Search Results for Security. - Narrowed by: SpringerLink (Online service) SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026te$003dILS$0026ps$003d300? 2024-11-15T12:32:50Z Network Security ent://SD_ILS/0/SD_ILS:167094 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Huang, Scott C.-H. editor.&#160;MacCallum, David. editor.&#160;Du, Ding-Zhu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-73821-5">http://dx.doi.org/10.1007/978-0-387-73821-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Informatics ent://SD_ILS/0/SD_ILS:172217 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Yang, Christopher C. editor.&#160;Chau, Michael. editor.&#160;Wang, Jau-Hwang. editor.&#160;Chen, Hsinchun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-1325-8">http://dx.doi.org/10.1007/978-1-4419-1325-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Security Auditing ent://SD_ILS/0/SD_ILS:483467 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Majumdar, Suryadipta. author. (orcid)0000-0002-6501-4214&#160;Madi, Taous. author.&#160;Wang, Yushun. author.&#160;Tabiban, Azadeh. author.&#160;Oqaily, Momen. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-23128-6">https://doi.org/10.1007/978-3-030-23128-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Food Chain Security ent://SD_ILS/0/SD_ILS:205524 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Alpas, Hami. editor.&#160;&Ccedil;&#305;rako&#287;lu, Beyazit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-9558-9">http://dx.doi.org/10.1007/978-90-481-9558-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid Security ent://SD_ILS/0/SD_ILS:518388 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Goel, Sanjay. author.&#160;Hong, Yuan. author.&#160;Papakonstantinou, Vagelis. author.&#160;Kloza, Dariusz. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518388.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6663-4">https://doi.org/10.1007/978-1-4471-6663-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy vs. Security ent://SD_ILS/0/SD_ILS:487072 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Stalla-Bourdillon, Sophie. author.&#160;Phillips, Joshua. author.&#160;Ryan, Mark D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pro Spring Security ent://SD_ILS/0/SD_ILS:330643 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Scarioni, Carlo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330643.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-4819-4">http://dx.doi.org/10.1007/978-1-4302-4819-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Security Management ent://SD_ILS/0/SD_ILS:332865 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Al-Shaer, Ehab. editor.&#160;Ou, Xinming. editor.&#160;Xie, Geoffrey. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332865.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-01433-3">http://dx.doi.org/10.1007/978-3-319-01433-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Apps Security ent://SD_ILS/0/SD_ILS:171688 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Gunasekera, Sheran. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-4063-1">http://dx.doi.org/10.1007/978-1-4302-4063-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Space Security Law ent://SD_ILS/0/SD_ILS:193381 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Abeyratne, Ruwantissa. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16702-7">http://dx.doi.org/10.1007/978-3-642-16702-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Aviation Security Law ent://SD_ILS/0/SD_ILS:191774 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Abeyratne, Ruwantissa. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11703-9">http://dx.doi.org/10.1007/978-3-642-11703-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Infrastructure Security ent://SD_ILS/0/SD_ILS:171884 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Yeung, Alan. author.&#160;Wong, Angus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0166-8">http://dx.doi.org/10.1007/978-1-4419-0166-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Governance ent://SD_ILS/0/SD_ILS:167709 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Solms, S.H. author.&#160;Solms, Rossouw. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-79984-1">http://dx.doi.org/10.1007/978-0-387-79984-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Network Security ent://SD_ILS/0/SD_ILS:165912 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Xiao, Yang. editor.&#160;Shen, Xuemin Sherman. editor.&#160;Du, Ding-Zhu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-33112-6">http://dx.doi.org/10.1007/978-0-387-33112-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Grid Computing Security ent://SD_ILS/0/SD_ILS:184773 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chakrabarti, Anirban. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Internet Security ent://SD_ILS/0/SD_ILS:165679 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Vacca, John R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pro PHP Security ent://SD_ILS/0/SD_ILS:170762 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Snyder, Chris. author.&#160;Southwell, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-0057-4">http://dx.doi.org/10.1007/978-1-4302-0057-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:165113 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Telecommunications Networks ent://SD_ILS/0/SD_ILS:166945 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Traynor, Patrick. author.&#160;McDaniel, Patrick. author.&#160;Porta, Thomas La. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in E-Learning ent://SD_ILS/0/SD_ILS:165224 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Weippl, Edgar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Healthcare Information Security ent://SD_ILS/0/SD_ILS:167753 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Shoniregun, Charles A. author.&#160;Dube, Kudakwashe. author.&#160;Mtenzi, Fredrick. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-84919-5">http://dx.doi.org/10.1007/978-0-387-84919-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Environmental Security and Ecoterrorism ent://SD_ILS/0/SD_ILS:206008 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Alpas, Hami. editor.&#160;Berkowicz, Simon M. editor.&#160;Ermakova, Irina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-1235-5">http://dx.doi.org/10.1007/978-94-007-1235-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radiobiology and Environmental Security ent://SD_ILS/0/SD_ILS:206216 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Mothersill, Carmel E. editor.&#160;Korogodina, Victoria. editor.&#160;Seymour, Colin B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-1939-2">http://dx.doi.org/10.1007/978-94-007-1939-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Security Reduction ent://SD_ILS/0/SD_ILS:399211 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Guo, Fuchun. author.&#160;Susilo, Willy. author. (orcid)0000-0002-1562-5105&#160;Mu, Yi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elements of Computer Security ent://SD_ILS/0/SD_ILS:168393 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-85729-006-9">http://dx.doi.org/10.1007/978-0-85729-006-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:175390 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-Physical Systems Security ent://SD_ILS/0/SD_ILS:399914 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98935-8">https://doi.org/10.1007/978-3-319-98935-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Embedded Devices ent://SD_ILS/0/SD_ILS:172275 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Gebotys, Catherine H. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-1530-6">http://dx.doi.org/10.1007/978-1-4419-1530-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Online Business Security Systems ent://SD_ILS/0/SD_ILS:166641 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Williams, Godfried B. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Federated Learning ent://SD_ILS/0/SD_ILS:520302 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Yu, Shui. author. (orcid)&#160;Cui, Lei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520302.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-8692-5">https://doi.org/10.1007/978-981-19-8692-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider Threats in Cyber Security ent://SD_ILS/0/SD_ILS:172782 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Probst, Christian W. editor.&#160;Hunker, Jeffrey. editor.&#160;Gollmann, Dieter. editor.&#160;Bishop, Matt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Dependability for Ambient Intelligence ent://SD_ILS/0/SD_ILS:167907 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kokolakis, Spyros. editor.&#160;G&oacute;mez, Antonio Ma&ntilde;a. editor.&#160;Spanoudakis, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-88775-3">http://dx.doi.org/10.1007/978-0-387-88775-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:166296 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Bleumer, Gerrit. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:166353 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Liu, Donggang. author.&#160;Ning, Peng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security Policies and Procedures ent://SD_ILS/0/SD_ILS:166393 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Frye, Douglas W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Synchronizing Internet Protocol Security (SIPSec) ent://SD_ILS/0/SD_ILS:166600 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Shoniregun, Charles A. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CryptoGraphics Exploiting Graphics Cards for Security ent://SD_ILS/0/SD_ILS:166011 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Cook, Debra L. author.&#160;Keromytis, Angelos D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep Learning Applications for Cyber Security ent://SD_ILS/0/SD_ILS:486694 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Alazab, Mamoun. editor. (orcid)0000-0002-1928-3704&#160;Tang, MingJian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-13057-2">https://doi.org/10.1007/978-3-030-13057-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Sensors for Safety and Security ent://SD_ILS/0/SD_ILS:336346 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Vaseashta, Ashok. editor.&#160;Khudaverdyan, Surik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336346.