Search Results for Security. - Narrowed by: Data structures (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026ps$003d300?
2025-12-16T22:35:58Z
Network Security
ent://SD_ILS/0/SD_ILS:167094
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Huang, Scott C.-H. editor. MacCallum, David. editor. Du, Ding-Zhu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-73821-5">http://dx.doi.org/10.1007/978-0-387-73821-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Internet Security
ent://SD_ILS/0/SD_ILS:165679
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Vacca, John R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Telecommunications Networks
ent://SD_ILS/0/SD_ILS:166945
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Traynor, Patrick. author. McDaniel, Patrick. author. Porta, Thomas La. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in E-Learning
ent://SD_ILS/0/SD_ILS:165224
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Weippl, Edgar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Computer Security
ent://SD_ILS/0/SD_ILS:175390
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Salomon, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Online Business Security Systems
ent://SD_ILS/0/SD_ILS:166641
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Williams, Godfried B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Threats in Cyber Security
ent://SD_ILS/0/SD_ILS:172782
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Probst, Christian W. editor. Hunker, Jeffrey. editor. Gollmann, Dieter. editor. Bishop, Matt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security Policies and Procedures
ent://SD_ILS/0/SD_ILS:166393
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Frye, Douglas W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Electronic Postage Systems Technology, Security, Economics
ent://SD_ILS/0/SD_ILS:166296
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Bleumer, Gerrit. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Wireless Sensor Networks
ent://SD_ILS/0/SD_ILS:166353
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Liu, Donggang. author. Ning, Peng. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Synchronizing Internet Protocol Security (SIPSec)
ent://SD_ILS/0/SD_ILS:166600
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CryptoGraphics Exploiting Graphics Cards for Security
ent://SD_ILS/0/SD_ILS:166011
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Cook, Debra L. author. Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercryptography: Applicable Cryptography for Cyberspace Security
ent://SD_ILS/0/SD_ILS:484533
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography, Security and Privacy
ent://SD_ILS/0/SD_ILS:487070
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Jajodia, Sushil. editor. Samarati, Pierangela. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Communication Communication, Multimedia, Security
ent://SD_ILS/0/SD_ILS:489638
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Meinel, Christoph. author. Sack, Harald. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54331-9">https://doi.org/10.1007/978-3-642-54331-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Operational Semantics and Verification of Security Protocols
ent://SD_ILS/0/SD_ILS:188195
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Cremers, Cas. author. Mauw, Sjouke. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78636-8">http://dx.doi.org/10.1007/978-3-540-78636-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:172455
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author van Tilborg, Henk C. A. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Information and Communication Security
ent://SD_ILS/0/SD_ILS:190841
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Stavroulakis, Peter. editor. Stamp, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Information Security and Privacy
ent://SD_ILS/0/SD_ILS:172736
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Moore, Tyler. editor. Pym, David. editor. Ioannidis, Christos. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-6967-5">http://dx.doi.org/10.1007/978-1-4419-6967-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Towards Hardware-Intrinsic Security Foundations and Practice
ent://SD_ILS/0/SD_ILS:192659
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Sadeghi, Ahmad-Reza. editor. Naccache, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14452-3">http://dx.doi.org/10.1007/978-3-642-14452-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open Source Systems Security Certification
ent://SD_ILS/0/SD_ILS:167460
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Damiani, Ernesto. author. Ardagna, Claudio Agostino. author. El Ioini, Nabil. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77324-7">http://dx.doi.org/10.1007/978-0-387-77324-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Cards, Tokens, Security and Applications
ent://SD_ILS/0/SD_ILS:166922
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Mayes, Keith E. author. Markantonakis, Konstantinos. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network-Aware Security for Group Communications
ent://SD_ILS/0/SD_ILS:166640
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Sun, Yan. author. Trappe, Wade. author. Liu, K. J. R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68848-0">http://dx.doi.org/10.1007/978-0-387-68848-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Wireless Network Security
ent://SD_ILS/0/SD_ILS:165680
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Vacca, John R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quality of Protection Security Measurements and Metrics
ent://SD_ILS/0/SD_ILS:166159
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Gollmann, Dieter. editor. Massacci, Fabio. editor. Yautsiukhin, Artsiom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:164930
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Information Security and Privacy III
ent://SD_ILS/0/SD_ILS:331294
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Schneier, Bruce. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331294.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Economics of Information Security and Privacy
ent://SD_ILS/0/SD_ILS:334810
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Böhme, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334810.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Information Security A Hands-on Approach
