Search Results for Information security. - Narrowed by: Computer science.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026ic$003dtrue$0026ps$003d300?dt=list
2026-01-18T00:08:52Z
Information Security Governance
ent://SD_ILS/0/SD_ILS:167709
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Solms, S.H. author. Solms, Rossouw. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-79984-1">http://dx.doi.org/10.1007/978-0-387-79984-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Electronic Healthcare Information Security
ent://SD_ILS/0/SD_ILS:167753
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Shoniregun, Charles A. author. Dube, Kudakwashe. author. Mtenzi, Fredrick. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-84919-5">http://dx.doi.org/10.1007/978-0-387-84919-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Information Security and Privacy
ent://SD_ILS/0/SD_ILS:172736
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Moore, Tyler. editor. Pym, David. editor. Ioannidis, Christos. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-6967-5">http://dx.doi.org/10.1007/978-1-4419-6967-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CyberForensics Understanding Information Security Investigations
ent://SD_ILS/0/SD_ILS:175048
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Bayuk, Jennifer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-60761-772-3">http://dx.doi.org/10.1007/978-1-60761-772-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Processing and Security Systems
ent://SD_ILS/0/SD_ILS:165266
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Saeed, Khalid. editor. Pejaś, Jerzy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137371">http://dx.doi.org/10.1007/b137371</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Information Security and Privacy III
ent://SD_ILS/0/SD_ILS:331294
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Schneier, Bruce. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331294.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Economics of Information Security and Privacy
ent://SD_ILS/0/SD_ILS:334810
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Böhme, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334810.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Information Security A Hands-on Approach
ent://SD_ILS/0/SD_ILS:195648
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Basin, David. author. Schaller, Patrick. author. Schläpfer, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24474-2">http://dx.doi.org/10.1007/978-3-642-24474-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Assurance Security in the Information Environment
ent://SD_ILS/0/SD_ILS:175440
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Blyth, Andrew. author. Kovacich, Gerald L. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-84628-489-9">http://dx.doi.org/10.1007/1-84628-489-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)
ent://SD_ILS/0/SD_ILS:165267
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
GeoSpatial Visual Analytics Geographical Information Processing and Visual Analytics for Environmental Security
ent://SD_ILS/0/SD_ILS:204921
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Amicis, Raffaele De. editor. Stojanovic, Radovan. editor. Conti, Giuseppe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-90-481-2899-0">http://dx.doi.org/10.1007/978-90-481-2899-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:484960
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377 Moriai, Shiho. editor. (orcid)0000-0002-6072-6183 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399972
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Su, Chunhua. editor. Kikuchi, Hiroaki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399995
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335 Scala, Antonio. editor. (orcid)0000-0002-3414-2686 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400194
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Chen, Liqun. editor. (orcid)0000-0003-2680-4907 Manulis, Mark. editor. (orcid)0000-0002-1512-9670 Schneider, Steve. editor. (orcid)0000-0001-8365-6993 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:399923
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197 Galbraith, Steven. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03326-2">https://doi.org/10.1007/978-3-030-03326-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400052
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Naccache, David. editor. (orcid)0000-0002-8651-6555 Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942 Qing, Sihan. editor. Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620 Blanc, Gregory. editor. (orcid)0000-0001-8150-6617<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01950-1">https://doi.org/10.1007/978-3-030-01950-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400830
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Chen, Xiaofeng. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401682
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006 Kim, Taesoo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401992
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Yang, Guomin. editor. (orcid)0000-0002-4949-7738 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Education – Towards a Cybersecure Society 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399019
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Drevin, Lynette. editor. (orcid)0000-0001-9370-8216 Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99734-6">https://doi.org/10.1007/978-3-319-99734-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:399545
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197 Galbraith, Steven. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03332-3">https://doi.org/10.1007/978-3-030-03332-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400247
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Ganapathy, Vinod. editor. Jaeger, Trent. editor. Shyamasundar, R.K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:400786
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Qing, Sihan. editor. Mitchell, Chris. editor. Chen, Liqun. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:355770
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Andress, Jason, author.<br/>Preferred Shelf Number ONLINE(355770.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488930
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Tryfonas, Theo. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II
ent://SD_ILS/0/SD_ILS:488956
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:489016
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What Is Computer Science? An Information Security Perspective
ent://SD_ILS/0/SD_ILS:488536