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-7003-4">http://dx.doi.org/10.1007/978-94-007-7003-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Environmental Security in the Arctic Ocean ent://SD_ILS/0/SD_ILS:335805 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Berkman, Paul Arthur. editor.&#160;Vylegzhanin, Alexander N. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335805.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-4713-5">http://dx.doi.org/10.1007/978-94-007-4713-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nanodevices and Nanomaterials for Ecological Security ent://SD_ILS/0/SD_ILS:206603 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Shunin, Yuri N. editor.&#160;Kiv, Arnold E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-4119-5">http://dx.doi.org/10.1007/978-94-007-4119-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nuclear Power and Energy Security ent://SD_ILS/0/SD_ILS:205099 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Apikyan, Samuel A. editor.&#160;Diamond, David J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-3504-2">http://dx.doi.org/10.1007/978-90-481-3504-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Energy Options Impact on Regional Security ent://SD_ILS/0/SD_ILS:205526 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Barbir, Frano. editor.&#160;Ulgiati, Sergio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-9565-7">http://dx.doi.org/10.1007/978-90-481-9565-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Energy and Environmental Challenges to Security ent://SD_ILS/0/SD_ILS:170538 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Stec, Stephen. editor.&#160;Baraj, Besnik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-9453-8">http://dx.doi.org/10.1007/978-1-4020-9453-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Threats to Global Water Security ent://SD_ILS/0/SD_ILS:204758 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Jones, J. Anthony A. editor.&#160;Vardanian, Trahel G. editor.&#160;Hakopian, Christina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-2344-5">http://dx.doi.org/10.1007/978-90-481-2344-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integration of Information for Environmental Security ent://SD_ILS/0/SD_ILS:169859 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Coskun, H. Gonca. editor.&#160;Cigizoglu, H. Kerem. editor.&#160;Maktav, M. Derya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-6575-0">http://dx.doi.org/10.1007/978-1-4020-6575-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Geographic Uncertainty in Environmental Security ent://SD_ILS/0/SD_ILS:169807 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Morris, Ashley. editor.&#160;Kokhan, Svitlana. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-6438-8">http://dx.doi.org/10.1007/978-1-4020-6438-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Sensing with Security Applications ent://SD_ILS/0/SD_ILS:169136 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Byrnes, Jim. editor.&#160;Ostheimer, Gerald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4295-7">http://dx.doi.org/10.1007/1-4020-4295-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Space-Air-Ground Integrated Network Security ent://SD_ILS/0/SD_ILS:520466 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Liu, Jianwei. author.&#160;Bai, Lin. author.&#160;Jiang, Chunxiao. author.&#160;Zhang, Wei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520466.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-1125-7">https://doi.org/10.1007/978-981-99-1125-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cognitive Security A System-Scientific Approach ent://SD_ILS/0/SD_ILS:520429 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Huang, Linan. author.&#160;Zhu, Quanyan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520429.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-30709-6">https://doi.org/10.1007/978-3-031-30709-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:487070 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercryptography: Applicable Cryptography for Cyberspace Security ent://SD_ILS/0/SD_ILS:484533 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Smart Grid ent://SD_ILS/0/SD_ILS:399960 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Abdallah, Asmaa. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security for Cyber Physical Systems ent://SD_ILS/0/SD_ILS:401452 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Ali, Saqib. author.&#160;Al Balushi, Taiseera. author.&#160;Nadir, Zia. author.&#160;Hussain, Omar Khadeer. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75880-0">https://doi.org/10.1007/978-3-319-75880-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Micro-Grid Systems Security and Privacy ent://SD_ILS/0/SD_ILS:399573 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kayem, Anne V. D. M. editor.&#160;Wolthusen, Stephen D. editor.&#160;Meinel, Christoph. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security: Power and Technology ent://SD_ILS/0/SD_ILS:401003 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lehto, Martti. editor.&#160;Neittaanm&auml;ki, Pekka. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Proceedings of CSI 2015 ent://SD_ILS/0/SD_ILS:400943 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Bokhari, M. U. editor.&#160;Agrawal, Namrata. editor.&#160;Saini, Dharmendra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dynamic Games for Network Security ent://SD_ILS/0/SD_ILS:401109 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;He, Xiaofan. author.&#160;Dai, Huaiyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and Network Security Essentials ent://SD_ILS/0/SD_ILS:402651 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Daimi, Kevin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Planning An Applied Approach ent://SD_ILS/0/SD_ILS:518720 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lincke, Susan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518720.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-16027-6">https://doi.org/10.1007/978-3-319-16027-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social Networking Mining, Visualization, and Security ent://SD_ILS/0/SD_ILS:486051 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Panda, Mrutyunjaya. editor.&#160;Dehuri, Satchidananda. editor.&#160;Wang, Gi-Nam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05164-2">https://doi.org/10.1007/978-3-319-05164-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Cloud Storage Systems ent://SD_ILS/0/SD_ILS:487858 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Yang, Kan. author.&#160;Jia, Xiaohua. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dynamic Secrets in Communication Security ent://SD_ILS/0/SD_ILS:488222 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Xiao, Sheng. author.&#160;Gong, Weibo. author.&#160;Towsley, Don. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Multi-hop Wireless Networks ent://SD_ILS/0/SD_ILS:485466 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Mahmoud, Mohamed M. E. A. author.&#160;Shen, Xuemin (Sherman). author. (orcid)0000-0002-4140-287X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04603-7">https://doi.org/10.1007/978-3-319-04603-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Communication Communication, Multimedia, Security ent://SD_ILS/0/SD_ILS:489638 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Meinel, Christoph. author.&#160;Sack, Harald. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54331-9">https://doi.org/10.1007/978-3-642-54331-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Primer on Client-Side Web Security ent://SD_ILS/0/SD_ILS:487022 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;De Ryck, Philippe. author.&#160;Desmet, Lieven. author.&#160;Piessens, Frank. author.&#160;Johns, Martin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12226-7">https://doi.org/10.1007/978-3-319-12226-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Expert Oracle Application Express Security ent://SD_ILS/0/SD_ILS:330631 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Spendolini, Scott. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330631.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-4732-6">http://dx.doi.org/10.1007/978-1-4302-4732-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:331005 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331005.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4543-1">http://dx.doi.org/10.1007/978-1-4471-4543-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Security for Cloud Computing ent://SD_ILS/0/SD_ILS:330926 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Pearson, Siani. editor.&#160;Yee, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330926.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4189-1">http://dx.doi.org/10.1007/978-1-4471-4189-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Social Networks ent://SD_ILS/0/SD_ILS:331435 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Altshuler, Yaniv. editor.&#160;Elovici, Yuval. editor.&#160;Cremers, Armin B. editor.&#160;Aharony, Nadav. editor.&#160;Pentland, Alex. editor.<br/>Preferred Shelf Number&#160;ONLINE(331435.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4139-7">http://dx.doi.org/10.1007/978-1-4614-4139-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Iris Biometrics From Segmentation to Template Security ent://SD_ILS/0/SD_ILS:331810 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Rathgeb, Christian. author.&#160;Uhl, Andreas. author.&#160;Wild, Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331810.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5571-4">http://dx.doi.org/10.1007/978-1-4614-5571-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Assessment in Vehicular Networks ent://SD_ILS/0/SD_ILS:332479 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Du, Suguo. author.&#160;Zhu, Haojin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332479.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mining Social Networks and Security Informatics ent://SD_ILS/0/SD_ILS:336224 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;&Ouml;zyer, Tansel. editor.&#160;Erdem, Zeki. editor.&#160;Rokne, Jon. editor.&#160;Khoury, Suheil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336224.