ent://SD_ILS/0/SD_ILS:195648
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Basin, David. author. Schaller, Patrick. author. Schläpfer, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24474-2">http://dx.doi.org/10.1007/978-3-642-24474-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Database Security Applications and Trends
ent://SD_ILS/0/SD_ILS:166409
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Gertz, Michael. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Attack and Cyber Security Beyond the Hacker
ent://SD_ILS/0/SD_ILS:167459
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Stolfo, Salvatore J. editor. Bellovin, Steven M. editor. Keromytis, Angelos D. editor. Hershkop, Shlomo. editor. Smith, Sean W. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Warehousing and Data Mining Techniques for Cyber Security
ent://SD_ILS/0/SD_ILS:166379
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Biometric User Authentication for it Security From Fundamentals to Handwriting
ent://SD_ILS/0/SD_ILS:165467
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Vielhauer, Claus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security in the 21st Century
ent://SD_ILS/0/SD_ILS:165001
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Lee, D. T. editor. Shieh, S. P. editor. Tygar, J. D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)
ent://SD_ILS/0/SD_ILS:165267
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal Correctness of Security Protocols With 62 Figures and 4 Tables
ent://SD_ILS/0/SD_ILS:185368
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Bella, Giampaolo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy and Trust in the IoT Environment
ent://SD_ILS/0/SD_ILS:485230
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Mahmood, Zaigham. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-18075-1">https://doi.org/10.1007/978-3-030-18075-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quality, Reliability, Security and Robustness in Heterogeneous Systems 14th EAI International Conference, Qshine 2018, Ho Chi Minh City, Vietnam, December 3–4, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:486900
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Duong, Trung Q. editor. Vo, Nguyen-Son. editor. Phan, Van Ca. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-14413-5">https://doi.org/10.1007/978-3-030-14413-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Reconfigurable Systems Enhancing the Security Capabilities of Reconfigurable Hardware Architectures
ent://SD_ILS/0/SD_ILS:488721
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Feller, Thomas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-658-07005-2">https://doi.org/10.1007/978-3-658-07005-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Deterrence and IT Protection for Critical Infrastructures
ent://SD_ILS/0/SD_ILS:332909
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Martellini, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332909.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures
ent://SD_ILS/0/SD_ILS:334982
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Haataja, Keijo. author. Hyppönen, Konstantin. author. Pasanen, Sanna. author. Toivanen, Pekka. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334982.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits
ent://SD_ILS/0/SD_ILS:332116
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Peeters, Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332116.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334707
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Jacobson, Michael. editor. Locasto, Michael. editor. Mohassel, Payman. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334707.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197478
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Chim, Tat Wing. editor. Yuen, Tsz Hon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197603
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Pieprzyk, Josef. editor. Sadeghi, Ahmad-Reza. editor. Manulis, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35404-5">http://dx.doi.org/10.1007/978-3-642-35404-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
ent://SD_ILS/0/SD_ILS:198953
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Protocol Security Analysis Based on Trusted Freshness
ent://SD_ILS/0/SD_ILS:195536
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Dong, Ling. author. Chen, Kefei. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24073-7">http://dx.doi.org/10.1007/978-3-642-24073-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Security and Security Data 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196019
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author MacKinnon, Lachlan M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25704-9">http://dx.doi.org/10.1007/978-3-642-25704-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196303
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Aura, Tuomas. editor. Järvinen, Kimmo. editor. Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196738
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Laud, Peeter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196995
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Askoxylakis, Ioannis. editor. Pöhls, Henrich C. editor. Posegga, Joachim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197053
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Bao, Feng. editor. Samarati, Pierangela. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multimedia Communications, Services and Security 4th International Conference, MCSS 2011, Krakow, Poland, June 2-3, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194724
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Dziech, Andrzej. editor. Czyżewski, Andrzej. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21512-4">http://dx.doi.org/10.1007/978-3-642-21512-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research
ent://SD_ILS/0/SD_ILS:173331
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-9866-8">http://dx.doi.org/10.1007/978-1-4419-9866-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195888
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Qing, Sihan. editor. Susilo, Willy. editor. Wang, Guilin. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195249