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Page, Daniel. author. Smart, Nigel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04042-4">https://doi.org/10.1007/978-3-319-04042-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:489420
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Padró, Carles. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:332941
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Qing, Sihan. editor. Zhou, Jianying. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332941.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334519
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Deng, Robert H. editor. Feng, Tao. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334519.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334958
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Cuzzocrea, Alfredo. editor. Kittl, Christian. editor. Simos, Dimitris E. editor. Weippl, Edgar. editor. Xu, Lida. editor.<br/>Preferred Shelf Number ONLINE(334958.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335107
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Bologna, Sandro. editor. Hämmerli, Bernhard. editor. Gritzalis, Dimitris. editor. Wolthusen, Stephen. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335107.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335110
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Hämmerli, Bernhard M. editor. Kalstad Svendsen, Nils. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335110.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41485-5">http://dx.doi.org/10.1007/978-3-642-41485-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:335160
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:333008
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Luiijf, Eric. editor. Hartel, Pieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333008.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Human Aspects of Information Security, Privacy, and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334786
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Marinos, Louis. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334786.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39345-7">http://dx.doi.org/10.1007/978-3-642-39345-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334794
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Dodge, Ronald C. editor. Futcher, Lynn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334794.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334976
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Awad, Ali Ismail. editor. Hassanien, Aboul Ella. editor. Baba, Kensuke. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334976.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:335157
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335157.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335098
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335098.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334720
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Boyd, Colin. editor. Simpson, Leonie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334720.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conference
ent://SD_ILS/0/SD_ILS:335292
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335292.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-658-03371-2">http://dx.doi.org/10.1007/978-3-658-03371-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing Risk and Information Security Protect to Enable
ent://SD_ILS/0/SD_ILS:330694
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Harkins, Malcolm. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330694.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-5114-9">http://dx.doi.org/10.1007/978-1-4302-5114-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334470
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kwon, Taekyoung. editor. Lee, Mun-Kyu. editor. Kwon, Daesung. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334470.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334613
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kutyłowski, Mirosław. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334613.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334616
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334616.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334755
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Janczewski, Lech J. editor. Wolfe, Henry B. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334755.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335194
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Bagchi, Aditya. editor. Ray, Indrakshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335194.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196738
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Laud, Peeter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
ent://SD_ILS/0/SD_ILS:198953
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196303
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Aura, Tuomas. editor. Järvinen, Kimmo. editor. Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196995
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Askoxylakis, Ioannis. editor. Pöhls, Henrich C. editor. Posegga, Joachim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197080
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Susilo, Willy. editor. Mu, Yi. editor. Seberry, Jennifer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31448-3">http://dx.doi.org/10.1007/978-3-642-31448-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197153
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kim, Howon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197201
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Smith, Adam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32284-6">http://dx.doi.org/10.1007/978-3-642-32284-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multidisciplinary Research and Practice for Information Systems IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197227
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Quirchmayr, Gerald. editor. Basl, Josef. editor. You, Ilsun. editor. Xu, Lida. editor. Weippl, Edgar. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32498-7">http://dx.doi.org/10.1007/978-3-642-32498-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197475
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197478
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Chim, Tat Wing. editor. Yuen, Tsz Hon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197541
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Wu, Chuan-Kun. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197559
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197566