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6359-3">http://dx.doi.org/10.1007/978-94-007-6359-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Biometrics ent://SD_ILS/0/SD_ILS:331177 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Campisi, Patrizio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331177.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5230-9">http://dx.doi.org/10.1007/978-1-4471-5230-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Energy Policy and Security ent://SD_ILS/0/SD_ILS:331185 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Leal Filho, Walter. editor.&#160;Voudouris, Vlasios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331185.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5286-6">http://dx.doi.org/10.1007/978-1-4471-5286-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Implantable Medical Devices ent://SD_ILS/0/SD_ILS:332220 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Hei, Xiali. author.&#160;Du, Xiaojiang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332220.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> From Environmental to Comprehensive Security ent://SD_ILS/0/SD_ILS:332789 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Westing, Arthur H. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332789.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-00687-1">http://dx.doi.org/10.1007/978-3-319-00687-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and the Networked Society ent://SD_ILS/0/SD_ILS:332915 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Gregory, Mark A. author.&#160;Glance, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332915.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Network Security Theories and Applications ent://SD_ILS/0/SD_ILS:334222 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chen, Lei. author.&#160;Ji, Jiahuang. author.&#160;Zhang, Zihong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334222.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36511-9">http://dx.doi.org/10.1007/978-3-642-36511-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research on Industrial Security Theory ent://SD_ILS/0/SD_ILS:334329 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Li, Menggang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334329.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36952-0">http://dx.doi.org/10.1007/978-3-642-36952-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Convergence and Security 2012 ent://SD_ILS/0/SD_ILS:336088 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kim, Kuinam J. editor.&#160;Chung, Kyung-Yong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336088.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-5860-5">http://dx.doi.org/10.1007/978-94-007-5860-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Hardware Security and Trust ent://SD_ILS/0/SD_ILS:173063 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Tehranipoor, Mohammad. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-8080-9">http://dx.doi.org/10.1007/978-1-4419-8080-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Farming for Food and Water Security ent://SD_ILS/0/SD_ILS:206668 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lichtfouse, Eric. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-4500-1">http://dx.doi.org/10.1007/978-94-007-4500-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence for Privacy and Security ent://SD_ILS/0/SD_ILS:195887 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Elizondo, David A. editor.&#160;Solanas, Agusti. editor.&#160;Martinez-Balleste, Antoni. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25237-2">http://dx.doi.org/10.1007/978-3-642-25237-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Operational Semantics and Verification of Security Protocols ent://SD_ILS/0/SD_ILS:188195 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Cremers, Cas. author.&#160;Mauw, Sjouke. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78636-8">http://dx.doi.org/10.1007/978-3-540-78636-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Subjective Well-Being and Security ent://SD_ILS/0/SD_ILS:206315 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Webb, Dave. editor.&#160;Wills-Herrera, Eduardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-2278-1">http://dx.doi.org/10.1007/978-94-007-2278-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Social Networks Security and Privacy ent://SD_ILS/0/SD_ILS:173527 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Abraham, Ajith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4051-1">http://dx.doi.org/10.1007/978-1-4471-4051-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Photosensitizers in Medicine, Environment, and Security ent://SD_ILS/0/SD_ILS:205206 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Nyokong, Tebello. editor.&#160;Ahsen, Vefa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-3872-2">http://dx.doi.org/10.1007/978-90-481-3872-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transmission Grid Security A PSA Approach ent://SD_ILS/0/SD_ILS:168435 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Haarla, Liisa. author.&#160;Koskinen, Mikko. author.&#160;Hirvonen, Ritva. author.&#160;Labeau, Pierre-Etienne. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-85729-145-5">http://dx.doi.org/10.1007/978-0-85729-145-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security for Automatic Speaker Identification ent://SD_ILS/0/SD_ILS:173281 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;El-Samie, Fathi E. Abd. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-9698-5">http://dx.doi.org/10.1007/978-1-4419-9698-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:172455 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;van Tilborg, Henk C. A. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> European Perspectives on Security Research ent://SD_ILS/0/SD_ILS:193832 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Thoma, Klaus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-18219-8">http://dx.doi.org/10.1007/978-3-642-18219-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CyberForensics Understanding Information Security Investigations ent://SD_ILS/0/SD_ILS:175048 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Bayuk, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-60761-772-3">http://dx.doi.org/10.1007/978-1-60761-772-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economics of Information Security and Privacy ent://SD_ILS/0/SD_ILS:172736 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Moore, Tyler. editor.&#160;Pym, David. editor.&#160;Ioannidis, Christos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-6967-5">http://dx.doi.org/10.1007/978-1-4419-6967-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Towards Hardware-Intrinsic Security Foundations and Practice ent://SD_ILS/0/SD_ILS:192659 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14452-3">http://dx.doi.org/10.1007/978-3-642-14452-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Information and Communication Security ent://SD_ILS/0/SD_ILS:190841 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Stavroulakis, Peter. editor.&#160;Stamp, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of FPGA Design Security ent://SD_ILS/0/SD_ILS:205415 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Huffmire, Ted. author.&#160;Irvine, Cynthia. author.&#160;Nguyen, Thuy D. author.&#160;Levin, Timothy. author.&#160;Kastner, Ryan. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-9157-4">http://dx.doi.org/10.1007/978-90-481-9157-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Multimedia Analysis for Security Applications ent://SD_ILS/0/SD_ILS:191792 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Sencar, Husrev Taha. editor.&#160;Velastin, Sergio. editor.&#160;Nikolaidis, Nikolaos. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11756-5">http://dx.doi.org/10.1007/978-3-642-11756-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Source Systems Security Certification ent://SD_ILS/0/SD_ILS:167460 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Damiani, Ernesto. author.&#160;Ardagna, Claudio Agostino. author.&#160;El Ioini, Nabil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77324-7">http://dx.doi.org/10.1007/978-0-387-77324-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Engineering for Service-Oriented Architectures ent://SD_ILS/0/SD_ILS:188468 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Hafner, Michael. author.&#160;Breu, Ruth. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79539-1">http://dx.doi.org/10.1007/978-3-540-79539-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Technology Applications, Management, and Security ent://SD_ILS/0/SD_ILS:166880 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Powell, Steven. editor.&#160;Shim, J.P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-71787-6">http://dx.doi.org/10.1007/978-0-387-71787-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:175855 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kizza, Joseph Migga. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-917-2">http://dx.doi.org/10.1007/978-1-84800-917-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:166626 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lee, Wenke. editor.&#160;Wang, Cliff. editor.&#160;Dagon, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network-Aware Security for Group Communications ent://SD_ILS/0/SD_ILS:166640 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Sun, Yan. author.&#160;Trappe, Wade. author.&#160;Liu, K. J. R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68848-0">http://dx.doi.org/10.1007/978-0-387-68848-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:166922 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Mayes, Keith E. author.&#160;Markantonakis, Konstantinos. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> New Technologies, Mobility and Security ent://SD_ILS/0/SD_ILS:169739 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Labiod, Houda. editor.&#160;Badra, Mohamad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-6270-4">http://dx.doi.org/10.1007/978-1-4020-6270-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing Information Systems Security and Privacy ent://SD_ILS/0/SD_ILS:181654 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Tr&#269;ek, Denis. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-28104-5">http://dx.doi.org/10.1007/3-540-28104-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Wireless Network Security ent://SD_ILS/0/SD_ILS:165680 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Vacca, John R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quality of Protection Security Measurements and Metrics ent://SD_ILS/0/SD_ILS:166159 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Gollmann, Dieter. editor.&#160;Massacci, Fabio. editor.&#160;Yautsiukhin, Artsiom. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:164930 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Tilborg, Henk C. A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Processing and Security Systems ent://SD_ILS/0/SD_ILS:165266 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Saeed, Khalid. editor.&#160;Peja&#347;, Jerzy. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137371">http://dx.doi.org/10.1007/b137371</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social Security, Demographics, and Risk ent://SD_ILS/0/SD_ILS:180903 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Borgmann, Christoph. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137963">http://dx.doi.org/10.1007/b137963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optical and Digital Techniques for Information Security ent://SD_ILS/0/SD_ILS:165090 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Javidi, Bahram. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105098">http://dx.doi.org/10.1007/b105098</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Water and Food Security in Central Asia ent://SD_ILS/0/SD_ILS:205647 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Madramootoo, Chandra. editor.&#160;Dukhovny, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-9974-7">http://dx.doi.org/10.1007/978-90-481-9974-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of Industrial Water Supply and Management ent://SD_ILS/0/SD_ILS:206180 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Atimtay, Aysel T. editor.&#160;Sikdar, Subhas K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-1805-0">http://dx.doi.org/10.1007/978-94-007-1805-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Environmental Sustainability of Multimodal Transport ent://SD_ILS/0/SD_ILS:205247 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Bell, Michael. editor.&#160;Hosseinloo, Solmaz Haji. editor.&#160;Kanturska, Urszula. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-8563-4">http://dx.doi.org/10.1007/978-90-481-8563-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Materials for Energy, Communications and Security ent://SD_ILS/0/SD_ILS:170327 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Luk'yanchuk, Igor A. editor.&#160;Mezzane, Daoud. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-8796-7">http://dx.doi.org/10.1007/978-1-4020-8796-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Extreme Hydrological Events: New Concepts for Security ent://SD_ILS/0/SD_ILS:169581 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Vasiliev, O.F. editor.&#160;van Gelder, P.H.A.J.M. editor.&#160;Plate, E.J. editor.&#160;Bolgov, M.V. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-5741-0">http://dx.doi.org/10.1007/978-1-4020-5741-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Threats to Energy Security and Stability ent://SD_ILS/0/SD_ILS:168932 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;McPherson, Hugo. editor.&#160;Duncan Wood, W. editor.&#160;Robinson, Derek M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-3567-5">http://dx.doi.org/10.1007/1-4020-3567-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2018 21st International Conference, Seoul, South Korea, November 28&ndash;30, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483841 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28&ndash;30, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484666 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751&#160;Yagi, Takeshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484908 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lin, Zhiqiang. editor.&#160;Papamanthou, Charalampos. editor.&#160;Polychronakis, Michalis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23&ndash;27, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484909 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Sako, Kazue. editor.&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29959-0">https://doi.org/10.1007/978-3-030-29959-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23&ndash;27, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484910 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Sako, Kazue. editor.&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29962-0">https://doi.org/10.1007/978-3-030-29962-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2019 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2&ndash;4, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484918 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Schwabe, Peter. editor.&#160;Th&eacute;riault, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30530-7">https://doi.org/10.1007/978-3-030-30530-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485829 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Guo, Fuchun. editor. (orcid)0000-0001-6939-7710&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security, Protocols, and Equational Reasoning Essays Dedicated to Catherine A. Meadows ent://SD_ILS/0/SD_ILS:486057 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Guttman, Joshua D. editor.&#160;Landwehr, Carl E. editor.&#160;Meseguer, Jos&eacute;. editor.&#160;Pavlovic, Dusko. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-19052-1">https://doi.org/10.1007/978-3-030-19052-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13&ndash;15, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486285 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Zincir-Heywood, Nur. editor.&#160;Bonfante, Guillaume. editor.&#160;Debbabi, Mourad. editor. (orcid)0000-0003-3015-3043&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-18419-3">https://doi.org/10.1007/978-3-030-18419-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 16th International Conference, TrustBus 2019, Linz, Austria, August 26&ndash;29, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486318 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Gritzalis, Stefanos. editor.&#160;Weippl, Edgar R. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Anderst-Kotsis, Gabriele. editor.&#160;Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-27813-7">https://doi.org/10.1007/978-3-030-27813-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18&ndash;22, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486319 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Goldberg, Ian. editor.&#160;Moore, Tyler. editor. (orcid)0000-0002-8771-8191&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486636 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24274-9">https://doi.org/10.1007/978-3-030-24274-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486706 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Liu, Joseph K. editor. (orcid)0000-0001-6656-6240&#160;Huang, Xinyi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36938-5">https://doi.org/10.1007/978-3-030-36938-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 &ndash; November 1, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487069 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Alpcan, Tansu. editor. (orcid)0000-0002-7434-3239&#160;Vorobeychik, Yevgeniy. editor. (orcid)0000-0003-2471-5345&#160;Baras, John S. editor. (orcid)0000-0002-4955-8561&#160;D&aacute;n, Gy&ouml;rgy. editor. (orcid)0000-0002-4876-0223&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-32430-8">https://doi.org/10.1007/978-3-030-32430-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Graphical Models for Security 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers ent://SD_ILS/0/SD_ILS:482709 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Albanese, Massimiliano. editor. (orcid)0000-0002-2675-5810&#160;Horne, Ross. editor. (orcid)0000-0003-0162-1901&#160;Probst, Christian W. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36537-0">https://doi.org/10.1007/978-3-030-36537-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483024 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Hamid, Brahim. editor.&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053&#160;Shabtai, Asaf. editor. (orcid)0000-0003-0630-4059&#160;Elovici, Yuval. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Science of Cyber Security Second International Conference, SciSec 2019, Nanjing, China, August 9&ndash;11, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483209 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Liu, Feng. editor.&#160;Xu, Jia. editor.&#160;Xu, Shouhuai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34637-9">https://doi.org/10.1007/978-3-030-34637-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483391 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814&#160;Ant&oacute;n, Annie. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22&ndash;24, 2019, Proceedings - In Honor of Said El Hajji ent://SD_ILS/0/SD_ILS:483462 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Carlet, Claude. editor.&#160;Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534&#160;Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757&#160;Souidi, El Mamoun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484047 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432&#160;Deng, Robert. editor. (orcid)0000-0003-3491-8146&#160;Li, Zhou. editor.&#160;Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484186 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Dolev, Shlomi. editor.&#160;Hendler, Danny. editor.&#160;Lodha, Sachin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1&ndash;3, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484239 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Vaidya, Jaideep. editor.&#160;Zhang, Xiao. editor.&#160;Li, Jin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-37337-5">https://doi.org/10.1007/978-3-030-37337-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura&ccedil;ao, March 2, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484585 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Zohar, Aviv. editor.