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Robles, Rosslin John. editor. Balitanas, Maricel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23141-4">http://dx.doi.org/10.1007/978-3-642-23141-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195966
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Lin, Dongdai. editor. Tsudik, Gene. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25513-7">http://dx.doi.org/10.1007/978-3-642-25513-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191712
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Gu, Qijun. editor. Zang, Wanyu. editor. Yu, Meng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191714
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Weerasinghe, Dasun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193656
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Heng, Swee-Huay. editor. Wright, Rebecca N. editor. Goi, Bok-Min. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17619-7">http://dx.doi.org/10.1007/978-3-642-17619-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193666
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Soriano, Miguel. editor. Qing, Sihan. editor. López, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190377
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Park, Jong Hyuk. editor. Chen, Hsiao-Hwa. editor. Atiquzzaman, Mohammed. editor. Lee, Changhoon. editor. Kim, Tai-hoon. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02617-1">http://dx.doi.org/10.1007/978-3-642-02617-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190634
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Degano, Pierpaolo. editor. Viganò, Luca. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03459-6">http://dx.doi.org/10.1007/978-3-642-03459-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings
ent://SD_ILS/0/SD_ILS:190785
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Markowitch, Olivier. editor. Bilas, Angelos. editor. Hoepman, Jaap-Henk. editor. Mitchell, Chris J. editor. Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190823
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Jahankhani, Hamid. editor. Hessami, Ali G. editor. Hsu, Feng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04062-7">http://dx.doi.org/10.1007/978-3-642-04062-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190947
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Schmidt, Andreas U. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04434-2">http://dx.doi.org/10.1007/978-3-642-04434-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190950
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Backes, Michael. editor. Ning, Peng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191012
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Pieprzyk, Josef. editor. Zhang, Fangguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04642-1">http://dx.doi.org/10.1007/978-3-642-04642-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191095
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Christianson, Bruce. editor. Crispo, Bruno. editor. Malcolm, James A. editor. Roe, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04904-0">http://dx.doi.org/10.1007/978-3-642-04904-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191425
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Datta, Anupam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190173
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Abdalla, Michel. editor. Pointcheval, David. editor. Fouque, Pierre-Alain. editor. Vergnaud, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal to Practical Security Papers Issued from the 2005-2008 French-Japanese Collaboration
ent://SD_ILS/0/SD_ILS:190185
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Cortier, Véronique. editor. Kirchner, Claude. editor. Okada, Mitsuhiro. editor. Sakurada, Hideki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02002-5">http://dx.doi.org/10.1007/978-3-642-02002-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191214
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Chen, Yan. editor. Dimitriou, Tassos D. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05284-2">http://dx.doi.org/10.1007/978-3-642-05284-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Security Technology International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191311
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Kim, Haeng-kon. editor. Kim, Tai-hoon. editor. Kiumi, Akingbehin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10240-0">http://dx.doi.org/10.1007/978-3-642-10240-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191346
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191494
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Ślęzak, Dominik. editor. Kim, Tai-hoon. editor. Fang, Wai-Chi. editor. Arnett, Kirk P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191592
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Qing, Sihan. editor. Mitchell, Chris J. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11145-7">http://dx.doi.org/10.1007/978-3-642-11145-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189928
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Gritzalis, Dimitris. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01244-0">http://dx.doi.org/10.1007/978-3-642-01244-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Computational Science IV Special Issue on Security in Computing
ent://SD_ILS/0/SD_ILS:189853
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Gavrilova, Marina L. editor. Tan, C. J. Kenneth. editor. Moreno, Edward David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01004-0">http://dx.doi.org/10.1007/978-3-642-01004-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190382
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Park, Jong Hyuk. editor. Zhan, Justin. editor. Lee, Changhoon. editor. Wang, Guilin. editor. Kim, Tai-hoon. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02633-1">http://dx.doi.org/10.1007/978-3-642-02633-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188815
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Goodall, John R. editor. Conti, Gregory. editor. Ma, Kwan-Liu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Der IT Security Manager Expertenwissen für jeden IT Security Manager — Von namhaften Autoren praxisnah vermittelt
ent://SD_ILS/0/SD_ILS:199370