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Venkatakrishnan, Venkat. editor. Goswami, Diganta. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35130-3">http://dx.doi.org/10.1007/978-3-642-35130-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2012 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2012 Conference
ent://SD_ILS/0/SD_ILS:197662
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-658-00333-3">http://dx.doi.org/10.1007/978-3-658-00333-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196291
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Jung, Souhwan. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27890-7">http://dx.doi.org/10.1007/978-3-642-27890-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Intelligent Information Systems International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195894
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Bouvry, Pascal. editor. Kłopotek, Mieczysław A. editor. Leprévost, Franck. editor. Marciniak, Małgorzata. editor. Mykowiecka, Agnieszka. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25261-7">http://dx.doi.org/10.1007/978-3-642-25261-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196613
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Ryan, Mark D. editor. Smyth, Ben. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29101-2">http://dx.doi.org/10.1007/978-3-642-29101-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Mobile Information and Communication Systems Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196850
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Prasad, Ramjee. editor. Farkas, Károly. editor. Schmidt, Andreas U. editor. Lioy, Antonio. editor. Russello, Giovanni. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30244-2">http://dx.doi.org/10.1007/978-3-642-30244-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy Research 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196886
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Gritzalis, Dimitris. editor. Furnell, Steven. editor. Theoharidou, Marianthi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30436-1">http://dx.doi.org/10.1007/978-3-642-30436-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197365
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Gollmann, Dieter. editor. Freiling, Felix C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33383-5">http://dx.doi.org/10.1007/978-3-642-33383-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197367
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Schmidt, Andreas U. editor. Russello, Giovanni. editor. Krontiris, Ioannis. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33392-7">http://dx.doi.org/10.1007/978-3-642-33392-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197384
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Hevia, Alejandro. editor. Neven, Gregory. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197580
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lei, Jingsheng. editor. Wang, Fu Lee. editor. Li, Mo. editor. Luo, Yuan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35211-9">http://dx.doi.org/10.1007/978-3-642-35211-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197604
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lee, Dong Hoon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35416-8">http://dx.doi.org/10.1007/978-3-642-35416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193686
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Jha, Somesh. editor. Mathuria, Anish. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193823
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Burmester, Mike. editor. Tsudik, Gene. editor. Magliveras, Spyros. editor. Ilić, Ivana. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-18178-8">http://dx.doi.org/10.1007/978-3-642-18178-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195047
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Parampalli, Udaya. editor. Hawkes, Philip. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22497-3">http://dx.doi.org/10.1007/978-3-642-22497-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195771
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lai, Xuejia. editor. Zhou, Jianying. editor. Li, Hui. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24861-0">http://dx.doi.org/10.1007/978-3-642-24861-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195888
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Qing, Sihan. editor. Susilo, Willy. editor. Wang, Guilin. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Technology International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:196121
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Fang, Wai-chi. editor. Villalba, Javier García. editor. Arnett, Kirk P. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27189-2">http://dx.doi.org/10.1007/978-3-642-27189-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Challenges in Security and Privacy for Academia and Industry 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194696
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Camenisch, Jan. editor. Fischer-Hübner, Simone. editor. Murayama, Yuko. editor. Portmann, Armand. editor. Rieder, Carlos. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21424-0">http://dx.doi.org/10.1007/978-3-642-21424-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194466
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Fehr, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20728-0">http://dx.doi.org/10.1007/978-3-642-20728-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194726
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lai, Xuejia. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21518-6">http://dx.doi.org/10.1007/978-3-642-21518-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194568
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Bao, Feng. editor. Weng, Jian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194571
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Ardagna, Claudio A. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195249
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Robles, Rosslin John. editor. Balitanas, Maricel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23141-4">http://dx.doi.org/10.1007/978-3-642-23141-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Availability, Reliability and Security for Business, Enterprise and Health Information Systems IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195302
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Tjoa, A Min. editor. Quirchmayr, Gerald. editor. You, Ilsun. editor. Xu, Lida. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23300-5">http://dx.doi.org/10.1007/978-3-642-23300-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195578
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Rhee, Kyung-Hyune. editor. Nyang, DaeHun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195683