&#160;Eyal, Ittay. editor.&#160;Teague, Vanessa. editor. (orcid)0000-0003-2648-2565&#160;Clark, Jeremy. editor.&#160;Bracciali, Andrea. editor. (orcid)0000-0003-1451-9260<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-58820-8">https://doi.org/10.1007/978-3-662-58820-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning for Cyber Security Second International Conference, ML4CS 2019, Xi&rsquo;an, China, September 19-21, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484720 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chen, Xiaofeng. editor.&#160;Huang, Xinyi. editor.&#160;Zhang, Jun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30619-9">https://doi.org/10.1007/978-3-030-30619-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:484959 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34618-8">https://doi.org/10.1007/978-3-030-34618-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484960 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 19th International Conference, WISA 2018, Jeju Island, Korea, August 23&ndash;25, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485283 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006&#160;Jang, JinSoo. editor. (orcid)0000-0003-2070-2408&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17982-3">https://doi.org/10.1007/978-3-030-17982-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26&ndash;27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485420 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Mauw, Sjouke. editor. (orcid)0000-0002-2818-4433&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-31511-5">https://doi.org/10.1007/978-3-030-31511-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485944 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Cybenko, George. editor. (orcid)0000-0001-7734-2912&#160;Pym, David. editor. (orcid)0000-0002-6504-5838&#160;Fila, Barbara. editor. (orcid)0000-0002-1824-7621&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 18th International Conference, CANS 2019, Fuzhou, China, October 25&ndash;27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486218 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Mu, Yi. editor. (orcid)0000-0002-1637-845X&#160;Deng, Robert H. editor. (orcid)0000-0003-3491-8146&#160;Huang, Xinyi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-31578-8">https://doi.org/10.1007/978-3-030-31578-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8&ndash;9, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486352 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941&#160;Toma, Cristian. editor. (orcid)0000-0001-9316-7739&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26&ndash;28, 2019, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:486379 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26&ndash;28, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:486380 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2017 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20&ndash;22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486418 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lange, Tanja. editor.&#160;Dunkelman, Orr. editor. (orcid)0000-0001-5799-2635&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25283-0">https://doi.org/10.1007/978-3-030-25283-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:486576 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24265-7">https://doi.org/10.1007/978-3-030-24265-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486944 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349&#160;Lampropoulos, Konstantinos. editor.&#160;Mar&iacute;n Tordera, Eva. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3&ndash;5, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486956 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X&#160;Guo, Fuchun. editor. (orcid)0000-0001-6939-7710&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1&ndash;4, 2019, Proceedings ent://SD_ILS/0/SD_ILS:482878 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Steinfeld, Ron. editor. (orcid)0000-0003-1745-4183&#160;Yuen, Tsz Hon. editor. (orcid)0000-0002-0629-6792&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-31919-9">https://doi.org/10.1007/978-3-030-31919-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483099 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131&#160;Lopez, Javier. editor. (orcid)0000-0001-8066-9991&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483504 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Deng, Robert H. editor. (orcid)0000-0003-3491-8146&#160;Gauthier-Uma&ntilde;a, Val&eacute;rie. editor. (orcid)0000-0003-0909-7091&#160;Ochoa, Mart&iacute;n. editor. (orcid)0000-0002-7816-5775&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:483569 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34578-5">https://doi.org/10.1007/978-3-030-34578-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Control- and Game-Theoretic Approaches to Cyber Security ent://SD_ILS/0/SD_ILS:483947 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Cybenko, George. editor.&#160;Liu, Peng. editor.&#160;Wang, Cliff. editor.&#160;Wellman, Michael. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30719-6">https://doi.org/10.1007/978-3-030-30719-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1&ndash;3, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484089 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Vaidya, Jaideep. editor.&#160;Zhang, Xiao. editor.&#160;Li, Jin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-37352-8">https://doi.org/10.1007/978-3-030-37352-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484061 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Luiijf, Eric. editor. (orcid)0000-0002-1821-9890&#160;&#381;utautait&#279;, Inga. editor. (orcid)0000-0002-6073-2823&#160;H&auml;mmerli, Bernhard M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484509 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Garg, Deepak. editor. (orcid)0000-0002-0888-3093&#160;Kumar, N. V. Narendra. editor.&#160;Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10&ndash;11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484518 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Blazy, Olivier. editor. (orcid)0000-0001-6205-8249&#160;Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6&ndash;11, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484523 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Nielson, Flemming. editor. (orcid)0000-0001-7362-6176&#160;Sands, David. editor. (orcid)0000-0001-6221-0503&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17138-4">https://doi.org/10.1007/978-3-030-17138-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:399086 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03329-3">https://doi.org/10.1007/978-3-030-03329-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399111 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Baek, Joonsang. editor.&#160;Susilo, Willy. editor.&#160;Kim, Jongkil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01446-9">https://doi.org/10.1007/978-3-030-01446-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29&ndash;31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399114 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Bushnell, Linda. editor. (orcid)0000-0002-8751-2409&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;Ba&#351;ar, Tamer. editor. (orcid)0000-0003-4406-7875&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01554-1">https://doi.org/10.1007/978-3-030-01554-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 16th International Conference, CANS 2017, Hong Kong, China, November 30&mdash;December 2, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399347 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Capkun, Srdjan. editor.&#160;Chow, Sherman S. M. editor. (orcid)0000-0001-7306-453X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02641-7">https://doi.org/10.1007/978-3-030-02641-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399972 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Su, Chunhua. editor.&#160;Kikuchi, Hiroaki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399906 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983&#160;Rebeiro, Chester. editor. (orcid)0000-0001-8063-0026&#160;Yarom, Yuval. editor. (orcid)0000-0003-0401-4197&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399923 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03326-2">https://doi.org/10.1007/978-3-030-03326-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399995 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335&#160;Scala, Antonio. editor. (orcid)0000-0002-3414-2686&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 17th International Conference, CANS 2018, Naples, Italy, September 30 &ndash; October 3, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399945 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Camenisch, Jan. editor. (orcid)0000-0001-6654-9459&#160;Papadimitratos, Panos. editor. (orcid)0000-0002-3267-5374&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00434-7">https://doi.org/10.1007/978-3-030-00434-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400052 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Naccache, David. editor. (orcid)0000-0002-8651-6555&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Qing, Sihan. editor.&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620&#160;Blanc, Gregory. editor. (orcid)0000-0001-8150-6617<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01950-1">https://doi.org/10.1007/978-3-030-01950-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401614 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kim, Howon. editor.&#160;Kim, Dong-Chan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401992 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Yang, Guomin. editor. (orcid)0000-0002-4949-7738&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402017 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Imine, Abdessamad. editor.&#160;Fernandez, Jos&eacute; M. editor. (orcid)0000-0001-9836-3595&#160;Marion, Jean-Yves. editor.&#160;Logrippo, Luigi. editor. (orcid)0000-0001-8804-0450&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399425 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Liu, Feng. editor.