Search Results for Information systems. - Narrowed by: 2008 - Data encryption (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsystems.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-08-27T08:18:43Z Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189347 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Sekar, R. editor.&#160;Pujari, Arun K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188130 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Cramer, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2008 The Cryptographers&rsquo; Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188378 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Malkin, Tal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188624 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Wagner, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188654 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:189188 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Schulzrinne, Henning. editor.&#160;State, Radu. editor.&#160;Niccolini, Saverio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, M&aacute;laga, Spain, October 6-8, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189031 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Jajodia, Sushil. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, M&aacute;laga, Spain, October 3-5, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:189212 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Lopez, Javier. editor.&#160;H&auml;mmerli, Bernhard M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185381 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185674 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Lipp, Peter. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;Koch, Klaus-Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68979-9">http://dx.doi.org/10.1007/978-3-540-68979-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security III ent://SD_ILS/0/SD_ILS:185689 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Techniques and Applications ent://SD_ILS/0/SD_ILS:185738 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Chen, Hsinchun. editor.&#160;Yang, Christopher C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69209-6">http://dx.doi.org/10.1007/978-3-540-69209-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185771 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Rong, Chunming. editor.&#160;Jaatun, Martin Gilje. editor.&#160;Sandnes, Frode Eika. editor.&#160;Yang, Laurence T. editor.&#160;Ma, Jianhua. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185814 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Jahankhani, Hamid. editor.&#160;Revett, Kenneth. editor.&#160;Palmer-Brown, Dominic. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185843 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Mj&oslash;lsnes, Stig F. editor.&#160;Mauw, Sjouke. editor.&#160;Katsikas, Sokratis K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185962 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Mu, Yi. editor.&#160;Susilo, Willy. editor.&#160;Seberry, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185981 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Zamboni, Diego. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185991 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Atluri, Vijay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:186015 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Borisov, Nikita. editor.&#160;Goldberg, Ian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188159 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Canetti, Ran. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188292 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Smart, Nigel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings ent://SD_ILS/0/SD_ILS:188336 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Chen, Liqun. editor.&#160;Mu, Yi. editor.&#160;Susilo, Willy. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188543 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Onieva, Jose A. editor.&#160;Sauveron, Damien. editor.&#160;Chaumette, Serge. editor.&#160;Gollmann, Dieter. editor.&#160;Markantonakis, Konstantinos. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings ent://SD_ILS/0/SD_ILS:188765 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Furnell, Steven. editor.&#160;Katsikas, Sokratis K. editor.&#160;Lioy, Antonio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189234 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Pieprzyk, Josef. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings ent://SD_ILS/0/SD_ILS:189044 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Buchmann, Johannes. editor.&#160;Ding, Jintai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189164 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Solanki, Kaushal. editor.&#160;Sullivan, Kenneth. editor.&#160;Madhow, Upamanyu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet-Security aus Software-Sicht Ein Leitfaden zur Software-Erstellung f&uuml;r sicherheitskritische Bereiche ent://SD_ILS/0/SD_ILS:185643 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Kriha, Walter. author.&#160;Schmitz, Roland. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68906-5">http://dx.doi.org/10.1007/978-3-540-68906-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185647 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Bellovin, Steven M. editor.&#160;Gennaro, Rosario. editor.&#160;Keromytis, Angelos. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188792 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Ostrovsky, Rafail. editor.&#160;Prisco, Roberto. editor.&#160;Visconti, Ivan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188803 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Grimaud, Gilles. editor.&#160;Standaert, Fran&ccedil;ois-Xavier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188832 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Akar, Nail. editor.&#160;Pioro, Michal. editor.&#160;Skianis, Charalabos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188841 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Lippmann, Richard. editor.&#160;Kirda, Engin. editor.&#160;Trachtenberg, Ari. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188588 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:188645 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:188456 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Pei, Dingyi. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;Wu, Chuankun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189304 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Franklin, Matthew K. editor.&#160;Hui, Lucas Chi Kwong. editor.&#160;Wong, Duncan S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189329 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Chowdhury, Dipanwita Roy. editor.&#160;Rijmen, Vincent. editor.&#160;Das, Abhijit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy-Preserving Data Mining Models and Algorithms ent://SD_ILS/0/SD_ILS:166794 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Aggarwal, Charu C. editor.&#160;Yu, Philip S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-70992-5">http://dx.doi.org/10.1007/978-0-387-70992-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Database Security Applications and Trends ent://SD_ILS/0/SD_ILS:166409 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Gertz, Michael. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:166626 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Lee, Wenke. editor.&#160;Wang, Cliff. editor.&#160;Dagon, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Vulnerability Analysis and Defense for the Internet ent://SD_ILS/0/SD_ILS:167162 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Singh, Abhishek. editor.&#160;Singh, Baibhav. editor.&#160;Joseph, Hirosh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:167451 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Mancini, Luigi V. editor.&#160;Pietro, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider Attack and Cyber Security Beyond the Hacker ent://SD_ILS/0/SD_ILS:167459 2024-08-27T08:18:43Z 2024-08-27T08:18:43Z Author&#160;Stolfo, Salvatore J. editor.&#160;Bellovin, Steven M. editor.&#160;Keromytis, Angelos D. editor.&#160;Hershkop, Shlomo. editor.&#160;Smith, Sean W. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>