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Joye, Marc. editor. Mukhopadhyay, Debdeep. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195931
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings
ent://SD_ILS/0/SD_ILS:195982
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25560-1">http://dx.doi.org/10.1007/978-3-642-25560-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:145371
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193265
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Bao, Feng. editor. Yung, Moti. editor. Lin, Dongdai. editor. Jing, Jiwu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16342-5">http://dx.doi.org/10.1007/978-3-642-16342-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193761
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Chung, Yongwha. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17955-6">http://dx.doi.org/10.1007/978-3-642-17955-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194663
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Herrero, Álvaro. editor. Corchado, Emilio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21323-6">http://dx.doi.org/10.1007/978-3-642-21323-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papers
ent://SD_ILS/0/SD_ILS:194786
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Xenakis, Christos. editor. Wolthusen, Stephen. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21694-7">http://dx.doi.org/10.1007/978-3-642-21694-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195856
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Iwata, Tetsu. editor. Nishigaki, Masakatsu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191714
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Weerasinghe, Dasun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191973
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Samarati, Pierangela. editor. Tunstall, Michael. editor. Posegga, Joachim. editor. Markantonakis, Konstantinos. editor. Sauveron, Damien. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192123
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kwak, Jin. editor. Deng, Robert H. editor. Won, Yoojae. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12827-1">http://dx.doi.org/10.1007/978-3-642-12827-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192544
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Steinfeld, Ron. editor. Hawkes, Philip. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193582
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193620
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Schmidt, Andreas U. editor. Russello, Giovanni. editor. Lioy, Antonio. editor. Prasad, Neeli R. editor. Lian, Shiguo. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17502-2">http://dx.doi.org/10.1007/978-3-642-17502-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193653
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kim, Tai-hoon. editor. Fang, Wai-chi. editor. Khan, Muhammad Khurram. editor. Arnett, Kirk P. editor. Kang, Heau-jo. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17610-4">http://dx.doi.org/10.1007/978-3-642-17610-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193666
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Soriano, Miguel. editor. Qing, Sihan. editor. López, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers
ent://SD_ILS/0/SD_ILS:192634
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Rome, Erich. editor. Bloomfield, Robin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14379-3">http://dx.doi.org/10.1007/978-3-642-14379-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192649
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lee, Donghoon. editor. Hong, Seokhie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192673
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14496-7">http://dx.doi.org/10.1007/978-3-642-14496-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – LATINCRYPT 2010 First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedings
ent://SD_ILS/0/SD_ILS:192745
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Abdalla, Michel. editor. Barreto, Paulo S. L. M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14712-8">http://dx.doi.org/10.1007/978-3-642-14712-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy – Silver Linings in the Cloud 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192911
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Rannenberg, Kai. editor. Varadharajan, Vijay. editor. Weber, Christian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15257-3">http://dx.doi.org/10.1007/978-3-642-15257-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192312
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Bandyopadhyay, Samir Kumar. editor. Adi, Wael. editor. Kim, Tai-hoon. editor. Xiao, Yang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13365-7">http://dx.doi.org/10.1007/978-3-642-13365-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193422
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Echizen, Isao. editor. Kunihiro, Noboru. editor. Sasaki, Ryoichi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conference
ent://SD_ILS/0/SD_ILS:199483
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9363-5">http://dx.doi.org/10.1007/978-3-8348-9363-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing Information Risk and the Economics of Security
ent://SD_ILS/0/SD_ILS:164782
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Johnson, M. Eric. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09762-6">http://dx.doi.org/10.1007/978-0-387-09762-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings
ent://SD_ILS/0/SD_ILS:190785
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Markowitch, Olivier. editor. Bilas, Angelos. editor. Hoepman, Jaap-Henk. editor. Mitchell, Chris J. editor. Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, Italy, October13-15, 2008. Revised Papers
ent://SD_ILS/0/SD_ILS:190658
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Setola, Roberto. editor. Geretshuber, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03552-4">http://dx.doi.org/10.1007/978-3-642-03552-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:191078
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Takagi, Tsuyoshi. editor. Mambo, Masahiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191425
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Datta, Anupam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:191472
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Prakash, Atul. editor. Sen Gupta, Indranil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10772-6">http://dx.doi.org/10.1007/978-3-642-10772-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189648
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Chung, Kyo-Il. editor. Sohn, Kiwook. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00306-6">http://dx.doi.org/10.1007/978-3-642-00306-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:189810