&#160;Xu, Shouhuai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:399545 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03332-3">https://doi.org/10.1007/978-3-030-03332-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29&ndash;31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400077 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Castiglione, Arcangelo. editor.&#160;Pop, Florin. editor.&#160;Ficco, Massimo. editor.&#160;Palmieri, Francesco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400111 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Inomata, Atsuo. editor.&#160;Yasuda, Kan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5&ndash;6, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400113 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;Mouratidis, Haralambos. editor. (orcid)0000-0002-2599-0712&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400135 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Au, Man Ho. editor. (orcid)0000-0003-2068-9530&#160;Yiu, Siu Ming. editor.&#160;Li, Jin. editor.&#160;Luo, Xiapu. editor.&#160;Wang, Cong. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02744-5">https://doi.org/10.1007/978-3-030-02744-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400194 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Manulis, Mark. editor. (orcid)0000-0002-1512-9670&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXVI 26th International Workshop, Cambridge, UK, March 19&ndash;21, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400277 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;&Scaron;venda, Petr. editor.&#160;Stajano, Frank. editor.&#160;Christianson, Bruce. editor.&#160;Anderson, Jonathan. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03251-7">https://doi.org/10.1007/978-3-030-03251-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400247 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Ganapathy, Vinod. editor.&#160;Jaeger, Trent. editor.&#160;Shyamasundar, R.K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400786 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Qing, Sihan. editor.&#160;Mitchell, Chris. editor.&#160;Chen, Liqun. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3&ndash;5, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400830 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chen, Xiaofeng. editor.&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401682 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006&#160;Kim, Taesoo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399445 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Cremers, Cas. editor. (orcid)0000-0003-0322-2293&#160;Lehmann, Anja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21&ndash;22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399450 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Dinur, Itai. editor.&#160;Dolev, Shlomi. editor.&#160;Lodha, Sachin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399699 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:399718 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399614 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Catalano, Dario. editor.&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday ent://SD_ILS/0/SD_ILS:399827 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620&#160;Ray, Indrajit. editor.&#160;Ray, Indrakshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 22nd International Conference, FC 2018, Nieuwpoort, Cura&ccedil;ao, February 26 &ndash; March 2, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399957 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Meiklejohn, Sarah. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-58387-6">https://doi.org/10.1007/978-3-662-58387-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 14th International Workshop, STM 2018, Barcelona, Spain, September 6&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400513 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01141-3">https://doi.org/10.1007/978-3-030-01141-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400640 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Bauer, Lujo. editor.&#160;K&uuml;sters, Ralf. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-89722-6">https://doi.org/10.1007/978-3-319-89722-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401487 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651&#160;Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28&ndash;29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402215 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Hancke, Gerhard P. editor.&#160;Damiani, Ernesto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401940 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lambrinoudakis, Costas. editor.&#160;Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402524 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Liu, Peng. editor.&#160;Mauw, Sjouke. editor.&#160;Stolen, Ketil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74860-3">https://doi.org/10.1007/978-3-319-74860-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:518841 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Iwata, Tetsu. editor.&#160;Cheon, Jung Hee. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518841.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-48797-6">https://doi.org/10.1007/978-3-662-48797-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518843 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Tanaka, Keisuke. editor.&#160;Suga, Yuji. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518843.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-22425-1">https://doi.org/10.1007/978-3-319-22425-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings ent://SD_ILS/0/SD_ILS:518845 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Desmedt, Yvo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518845.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-27659-5">https://doi.org/10.1007/978-3-319-27659-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings ent://SD_ILS/0/SD_ILS:518854 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Jajoda, Sushil. editor.&#160;Mazumdar, Chandan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518854.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-26961-0">https://doi.org/10.1007/978-3-319-26961-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518856 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Hui, Lucas C. K. editor.&#160;Qing, S. H. editor.&#160;Shi, Elaine. editor.&#160;Yiu, S. M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518856.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21966-0">https://doi.org/10.1007/978-3-319-21966-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518860 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chen, Liqun. editor.&#160;Matsuo, Shin'ichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518860.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-27152-1">https://doi.org/10.1007/978-3-319-27152-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518770 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Foo, Ernest. editor.&#160;Stebila, Douglas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518770.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-19962-7">https://doi.org/10.1007/978-3-319-19962-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518785 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518785.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-16745-9">https://doi.org/10.1007/978-3-319-16745-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518790 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lauter, Kristin. editor.&#160;Rodr&iacute;guez-Henr&iacute;quez, Francisco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518790.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-22174-8">https://doi.org/10.1007/978-3-319-22174-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florian&oacute;polis, Brazil, September 17-19, 2014 Revised Selected Papers ent://SD_ILS/0/SD_ILS:518796 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Aranha, Diego F. editor.&#160;Menezes, Alfred. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518796.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-16295-9">https://doi.org/10.1007/978-3-319-16295-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:518827 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Pernul, G&uuml;nther. editor.&#160;Y A Ryan, Peter. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518827.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24174-6">https://doi.org/10.1007/978-3-319-24174-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:519298 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Herrera-Joancomart&iacute;, Jordi. editor.&#160;Lupu, Emil. editor.&#160;Posegga, Joachim. editor.&#160;Aldini, Alessandro. editor. (orcid)<br/>Preferred Shelf Number&#160;XX(519298.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-17016-9">https://doi.org/10.1007/978-3-319-17016-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519305 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Eisenbarth, Thomas. editor.&#160;&Ouml;zt&uuml;rk, Erdin&ccedil;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519305.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-16363-5">https://doi.org/10.1007/978-3-319-16363-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519308 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Schwabe, Peter. editor.&#160;Solworth, Jon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519308.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24126-5">https://doi.org/10.1007/978-3-319-24126-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Accountability and Security in the Cloud First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures ent://SD_ILS/0/SD_ILS:518748 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Felici, Massimo. editor.&#160;Fern&aacute;ndez-Gago, Carmen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518748.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-17199-9">https://doi.org/10.1007/978-3-319-17199-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518943 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Lambrinoudakis, Costas. editor.&#160;L&oacute;pez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518943.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-22906-5">https://doi.org/10.1007/978-3-319-22906-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:518966 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Iwata, Tetsu. editor.