Search Results for Software. - Narrowed by: Data Encryption.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSoftware.$0026qf$003dSUBJECT$002509Subject$002509Data$002bEncryption.$002509Data$002bEncryption.$0026te$003dILS$0026ps$003d300?dt=list
2024-12-29T00:27:26Z
Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334305
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Basin, David. editor. Mitchell, John C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334305.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering Secure Software and Systems 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334236
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Jürjens, Jan. editor. Livshits, Benjamin. editor. Scandariato, Riccardo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334236.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36563-8">http://dx.doi.org/10.1007/978-3-642-36563-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334399
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Fischer-Hübner, Simone. editor. Leeuw, Elisabeth. editor. Mitchell, Chris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334399.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334401
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Mangard, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334401.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334616
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334616.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334635
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Gaborit, Philippe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334635.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335098
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335098.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
ent://SD_ILS/0/SD_ILS:335154
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Fischlin, Marc. editor. Katzenbeisser, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335154.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum Attacks on Public-Key Cryptosystems
ent://SD_ILS/0/SD_ILS:330828
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330828.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:332941
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Qing, Sihan. editor. Zhou, Jianying. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332941.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334710
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Doyen, Guillaume. editor. Waldburger, Martin. editor. Čeleda, Pavel. editor. Sperotto, Anna. editor. Stiller, Burkhard. editor.<br/>Preferred Shelf Number ONLINE(334710.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38998-6">http://dx.doi.org/10.1007/978-3-642-38998-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334878
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Capitani di Vimercati, Sabrina. editor. Mitchell, Chris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334878.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334880
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Prouff, Emmanuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334880.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I
ent://SD_ILS/0/SD_ILS:334881
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Canetti, Ran. editor. Garay, Juan A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334881.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40041-4">http://dx.doi.org/10.1007/978-3-642-40041-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334726
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Cristofaro, Emiliano. editor. Wright, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334726.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Engineering and Intelligence Informatics CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334975
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Cuzzocrea, Alfredo. editor. Kittl, Christian. editor. Simos, Dimitris E. editor. Weippl, Edgar. editor. Xu, Lida. editor.<br/>Preferred Shelf Number ONLINE(334975.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40588-4">http://dx.doi.org/10.1007/978-3-642-40588-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335111
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Riis Nielson, Hanne. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335111.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41488-6">http://dx.doi.org/10.1007/978-3-642-41488-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:335157
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335157.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:335160
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May 28 – June 2, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334049
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Yuan, Yuyu. editor. Wu, Xu. editor. Lu, Yueming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334049.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35795-4">http://dx.doi.org/10.1007/978-3-642-35795-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography – Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334179
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Abdalla, Michel. editor. Lange, Tanja. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334179.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Hiding 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334187
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Kirchner, Matthias. editor. Ghosal, Dipak. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334187.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36373-3">http://dx.doi.org/10.1007/978-3-642-36373-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334242
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Sahai, Amit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334242.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II
ent://SD_ILS/0/SD_ILS:334888
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Canetti, Ran. editor. Garay, Juan A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334888.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40084-1">http://dx.doi.org/10.1007/978-3-642-40084-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334746
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Heather, James. editor. Schneider, Steve. editor. Teague, Vanessa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334746.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334755
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Janczewski, Lech J. editor. Wolfe, Henry B. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334755.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334932
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Bertoni, Guido. editor. Coron, Jean-Sébastien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334932.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40349-1">http://dx.doi.org/10.1007/978-3-642-40349-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335057
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Accorsi, Rafael. editor. Ranise, Silvio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335057.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41098-7">http://dx.doi.org/10.1007/978-3-642-41098-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335066
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Palamidessi, Catuscia. editor. Ryan, Mark D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335066.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41157-1">http://dx.doi.org/10.1007/978-3-642-41157-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335197
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Stam, Martijn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335197.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334097
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Knudsen, Lars R. editor. Wu, Huapeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334097.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334132
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Hoepman, Jaap-Henk. editor. Verbauwhede, Ingrid. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334132.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ad Hoc Networks 4th International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334331
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Zheng, Jun. editor. Mitton, Nathalie. editor. Li, Jun. editor. Lorenz, Pascal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334331.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36958-2">http://dx.doi.org/10.1007/978-3-642-36958-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Infocomm Technology 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012. Revised Papers
ent://SD_ILS/0/SD_ILS:334561
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Guyot, Vincent. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334561.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38227-7">http://dx.doi.org/10.1007/978-3-642-38227-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – EUROCRYPT 2013 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334587
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Johansson, Thomas. editor. Nguyen, Phong Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334587.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38348-9">http://dx.doi.org/10.1007/978-3-642-38348-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334505
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Singh, Karan. editor. Awasthi, Amit K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334505.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37949-9">http://dx.doi.org/10.1007/978-3-642-37949-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust and Trustworthy Computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334696
2024-12-29T00:27:26Z
2024-12-29T00:27:26Z
Author Huth, Michael. editor. Asokan, N. editor. Čapkun, Srdjan. editor. Flechais, Ivan. editor. Coles-Kemp, Lizzie. editor.<br/>Preferred Shelf Number ONLINE(334696.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38908-5">http://dx.doi.org/10.1007/978-3-642-38908-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>