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Bao, Feng. editor. Li, Hui. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00843-6">http://dx.doi.org/10.1007/978-3-642-00843-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191592
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Qing, Sihan. editor. Mitchell, Chris J. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11145-7">http://dx.doi.org/10.1007/978-3-642-11145-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191491
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Youm, Heung Youl. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10838-9">http://dx.doi.org/10.1007/978-3-642-10838-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189787
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lee, Pil Joong. editor. Cheon, Jung Hee. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00730-9">http://dx.doi.org/10.1007/978-3-642-00730-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189928
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Gritzalis, Dimitris. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01244-0">http://dx.doi.org/10.1007/978-3-642-01244-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189996
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Yung, Moti. editor. Liu, Peng. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01440-6">http://dx.doi.org/10.1007/978-3-642-01440-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190377
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Park, Jong Hyuk. editor. Chen, Hsiao-Hwa. editor. Atiquzzaman, Mohammed. editor. Lee, Changhoon. editor. Kim, Tai-hoon. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02617-1">http://dx.doi.org/10.1007/978-3-642-02617-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190378
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Boyd, Colin. editor. González Nieto, Juan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02620-1">http://dx.doi.org/10.1007/978-3-642-02620-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190382
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Park, Jong Hyuk. editor. Zhan, Justin. editor. Lee, Changhoon. editor. Wang, Guilin. editor. Kim, Tai-hoon. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02633-1">http://dx.doi.org/10.1007/978-3-642-02633-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190947
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Schmidt, Andreas U. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04434-2">http://dx.doi.org/10.1007/978-3-642-04434-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190962
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Samarati, Pierangela. editor. Yung, Moti. editor. Martinelli, Fabio. editor. Ardagna, Claudio A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04474-8">http://dx.doi.org/10.1007/978-3-642-04474-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191307
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Desmedt, Yvo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10230-1">http://dx.doi.org/10.1007/978-3-642-10230-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191308
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Gal, Cecilia S. editor. Kantor, Paul B. editor. Lesk, Michael E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191346
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191494
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Ślęzak, Dominik. editor. Kim, Tai-hoon. editor. Fang, Wai-Chi. editor. Arnett, Kirk P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2008 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2008 Conference
ent://SD_ILS/0/SD_ILS:199411
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9283-6">http://dx.doi.org/10.1007/978-3-8348-9283-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy
ent://SD_ILS/0/SD_ILS:164757
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Jajodia, Sushil. editor. Samarati, Pierangela. editor. Cimato, Stelvio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:188456
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Pei, Dingyi. editor. Yung, Moti. editor. Lin, Dongdai. editor. Wu, Chuankun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188588
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189294
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Matsuura, Kanta. editor. Fujisaki, Eiichiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189347
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Sekar, R. editor. Pujari, Arun K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185962
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Mu, Yi. editor. Susilo, Willy. editor. Seberry, Jennifer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:188336
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Chen, Liqun. editor. Mu, Yi. editor. Susilo, Willy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188543
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Onieva, Jose A. editor. Sauveron, Damien. editor. Chaumette, Serge. editor. Gollmann, Dieter. editor. Markantonakis, Konstantinos. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers
ent://SD_ILS/0/SD_ILS:189212
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lopez, Javier. editor. Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189234
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Pieprzyk, Josef. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188801
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Wu, Tzong-Chen. editor. Lei, Chin-Laung. editor. Rijmen, Vincent. editor. Lee, Der-Tsai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85886-7">http://dx.doi.org/10.1007/978-3-540-85886-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:189090
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Chen, Liqun. editor. Ryan, Mark D. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186461
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Dawson, Ed. editor. Wong, Duncan S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186859
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Pieprzyk, Josef. editor. Ghodosi, Hossein. editor. Dawson, Ed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187681
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Nam, Kil-Hyun. editor. Rhee, Gwangsoo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa
ent://SD_ILS/0/SD_ILS:166940
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Venter, Hein. editor. Eloff, Mariki. editor. Labuschagne, Les. editor. Eloff, Jan. editor. Solms, Rossouw. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72367-9">http://dx.doi.org/10.1007/978-0-387-72367-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fifth World Conference on Information Security Education Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA
ent://SD_ILS/0/SD_ILS:167038
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Futcher, Lynn. editor. Dodge, Ronald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-73269-5">http://dx.doi.org/10.1007/978-0-387-73269-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186513
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Sauveron, Damien. editor. Markantonakis, Konstantinos. editor. Bilas, Angelos. editor. Quisquater, Jean-Jacques. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187429
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Garay, Juan A. editor. Lenstra, Arjen K. editor. Mambo, Masahiro. editor. Peralta, René. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75496-1">http://dx.doi.org/10.1007/978-3-540-75496-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187467
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Miyaji, Atsuko. editor. Kikuchi, Hiroaki. editor. Rannenberg, Kai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187720
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187790
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author McDaniel, Patrick. editor. Gupta, Shyam K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:187904
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kim, Sehun. editor. Yung, Moti. editor. Lee, Hyung-Woo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:186175
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lee, Jae Kwang. editor. Yi, Okyeon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187773
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Qing, Sihan. editor. Imai, Hideki. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference
ent://SD_ILS/0/SD_ILS:199537
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Pohlmann, Norbert. author. Reimer, Helmut. author. Schneider, Wolfgang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9418-2">http://dx.doi.org/10.1007/978-3-8348-9418-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligence and Security Informatics for International Security Information Sharing and Data Mining
ent://SD_ILS/0/SD_ILS:165714
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Chen, Hsinchun. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-30332-4">http://dx.doi.org/10.1007/0-387-30332-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Dynamic Environments Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22–24 May 2006, Karlstad, Sweden
ent://SD_ILS/0/SD_ILS:165935
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Fischer-Hübner, Simone. editor. Rannenberg, Kai. editor. Yngström, Louise. editor. Lindskog, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-33406-8">http://dx.doi.org/10.1007/0-387-33406-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Trends in Information and Communication Security International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:184130
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Müller, Günter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11766155">http://dx.doi.org/10.1007/11766155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:184677
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Katsikas, Sokratis K. editor. López, Javier. editor. Backes, Michael. editor. Gritzalis, Stefanos. editor. Preneel, Bart. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11836810">http://dx.doi.org/10.1007/11836810</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185180
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Rhee, Min Surp. editor. Lee, Byoungcheon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185214
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lai, Xuejia. editor. Chen, Kefei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185217
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Ning, Peng. editor. Qing, Sihan. editor. Li, Ninghui. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185235
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lipmaa, Helger. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2006 — Securing Electronic Busines Processes Highlights of the Information Security Solutions Europe 2006 Conference
ent://SD_ILS/0/SD_ILS:199337
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Paulus, Sachar. author. Pohlmann, Norbert. author. Reimer, Helmut. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9195-2">http://dx.doi.org/10.1007/978-3-8348-9195-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:183605
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Chen, Kefei. editor. Deng, Robert. editor. Lai, Xuejia. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:183638
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Song, Joo-Seok. editor. Kwon, Taekyoung. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11604938">http://dx.doi.org/10.1007/11604938</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:183712
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Won, Dong Ho. editor. Kim, Seungjoo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11734727">http://dx.doi.org/10.1007/11734727</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:184257
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Batten, Lynn Margaret. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185034
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Yoshiura, Hiroshi. editor. Sakurai, Kouichi. editor. Rannenberg, Kai. editor. Murayama, Yuko. editor. Kawamura, Shinichi. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185666
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Bagchi, Aditya. editor. Atluri, Vijayalakshmi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers
ent://SD_ILS/0/SD_ILS:185707
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Management, Integrity, and Internal Control in Information Systems IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
ent://SD_ILS/0/SD_ILS:165796
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Dowland, Paul. editor. Furnell, Steve. editor. Thuraisingham, Bhavani. editor. Wang, X. Sean. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-31167-X">http://dx.doi.org/10.1007/0-387-31167-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:183146
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Park, Choon-sik. editor. Chee, Seongtaek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:183364
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:182830
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Boyd, Colin. editor. González Nieto, Juan Manuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:183050
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Deng, Robert H. editor. Bao, Feng. editor. Pang, HweeHwa. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:183162
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Qing, Sihan. editor. Mao, Wenbo. editor. López, Javier. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:183254