&#160;Cheon, Jung Hee. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518966.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-48800-3">https://doi.org/10.1007/978-3-662-48800-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519197 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Qiu, Meikang. editor.&#160;Xu, Shouhuai. editor.&#160;Yung, Moti. editor.&#160;Zhang, Haibo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519197.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-25645-0">https://doi.org/10.1007/978-3-319-25645-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518754 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Christianson, Bruce. editor.&#160;&Scaron;venda, Petr. editor.&#160;Matyas, Vashek. editor.&#160;Malcolm, James. editor.&#160;Stajano, Frank. editor.<br/>Preferred Shelf Number&#160;XX(518754.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-26096-9">https://doi.org/10.1007/978-3-319-26096-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518758 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Foresti, Sara. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518758.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24858-5">https://doi.org/10.1007/978-3-319-24858-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518872 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Ors, Berna. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518872.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21356-9">https://doi.org/10.1007/978-3-319-21356-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518886 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Reiter, Michael. editor.&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518886.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-26823-1">https://doi.org/10.1007/978-3-319-26823-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518908 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Okamoto, Tatsuaki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518908.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-47854-7">https://doi.org/10.1007/978-3-662-47854-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:518911 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Bica, Ion. editor.&#160;Naccache, David. editor.&#160;Simion, Emil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518911.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-27179-8">https://doi.org/10.1007/978-3-319-27179-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings ent://SD_ILS/0/SD_ILS:519003 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lehmann, Anja. editor.&#160;Wolf, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519003.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-17470-9">https://doi.org/10.1007/978-3-319-17470-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519017 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Khouzani, Arman (MHR). editor.&#160;Panaousis, Emmanouil. editor.&#160;Theodorakopoulos, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519017.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-25594-1">https://doi.org/10.1007/978-3-319-25594-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519069 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lopez, Javier. editor.&#160;Mitchell, Chris J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519069.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-23318-5">https://doi.org/10.1007/978-3-319-23318-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:519085 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Garcia-Alfaro, Joaquin. editor.&#160;Zincir Heywood, Nur. editor.&#160;Fong, Philip W. L. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519085.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-17040-4">https://doi.org/10.1007/978-3-319-17040-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings ent://SD_ILS/0/SD_ILS:519094 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chau, Michael. editor.&#160;Wang, G. Alan. editor.&#160;Chen, Hsinchun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519094.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-18455-5">https://doi.org/10.1007/978-3-319-18455-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519095 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Malkin, Tal. editor.&#160;Kolesnikov, Vladimir. editor.&#160;Lewko, Allison. editor.&#160;Polychronakis, Michalis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519095.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28166-7">https://doi.org/10.1007/978-3-319-28166-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:519107 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Rhee, Kyung-Hyune. editor.&#160;Yi, Jeong Hyun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519107.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-15087-1">https://doi.org/10.1007/978-3-319-15087-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519232 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lee, Jooyoung. editor.&#160;Kim, Jongsung. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519232.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-15943-0">https://doi.org/10.1007/978-3-319-15943-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519253 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lopez, Javier. editor.&#160;Wu, Yongdong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519253.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-17533-1">https://doi.org/10.1007/978-3-319-17533-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger ent://SD_ILS/0/SD_ILS:519257 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;El Hajji, Said. editor.&#160;Nitaj, Abderrahmane. editor.&#160;Carlet, Claude. editor.&#160;Souidi, El Mamoun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519257.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-18681-8">https://doi.org/10.1007/978-3-319-18681-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519261 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Au, Man-Ho. editor.&#160;Miyaji, Atsuko. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519261.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-26059-4">https://doi.org/10.1007/978-3-319-26059-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:519267 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Pernul, G&uuml;nther. editor.&#160;Y A Ryan, Peter. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519267.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24177-7">https://doi.org/10.1007/978-3-319-24177-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519217 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Brenner, Michael. editor.&#160;Christin, Nicolas. editor.&#160;Johnson, Benjamin. editor.&#160;Rohloff, Kurt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519217.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-48051-9">https://doi.org/10.1007/978-3-662-48051-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519227 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Focardi, Riccardo. editor.&#160;Myers, Andrew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519227.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46666-7">https://doi.org/10.1007/978-3-662-46666-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:519325 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Akram, Raja Naeem. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519325.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24018-3">https://doi.org/10.1007/978-3-319-24018-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485743 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Gritzalis, Dimitris. editor.&#160;Kiayias, Aggelos. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12280-9">https://doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485793 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chow, Sherman S.M. editor.&#160;Camenisch, Jan. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485842 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chen, Liqun. editor.&#160;Mitchell, Chris. editor. (orcid)0000-0002-6118-0055&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14054-4">https://doi.org/10.1007/978-3-319-14054-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486671 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Saxena, Nitesh. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13066-8">https://doi.org/10.1007/978-3-319-13066-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:486912 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Matyas, Vashek. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487278 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:487789 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11212-1">https://doi.org/10.1007/978-3-319-11212-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487826 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;&Scaron;venda, Petr. editor.&#160;Stajano, Frank. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12400-1">https://doi.org/10.1007/978-3-319-12400-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487762 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Danger, Jean Luc. editor.&#160;Debbabi, Mourad. editor.&#160;Marion, Jean-Yves. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Zincir Heywood, Nur. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05302-8">https://doi.org/10.1007/978-3-319-05302-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488984 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Christin, Nicolas. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488986 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lee, Hyang-Sook. editor.&#160;Han, Dong-Guk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:488996 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Aldini, Alessandro. editor.&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489016 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489026 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Mauw, Sjouke. editor.