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Kersten, Heinrich. author. Klett, Gerhard. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9239-3">http://dx.doi.org/10.1007/978-3-8348-9239-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway
ent://SD_ILS/0/SD_ILS:164638
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Karabulut, Yücel. editor. Mitchell, John. editor. Herrmann, Peter. editor. Jensen, Christian Damsgaard. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09428-1">http://dx.doi.org/10.1007/978-0-387-09428-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Terrorism Informatics Knowledge Management and Data Mining for Homeland Security
ent://SD_ILS/0/SD_ILS:166857
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Chen, Hsinchun. editor. Reid, Edna. editor. Sinai, Joshua. editor. Silke, Andrew. editor. Ganor, Boaz. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-71613-8">http://dx.doi.org/10.1007/978-0-387-71613-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Security
ent://SD_ILS/0/SD_ILS:188061
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Goodall, John R. editor. Conti, Gregory. editor. Ma, Kwan-Liu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:189090
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Chen, Liqun. editor. Ryan, Mark D. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference
ent://SD_ILS/0/SD_ILS:199537
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Pohlmann, Norbert. author. Reimer, Helmut. author. Schneider, Wolfgang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9418-2">http://dx.doi.org/10.1007/978-3-8348-9418-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security with Noisy Data On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
ent://SD_ILS/0/SD_ILS:175657
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Tuyls, Pim. editor. Skoric, Boris. editor. Kevenaar, Tom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84628-984-2">http://dx.doi.org/10.1007/978-1-84628-984-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Trust in Modern Data Management
ent://SD_ILS/0/SD_ILS:185914
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Petković, Milan. editor. Jonker, Willem. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69861-6">http://dx.doi.org/10.1007/978-3-540-69861-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187473
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Susilo, Willy. editor. Liu, Joseph K. editor. Mu, Yi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187727
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Cervesato, Iliano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Applications for Communications Security
ent://SD_ILS/0/SD_ILS:165205
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Vaudenay, Serge. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligence and Security Informatics for International Security Information Sharing and Data Mining
ent://SD_ILS/0/SD_ILS:165714
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Chen, Hsinchun. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-30332-4">http://dx.doi.org/10.1007/0-387-30332-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2006 — Securing Electronic Busines Processes Highlights of the Information Security Solutions Europe 2006 Conference
ent://SD_ILS/0/SD_ILS:199337
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Paulus, Sachar. author. Pohlmann, Norbert. author. Reimer, Helmut. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9195-2">http://dx.doi.org/10.1007/978-3-8348-9195-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Access Control Systems Security, Identity Management and Trust Models
ent://SD_ILS/0/SD_ILS:165433
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Benantar, Messaoud. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Biometrics, Computer Security Systems and Artificial Intelligence Applications
ent://SD_ILS/0/SD_ILS:166154
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Saeed, Khalid. editor. Pejaś, Jerzy. editor. Mosdorf, Romuald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ITIL Security Management realisieren IT-Service Security Management nach ITIL — So gehen Sie vor
ent://SD_ILS/0/SD_ILS:199240
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Brunnstein, Jochen. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9072-6">http://dx.doi.org/10.1007/978-3-8348-9072-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, France
ent://SD_ILS/0/SD_ILS:165011
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Dimitrakos, Theo. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom
ent://SD_ILS/0/SD_ILS:165055
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Chadwick, David. editor. Preneel, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105674">http://dx.doi.org/10.1007/b105674</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Certification and Security in Inter-Organizational E-Service
ent://SD_ILS/0/SD_ILS:165086
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Nardelli, Enrico. editor. Talamo, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Net-Centric Approaches to Intelligence and National Security
ent://SD_ILS/0/SD_ILS:165242
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Ladner, Roy. editor. Petry, Frederick E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137009">http://dx.doi.org/10.1007/b137009</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy, Security and Trust within the Context of Pervasive Computing
ent://SD_ILS/0/SD_ILS:164923
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Robinson, Philip. editor. Vogt, Harald. editor. Wagealla, Waleed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
ent://SD_ILS/0/SD_ILS:164931
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Pejaś, Jerzy. editor. Piegat, Andrzej. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japan
ent://SD_ILS/0/SD_ILS:165165
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Sasaki, Ryoichi. editor. Qing, Sihan. editor. Okamoto, Eiji. editor. Yoshiura, Hiroshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004
ent://SD_ILS/0/SD_ILS:168883
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Kowalik, Janusz S. editor. Gorski, Janusz. editor. Sachenko, Anatoly. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography in Constant Parallel Time
ent://SD_ILS/0/SD_ILS:488823
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Applebaum, Benny. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-17367-7">https://doi.org/10.1007/978-3-642-17367-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE(331766.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fault Analysis in Cryptography