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Roy, Bimal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:183366
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Feng, Dengguo. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:182902
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lim, Chae Hoon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b103174">http://dx.doi.org/10.1007/b103174</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japan
ent://SD_ILS/0/SD_ILS:165165
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Sasaki, Ryoichi. editor. Qing, Sihan. editor. Okamoto, Eiji. editor. Yoshiura, Hiroshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:183003
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Zhou, Jianying. editor. Lopez, Javier. editor. Deng, Robert H. editor. Bao, Feng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Modelling and Verification of Secure Exams
ent://SD_ILS/0/SD_ILS:401571
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Giustolisi, Rosario. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-67107-9">https://doi.org/10.1007/978-3-319-67107-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE(331766.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Iris Biometrics From Segmentation to Template Security
ent://SD_ILS/0/SD_ILS:331810
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Rathgeb, Christian. author. Uhl, Andreas. author. Wild, Peter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331810.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5571-4">http://dx.doi.org/10.1007/978-1-4614-5571-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Operational Semantics and Verification of Security Protocols
ent://SD_ILS/0/SD_ILS:188195
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Cremers, Cas. author. Mauw, Sjouke. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78636-8">http://dx.doi.org/10.1007/978-3-540-78636-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fault Analysis in Cryptography
ent://SD_ILS/0/SD_ILS:196746
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Joye, Marc. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29656-7">http://dx.doi.org/10.1007/978-3-642-29656-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Block Cipher Companion
ent://SD_ILS/0/SD_ILS:193573
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Knudsen, Lars R. author. Robshaw, Matthew J.B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17342-4">http://dx.doi.org/10.1007/978-3-642-17342-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Preserving Privacy in Data Outsourcing
ent://SD_ILS/0/SD_ILS:172941
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Foresti, Sara. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7659-8">http://dx.doi.org/10.1007/978-1-4419-7659-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats
ent://SD_ILS/0/SD_ILS:173823
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Swarup, Vipin. editor. Wang, Cliff. editor. Wang, X. Sean. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Intrusion Detection and Prevention Concepts and Techniques
ent://SD_ILS/0/SD_ILS:167906
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Ghorbani, Ali A. author. Lu, Wei. author. Tavallaee, Mahbod. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88771-5">http://dx.doi.org/10.1007/978-0-387-88771-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encryption for Digital Content
ent://SD_ILS/0/SD_ILS:171850
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kiayias, Aggelos. author. Pehlivanoglu, Serdar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Situational Awareness Issues and Research
ent://SD_ILS/0/SD_ILS:171874
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Jajodia, Sushil. editor. Liu, Peng. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Adaptive Cryptographic Access Control
ent://SD_ILS/0/SD_ILS:172654
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kayem, Anne V. D. M. author. Akl, Selim G. author. Martin, Patrick. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-6655-1">http://dx.doi.org/10.1007/978-1-4419-6655-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Efficient Secure Two-Party Protocols Techniques and Constructions
ent://SD_ILS/0/SD_ILS:192608
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Hazay, Carmit. author. Lindell, Yehuda. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14303-8">http://dx.doi.org/10.1007/978-3-642-14303-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Statistical Steganalysis
ent://SD_ILS/0/SD_ILS:192611
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Böhme, Rainer. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14313-7">http://dx.doi.org/10.1007/978-3-642-14313-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Locally Decodable Codes and Private Information Retrieval Schemes
ent://SD_ILS/0/SD_ILS:192626
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Yekhanin, Sergey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14358-8">http://dx.doi.org/10.1007/978-3-642-14358-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Signcryption
ent://SD_ILS/0/SD_ILS:189264
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Dent, Alexander W. editor. Zheng, Yuliang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89411-7">http://dx.doi.org/10.1007/978-3-540-89411-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Towards Hardware-Intrinsic Security Foundations and Practice
ent://SD_ILS/0/SD_ILS:192659
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Sadeghi, Ahmad-Reza. editor. Naccache, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14452-3">http://dx.doi.org/10.1007/978-3-642-14452-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The LLL Algorithm Survey and Applications
ent://SD_ILS/0/SD_ILS:190278
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Nguyen, Phong Q. editor. Vallée, Brigitte. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02295-1">http://dx.doi.org/10.1007/978-3-642-02295-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Threats in Cyber Security
ent://SD_ILS/0/SD_ILS:172782
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Probst, Christian W. editor. Hunker, Jeffrey. editor. Gollmann, Dieter. editor. Bishop, Matt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Initiatives to Secure Cyberspace An Emerging Landscape
ent://SD_ILS/0/SD_ILS:164783
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Portnoy, Michael. editor. Goodman, Seymour. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primality Testing and Integer Factorization in Public-Key Cryptography
ent://SD_ILS/0/SD_ILS:167452
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Dependability for Ambient Intelligence
ent://SD_ILS/0/SD_ILS:167907