&#160;Damsgaard Jensen, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489033 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;Saad, Walid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12601-2">https://doi.org/10.1007/978-3-319-12601-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489038 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Cuellar, Jorge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10329-7">https://doi.org/10.1007/978-3-319-10329-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:489123 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11203-9">https://doi.org/10.1007/978-3-319-11203-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:489420 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Padr&oacute;, Carles. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485513 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Huang, Xinyi. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485531 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chau, Michael. editor.&#160;Chen, Hsinchun. editor.&#160;Wang, G. Alan. editor.&#160;Wang, Jau-Hwang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06677-6">https://doi.org/10.1007/978-3-319-06677-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486887 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kim, Yongdae. editor.&#160;Lee, Heejo. editor.&#160;Perrig, Adrian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05149-9">https://doi.org/10.1007/978-3-319-05149-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487372 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Yoshida, Maki. editor.&#160;Mouri, Koichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487487 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;De Decker, Bart. editor.&#160;Z&uacute;quete, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488916 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Boureanu, Ioana. editor.&#160;Owesarski, Philippe. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488918 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Chow, Sherman S.M. editor.&#160;Liu, Joseph K. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489070 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Lioudakis, Georgios. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Foley, Simon. editor.&#160;Fitzgerald, William M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54568-9">https://doi.org/10.1007/978-3-642-54568-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489091 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Au, Man Ho. editor.&#160;Carminati, Barbara. editor.&#160;Kuo, C.-C. Jay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11698-3">https://doi.org/10.1007/978-3-319-11698-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489108 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lin, Dongdai. editor.&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489541 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Naccache, David. editor.&#160;Sauveron, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489545 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Prakash, Atul. editor.&#160;Shyamasundar, Rudrapatna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:484564 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488947 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Eckert, Claudia. editor.&#160;Katsikas, Sokratis K. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09770-1">https://doi.org/10.1007/978-3-319-09770-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II ent://SD_ILS/0/SD_ILS:488956 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488957 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45921-8">https://doi.org/10.1007/978-3-662-45921-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488971 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Brenner, Michael. editor.&#160;Moore, Tyler. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489471 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Abadi, Mart&iacute;n. editor.&#160;Kremer, Steve. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54792-8">https://doi.org/10.1007/978-3-642-54792-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Risk Analysis for Intelligent Edge Computing ent://SD_ILS/0/SD_ILS:520470 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Srivastava, Gautam. editor.&#160;Ghosh, Uttam. editor.&#160;Lin, Jerry Chun-Wei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520470.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-28150-1">https://doi.org/10.1007/978-3-031-28150-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Reflecting Surface-Aided Physical-Layer Security ent://SD_ILS/0/SD_ILS:520702 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Shu, Feng. author.&#160;Wang, Jiangzhou. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520702.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41812-9">https://doi.org/10.1007/978-3-031-41812-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of War for Computer Security ent://SD_ILS/0/SD_ILS:483808 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Madsen, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Control Systems Security and Resiliency Practice and Theory ent://SD_ILS/0/SD_ILS:484767 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Rieger, Craig. editor.&#160;Ray, Indrajit. editor.&#160;Zhu, Quanyan. editor.&#160;Haney, Michael A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-18214-4">https://doi.org/10.1007/978-3-030-18214-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet of Things Security and Data Protection ent://SD_ILS/0/SD_ILS:485847 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Ziegler, S&eacute;bastien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04984-3">https://doi.org/10.1007/978-3-030-04984-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Big Data and IoT Security ent://SD_ILS/0/SD_ILS:485849 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Dehghantanha, Ali. editor. (orcid)0000-0002-9294-7554&#160;Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10543-3">https://doi.org/10.1007/978-3-030-10543-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ubiquitous Computing and Computing Security of IoT ent://SD_ILS/0/SD_ILS:482645 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Jeyanthi, N. editor.&#160;Abraham, Ajith. editor.&#160;Mcheick, Hamid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01566-4">https://doi.org/10.1007/978-3-030-01566-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disruptive Technologies for the Militaries and Security ent://SD_ILS/0/SD_ILS:485215 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Lele, Ajey. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-3384-2">https://doi.org/10.1007/978-981-13-3384-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-Physical Systems: Architecture, Security and Application ent://SD_ILS/0/SD_ILS:485517 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Guo, Song. editor.&#160;Zeng, Deze. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92564-6">https://doi.org/10.1007/978-3-319-92564-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Learning-based VANET Communication and Security Techniques ent://SD_ILS/0/SD_ILS:483960 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Xiao, Liang. author.&#160;Zhuang, Weihua. author.&#160;Zhou, Sheng. author.&#160;Chen, Cailian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01731-6">https://doi.org/10.1007/978-3-030-01731-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Convergence and Security 2017 Volume 1 ent://SD_ILS/0/SD_ILS:400069 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kim, Kuinam J. editor.&#160;Kim, Hyuncheol. editor.&#160;Baek, Nakhoon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Convergence and Security 2017 Volume 2 ent://SD_ILS/0/SD_ILS:402118 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kim, Kuinam J. editor.&#160;Kim, Hyuncheol. editor.&#160;Baek, Nakhoon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical Layer Security in Wireless Cooperative Networks ent://SD_ILS/0/SD_ILS:398980 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Wang, Li. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61863-0">https://doi.org/10.1007/978-3-319-61863-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Security Assurance for Cloud Computing ent://SD_ILS/0/SD_ILS:518390 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Zhu, Shao Ying. editor.&#160;Hill, Richard. editor.&#160;Trovati, Marcello. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518390.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-25988-8">https://doi.org/10.1007/978-3-319-25988-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy for Mobile Healthcare Networks ent://SD_ILS/0/SD_ILS:518520 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Zhang, Kuan. author.&#160;Shen, Xuemin (Sherman). author. (orcid)&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518520.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24717-5">https://doi.org/10.1007/978-3-319-24717-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy for Implantable Medical Devices ent://SD_ILS/0/SD_ILS:484643 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Burleson, Wayne. editor.&#160;Carrara, Sandro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-1674-6">https://doi.org/10.1007/978-1-4614-1674-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security-aware Cooperation in Cognitive Radio Networks ent://SD_ILS/0/SD_ILS:489561 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Zhang, Ning. author.&#160;Mark, Jon W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-0413-6">https://doi.org/10.1007/978-1-4939-0413-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:487946 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Nepal, Surya. editor.&#160;Pathan, Mukaddim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microbial Diversity and Biotechnology in Food Security ent://SD_ILS/0/SD_ILS:488381 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Kharwar, R.N. editor.&#160;Upadhyay, R.S. editor.&#160;Dubey, N.K. editor.&#160;Raghuwanshi, Richa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-81-322-1801-2">https://doi.org/10.1007/978-81-322-1801-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded Multimedia Security Systems Algorithms and Architectures ent://SD_ILS/0/SD_ILS:330984 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Pande, Amit. author.&#160;Zambreno, Joseph. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4459-5">http://dx.doi.org/10.1007/978-1-4471-4459-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:331279 2024-11-15T12:32:50Z 2024-11-15T12:32:50Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331279.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>