ent://SD_ILS/0/SD_ILS:196746
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Joye, Marc. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29656-7">http://dx.doi.org/10.1007/978-3-642-29656-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Block Cipher Companion
ent://SD_ILS/0/SD_ILS:193573
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Knudsen, Lars R. author. Robshaw, Matthew J.B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17342-4">http://dx.doi.org/10.1007/978-3-642-17342-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Preserving Privacy in Data Outsourcing
ent://SD_ILS/0/SD_ILS:172941
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Foresti, Sara. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7659-8">http://dx.doi.org/10.1007/978-1-4419-7659-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encryption for Digital Content
ent://SD_ILS/0/SD_ILS:171850
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Kiayias, Aggelos. author. Pehlivanoglu, Serdar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Situational Awareness Issues and Research
ent://SD_ILS/0/SD_ILS:171874
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Jajodia, Sushil. editor. Liu, Peng. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Adaptive Cryptographic Access Control
ent://SD_ILS/0/SD_ILS:172654
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Kayem, Anne V. D. M. author. Akl, Selim G. author. Martin, Patrick. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-6655-1">http://dx.doi.org/10.1007/978-1-4419-6655-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Efficient Secure Two-Party Protocols Techniques and Constructions
ent://SD_ILS/0/SD_ILS:192608
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Hazay, Carmit. author. Lindell, Yehuda. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14303-8">http://dx.doi.org/10.1007/978-3-642-14303-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Locally Decodable Codes and Private Information Retrieval Schemes
ent://SD_ILS/0/SD_ILS:192626
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Yekhanin, Sergey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14358-8">http://dx.doi.org/10.1007/978-3-642-14358-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The LLL Algorithm Survey and Applications
ent://SD_ILS/0/SD_ILS:190278
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Nguyen, Phong Q. editor. Vallée, Brigitte. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02295-1">http://dx.doi.org/10.1007/978-3-642-02295-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Signcryption
ent://SD_ILS/0/SD_ILS:189264
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Dent, Alexander W. editor. Zheng, Yuliang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89411-7">http://dx.doi.org/10.1007/978-3-540-89411-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Initiatives to Secure Cyberspace An Emerging Landscape
ent://SD_ILS/0/SD_ILS:164783
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Portnoy, Michael. editor. Goodman, Seymour. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Multi-Party Non-Repudiation Protocols and Applications
ent://SD_ILS/0/SD_ILS:167284
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Onieva, José A. author. Lopez, Javier. author. Zhou, Jianying. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primality Testing and Integer Factorization in Public-Key Cryptography
ent://SD_ILS/0/SD_ILS:167452
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Key Establishment
ent://SD_ILS/0/SD_ILS:167859
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Choo, Kim-Kwang Raymond. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-87969-7">http://dx.doi.org/10.1007/978-0-387-87969-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identifying Malicious Code Through Reverse Engineering
ent://SD_ILS/0/SD_ILS:167947
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Singh, Abhishek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vulnerability Analysis and Defense for the Internet
ent://SD_ILS/0/SD_ILS:167162
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Singh, Abhishek. editor. Singh, Baibhav. editor. Joseph, Hirosh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Management in Decentralized Systems
ent://SD_ILS/0/SD_ILS:165430
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Yu, Ting. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware Detection
ent://SD_ILS/0/SD_ILS:166294
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Christodorescu, Mihai. editor. Jha, Somesh. editor. Maughan, Douglas. editor. Song, Dawn. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Preserving Privacy in On-Line Analytical Processing (OLAP)
ent://SD_ILS/0/SD_ILS:166336
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Wang, Lingyu. author. Jajodia, Sushil. author. Wijesekera, Duminda. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ent://SD_ILS/0/SD_ILS:166337
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Poovendran, Radha. editor. Roy, Sumit. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Intrusion Detection Through Visualization
ent://SD_ILS/0/SD_ILS:165418
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Axelsson, Stefan. author. Sands, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hop Integrity in the Internet
ent://SD_ILS/0/SD_ILS:165645
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Huang, Chin-Tser. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Preserving Data Mining
ent://SD_ILS/0/SD_ILS:165653
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Vaidya, Jaideep. author. Zhu, Yu Michael. author. Clifton, Christopher W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Viruses and Malware
ent://SD_ILS/0/SD_ILS:166010
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multivariate Public Key Cryptosystems
ent://SD_ILS/0/SD_ILS:166190
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Ding, Jintai. author. Gower, Jason E. author. Schmidt, Dieter S. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Austin Protocol Compiler
ent://SD_ILS/0/SD_ILS:164876
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author McGuire, Tommy M. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection and Correlation Challenges and Solutions
ent://SD_ILS/0/SD_ILS:164919