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kokolakis, Spyros. editor. Gómez, Antonio Maña. editor. Spanoudakis, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88775-3">http://dx.doi.org/10.1007/978-0-387-88775-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identifying Malicious Code Through Reverse Engineering
ent://SD_ILS/0/SD_ILS:167947
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Singh, Abhishek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Multi-Party Non-Repudiation Protocols and Applications
ent://SD_ILS/0/SD_ILS:167284
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Onieva, José A. author. Lopez, Javier. author. Zhou, Jianying. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Key Establishment
ent://SD_ILS/0/SD_ILS:167859
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Choo, Kim-Kwang Raymond. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-87969-7">http://dx.doi.org/10.1007/978-0-387-87969-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Attack and Cyber Security Beyond the Hacker
ent://SD_ILS/0/SD_ILS:167459
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Stolfo, Salvatore J. editor. Bellovin, Steven M. editor. Keromytis, Angelos D. editor. Hershkop, Shlomo. editor. Smith, Sean W. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Telecommunications Networks
ent://SD_ILS/0/SD_ILS:166945
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Traynor, Patrick. author. McDaniel, Patrick. author. Porta, Thomas La. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vulnerability Analysis and Defense for the Internet
ent://SD_ILS/0/SD_ILS:167162
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Singh, Abhishek. editor. Singh, Baibhav. editor. Joseph, Hirosh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Synchronizing Internet Protocol Security (SIPSec)
ent://SD_ILS/0/SD_ILS:166600
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Management in Decentralized Systems
ent://SD_ILS/0/SD_ILS:165430
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Yu, Ting. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware Detection
ent://SD_ILS/0/SD_ILS:166294
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Christodorescu, Mihai. editor. Jha, Somesh. editor. Maughan, Douglas. editor. Song, Dawn. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Electronic Postage Systems Technology, Security, Economics
ent://SD_ILS/0/SD_ILS:166296
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Bleumer, Gerrit. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Preserving Privacy in On-Line Analytical Processing (OLAP)
ent://SD_ILS/0/SD_ILS:166336
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Wang, Lingyu. author. Jajodia, Sushil. author. Wijesekera, Duminda. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ent://SD_ILS/0/SD_ILS:166337
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Poovendran, Radha. editor. Roy, Sumit. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Wireless Sensor Networks
ent://SD_ILS/0/SD_ILS:166353
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Liu, Donggang. author. Ning, Peng. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Warehousing and Data Mining Techniques for Cyber Security
ent://SD_ILS/0/SD_ILS:166379
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security Policies and Procedures
ent://SD_ILS/0/SD_ILS:166393
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Frye, Douglas W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Intrusion Detection Through Visualization
ent://SD_ILS/0/SD_ILS:165418
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Axelsson, Stefan. author. Sands, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Biometric User Authentication for it Security From Fundamentals to Handwriting
ent://SD_ILS/0/SD_ILS:165467
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Vielhauer, Claus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hop Integrity in the Internet
ent://SD_ILS/0/SD_ILS:165645
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Huang, Chin-Tser. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Preserving Data Mining
ent://SD_ILS/0/SD_ILS:165653
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Vaidya, Jaideep. author. Zhu, Yu Michael. author. Clifton, Christopher W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Viruses and Malware
ent://SD_ILS/0/SD_ILS:166010
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CryptoGraphics Exploiting Graphics Cards for Security
ent://SD_ILS/0/SD_ILS:166011
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Cook, Debra L. author. Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quality of Protection Security Measurements and Metrics
ent://SD_ILS/0/SD_ILS:166159
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Gollmann, Dieter. editor. Massacci, Fabio. editor. Yautsiukhin, Artsiom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multivariate Public Key Cryptosystems
ent://SD_ILS/0/SD_ILS:166190
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Ding, Jintai. author. Gower, Jason E. author. Schmidt, Dieter S. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection and Correlation Challenges and Solutions
ent://SD_ILS/0/SD_ILS:164919
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Kruegel, Christopher. author. Valeur, Fredrik. author. Vigna, Giovanni. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Image and Video Encryption From Digital Rights Management to Secured Personal Communication
ent://SD_ILS/0/SD_ILS:164920
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in E-Learning
ent://SD_ILS/0/SD_ILS:165224
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Weippl, Edgar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Austin Protocol Compiler
ent://SD_ILS/0/SD_ILS:164876
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author McGuire, Tommy M. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptography Principles and Applications
ent://SD_ILS/0/SD_ILS:185185
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Delfs, Hans. author. Knebl, Helmut. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal Correctness of Security Protocols With 62 Figures and 4 Tables
ent://SD_ILS/0/SD_ILS:185368
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Bella, Giampaolo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Concurrent Zero-Knowledge With Additional Background by Oded Goldreich
ent://SD_ILS/0/SD_ILS:183559
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Rosen, Alon. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-32939-0">http://dx.doi.org/10.1007/3-540-32939-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Soft Computing in Computer and Information Science
ent://SD_ILS/0/SD_ILS:529415
2026-01-18T00:08:52Z
2026-01-18T00:08:52Z
Author Wiliński, Antoni. editor. Fray, Imed El. editor. Pejaś, Jerzy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-15147-2">https://doi.org/10.1007/978-3-319-15147-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>