio, Igor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13618-4">http://dx.doi.org/10.1007/978-3-642-13618-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192420 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXIV 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192431 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Foresti, Sara. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13739-6">http://dx.doi.org/10.1007/978-3-642-13739-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192544 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Steinfeld, Ron. editor.&#160;Hawkes, Philip. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:192673 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kurosawa, Kaoru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14496-7">http://dx.doi.org/10.1007/978-3-642-14496-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Network Security and Applications Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192667 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Meghanathan, Natarajan. editor.&#160;Boumerdassi, Selma. editor.&#160;Chaki, Nabendu. editor.&#160;Nagamalai, Dhinaharan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14478-3">http://dx.doi.org/10.1007/978-3-642-14478-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy &ndash; Silver Linings in the Cloud 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192911 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Rannenberg, Kai. editor.&#160;Varadharajan, Vijay. editor.&#160;Weber, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15257-3">http://dx.doi.org/10.1007/978-3-642-15257-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193004 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15546-8">http://dx.doi.org/10.1007/978-3-642-15546-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthly Global Computing 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193036 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Wirsing, Martin. editor.&#160;Hofmann, Martin. editor.&#160;Rauschmayer, Axel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15640-3">http://dx.doi.org/10.1007/978-3-642-15640-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web Application Security Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:193191 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Serr&atilde;o, Carlos. editor.&#160;Aguilera D&iacute;az, Vicente. editor.&#160;Cerullo, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16120-9">http://dx.doi.org/10.1007/978-3-642-16120-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Collaborative Networks for a Sustainable World 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193140 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Camarinha-Matos, Luis M. editor.&#160;Boucher, Xavier. editor.&#160;Afsarmanesh, Hamideh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15961-9">http://dx.doi.org/10.1007/978-3-642-15961-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193582 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Abe, Masayuki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193524 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Alpcan, Tansu. editor.&#160;Butty&aacute;n, Levente. editor.&#160;Baras, John S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17197-0">http://dx.doi.org/10.1007/978-3-642-17197-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Computational Science X Special Issue on Security in Computing, Part I ent://SD_ILS/0/SD_ILS:193619 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Gavrilova, Marina L. editor.&#160;Tan, C. J. Kenneth. editor.&#160;Moreno, Edward David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17499-5">http://dx.doi.org/10.1007/978-3-642-17499-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communication and Networking International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part I ent://SD_ILS/0/SD_ILS:193646 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kim, Tai-hoon. editor.&#160;Chang, Alan Chin-Chen. editor.&#160;Li, MingChu. editor.&#160;Rong, Chunming. editor.&#160;Patrikakis, Charalampos Z. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17587-9">http://dx.doi.org/10.1007/978-3-642-17587-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193653 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Kim, Tai-hoon. editor.&#160;Fang, Wai-chi. editor.&#160;Khan, Muhammad Khurram. editor.&#160;Arnett, Kirk P. editor.&#160;Kang, Heau-jo. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17610-4">http://dx.doi.org/10.1007/978-3-642-17610-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:193703 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Malcolm, James A. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17773-6">http://dx.doi.org/10.1007/978-3-642-17773-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Initiatives to Secure Cyberspace An Emerging Landscape ent://SD_ILS/0/SD_ILS:164783 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Portnoy, Michael. editor.&#160;Goodman, Seymour. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identifying Malicious Code Through Reverse Engineering ent://SD_ILS/0/SD_ILS:167947 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Singh, Abhishek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing Systems Challenges, Approaches and Solutions ent://SD_ILS/0/SD_ILS:188131 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Biskup, Joachim. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78442-5">http://dx.doi.org/10.1007/978-3-540-78442-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sichere Systeme Konzepte, Architekturen und Frameworks ent://SD_ILS/0/SD_ILS:188290 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Schmitz, Roland. author.&#160;Kriha, Walter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78959-8">http://dx.doi.org/10.1007/978-3-540-78959-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189693 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Reingold, Omer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00457-5">http://dx.doi.org/10.1007/978-3-642-00457-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2009 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189697 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Jarecki, Stanis&#322;aw. editor.&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00468-1">http://dx.doi.org/10.1007/978-3-642-00468-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189787 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Lee, Pil Joong. editor.&#160;Cheon, Jung Hee. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00730-9">http://dx.doi.org/10.1007/978-3-642-00730-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189996 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Yung, Moti. editor.&#160;Liu, Peng. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01440-6">http://dx.doi.org/10.1007/978-3-642-01440-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects in Security and Trust 5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008 Revised Selected Papers ent://SD_ILS/0/SD_ILS:190007 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Degano, Pierpaolo. editor.&#160;Guttman, Joshua. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01465-9">http://dx.doi.org/10.1007/978-3-642-01465-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security IV ent://SD_ILS/0/SD_ILS:190112 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01757-5">http://dx.doi.org/10.1007/978-3-642-01757-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2009 Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190306 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02384-2">http://dx.doi.org/10.1007/978-3-642-02384-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomic and Trusted Computing 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings ent://SD_ILS/0/SD_ILS:190404 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Gonz&aacute;lez Nieto, Juan. editor.&#160;Reif, Wolfgang. editor.&#160;Wang, Guojun. editor.&#160;Indulska, Jadwiga. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02704-8">http://dx.doi.org/10.1007/978-3-642-02704-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> iNetSec 2009 &ndash; Open Research Problems in Network Security IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191270 2024-07-14T07:29:44Z 2024-07-14T07:29:44Z Author&#160;Camenisch, Jan. editor.&#160;Kesdogan, Dogan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05437-2">http://dx.doi.org/10.1007/978-3-642-05437-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>