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Kruegel, Christopher. author. Valeur, Fredrik. author. Vigna, Giovanni. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Image and Video Encryption From Digital Rights Management to Secured Personal Communication
ent://SD_ILS/0/SD_ILS:164920
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptography Principles and Applications
ent://SD_ILS/0/SD_ILS:185185
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Delfs, Hans. author. Knebl, Helmut. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Concurrent Zero-Knowledge With Additional Background by Oded Goldreich
ent://SD_ILS/0/SD_ILS:183559
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Rosen, Alon. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-32939-0">http://dx.doi.org/10.1007/3-540-32939-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Technologies and Emerging Sciences ICCTES 2021
ent://SD_ILS/0/SD_ILS:526691
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Maurya, Sudhanshu. editor. Peddoju, Sateesh K. editor. Ahmad, Badlishah. editor. Chihi, Ines. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-2538-2">https://doi.org/10.1007/978-981-19-2538-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part II
ent://SD_ILS/0/SD_ILS:483347
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Singh, Mayank. editor. Gupta, P.K. editor. Tyagi, Vipin. editor. Flusser, Jan. editor. Ören, Tuncer. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-9942-8">https://doi.org/10.1007/978-981-13-9942-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of International Ethical Hacking Conference 2018 eHaCON 2018, Kolkata, India
ent://SD_ILS/0/SD_ILS:486482
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Chakraborty, Mohuya. editor. Chakrabarti, Satyajit. editor. Balas, Valentina Emilia. editor. Mandal, J. K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-1544-2">https://doi.org/10.1007/978-981-13-1544-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Core Data Analysis: Summarization, Correlation, and Visualization
ent://SD_ILS/0/SD_ILS:486081
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Mirkin, Boris. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00271-8">https://doi.org/10.1007/978-3-030-00271-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part I
ent://SD_ILS/0/SD_ILS:483873
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Singh, Mayank. editor. Gupta, P.K. editor. Tyagi, Vipin. editor. Flusser, Jan. editor. Ören, Tuncer. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-9939-8">https://doi.org/10.1007/978-981-13-9939-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Code Breaking in the Pacific
ent://SD_ILS/0/SD_ILS:488233
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Donovan, Peter. author. Mack, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08278-3">https://doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communication Technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488934
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Linawati. editor. Mahendra, Made Sudiana. editor. Neuhold, Erich J. editor. Tjoa, A Min. editor. You, Ilsun. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-55032-4">https://doi.org/10.1007/978-3-642-55032-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488522
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Gladyshev, Pavel. editor. Marrington, Andrew. editor. Baggili, Ibrahim. editor. (orcid)0000-0002-9574-9537 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Smart Embedded Devices, Platforms and Applications
ent://SD_ILS/0/SD_ILS:484765
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Markantonakis, Konstantinos. editor. Mayes, Keith. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-7915-4">https://doi.org/10.1007/978-1-4614-7915-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Physical Unclonable Functions in Theory and Practice
ent://SD_ILS/0/SD_ILS:331657
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Böhm, Christoph. author. Hofer, Maximilian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331657.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5040-5">http://dx.doi.org/10.1007/978-1-4614-5040-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Modern Cryptography Primer Theoretical Foundations and Practical Applications
ent://SD_ILS/0/SD_ILS:335099
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Kościelny, Czesław. author. Kurkowski, Mirosław. author. Srebrny, Marian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335099.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Physically Unclonable Functions Constructions, Properties and Applications
ent://SD_ILS/0/SD_ILS:335102
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Maes, Roel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335102.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41395-7">http://dx.doi.org/10.1007/978-3-642-41395-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Public Key Infrastructures
ent://SD_ILS/0/SD_ILS:334984
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Buchmann, Johannes A. author. Karatsiolis, Evangelos. author. Wiesmaier, Alexander. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334984.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335197
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Stam, Martijn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335197.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Authentication Problems and Solutions
ent://SD_ILS/0/SD_ILS:331610
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Jakobsson, Markus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331610.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automatic Malware Analysis An Emulator Based Approach
ent://SD_ILS/0/SD_ILS:331796
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Yin, Heng. author. Song, Dawn. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331796.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Android Malware
ent://SD_ILS/0/SD_ILS:332276
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Jiang, Xuxian. author. Zhou, Yajin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332276.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Location Privacy Protection in Mobile Networks
ent://SD_ILS/0/SD_ILS:332468
2025-12-16T22:35:58Z
2025-12-16T22:35:58Z
Author Liu, Xinxin. author. Li, Xiaolin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332468.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>