Search Results for SpringerLink (Online service) - Narrowed by: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSpringerLink$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?
2025-12-10T19:22:51Z
The NICE Cyber Security Framework Cyber Security Intelligence and Analytics
ent://SD_ILS/0/SD_ILS:527712
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Alsmadi, Izzat. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-21651-0">https://doi.org/10.1007/978-3-031-21651-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction
ent://SD_ILS/0/SD_ILS:483593
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Flammini, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483608
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Albrecht, Martin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercryptography: Applicable Cryptography for Cyberspace Security
ent://SD_ILS/0/SD_ILS:484533
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Art of War for Computer Security
ent://SD_ILS/0/SD_ILS:483808
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Madsen, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Blockchain Second International Conference, SmartBlock 2019, Birmingham, UK, October 11–13, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485178
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Qiu, Meikang. editor. (orcid)0000-0002-1004-0140 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34083-4">https://doi.org/10.1007/978-3-030-34083-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in the Electricity Sector Managing Critical Infrastructure
ent://SD_ILS/0/SD_ILS:484738
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Leszczyna, Rafał. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-19538-0">https://doi.org/10.1007/978-3-030-19538-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Blockchain First International Conference, SmartBlock 2018, Tokyo, Japan, December 10–12, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399024
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Qiu, Meikang. editor. (orcid)0000-0002-1004-0140 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05764-0">https://doi.org/10.1007/978-3-030-05764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Monitoring in P2P Botnets A Dual Perspective
ent://SD_ILS/0/SD_ILS:400767
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Karuppayah, Shankar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
ent://SD_ILS/0/SD_ILS:401907
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Petrenko, Sergei. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introductory Computer Forensics A Hands-on Practical Approach
ent://SD_ILS/0/SD_ILS:398966
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Lin, Xiaodong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Technology - New Generations 15th International Conference on Information Technology
ent://SD_ILS/0/SD_ILS:398948
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Latifi, Shahram. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-77028-4">https://doi.org/10.1007/978-3-319-77028-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber-Physical Systems Security
ent://SD_ILS/0/SD_ILS:399914
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Koç, Çetin Kaya. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98935-8">https://doi.org/10.1007/978-3-319-98935-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detecting Peripheral-based Attacks on the Host Memory
ent://SD_ILS/0/SD_ILS:529268
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Stewin, Patrick. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13515-1">https://doi.org/10.1007/978-3-319-13515-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Issues in Mobile NFC Devices
ent://SD_ILS/0/SD_ILS:529509
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Roland, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-15488-6">https://doi.org/10.1007/978-3-319-15488-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Network Hacks Attack and Defense with Python
ent://SD_ILS/0/SD_ILS:530100
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Ballmann, Bastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44437-5">https://doi.org/10.1007/978-3-662-44437-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2013 The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334122
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Dawson, Ed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334122.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334242
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Sahai, Amit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334242.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Grid Security First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334518
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Cuellar, Jorge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334518.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38030-3">http://dx.doi.org/10.1007/978-3-642-38030-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Economics of Information Security and Privacy
ent://SD_ILS/0/SD_ILS:334810
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Böhme, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334810.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334863
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334863.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334880
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Prouff, Emmanuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334880.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Communication Networking 19th EUNICE/IFIP WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334966
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Bauschert, Thomas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334966.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40552-5">http://dx.doi.org/10.1007/978-3-642-40552-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security and Privacy Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335073
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Felici, Massimo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335073.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41205-9">http://dx.doi.org/10.1007/978-3-642-41205-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Physical Layer Approaches for Securing Wireless Communication Systems
ent://SD_ILS/0/SD_ILS:332050
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Wen, Hong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332050.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-6510-2">http://dx.doi.org/10.1007/978-1-4614-6510-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Deterrence and IT Protection for Critical Infrastructures
ent://SD_ILS/0/SD_ILS:332909
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Martellini, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332909.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Risikomanagement kompakt Risiken und Unsicherheiten bewerten und beherrschen
ent://SD_ILS/0/SD_ILS:337388
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Ebert, Christof. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(337388.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41048-2">http://dx.doi.org/10.1007/978-3-642-41048-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PBX Security and Forensics A Practical Approach
ent://SD_ILS/0/SD_ILS:331279
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Androulidakis, Iosif I. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331279.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Information Security and Privacy III
ent://SD_ILS/0/SD_ILS:331294
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Schneier, Bruce. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331294.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Authentication Problems and Solutions
ent://SD_ILS/0/SD_ILS:331610
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Jakobsson, Markus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331610.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits
ent://SD_ILS/0/SD_ILS:332116
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Peeters, Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332116.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334401
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Mangard, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334401.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334635
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Gaborit, Philippe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334635.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335197
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Stam, Martijn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335197.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Netzwerk- und Datensicherheit Eine praktische Einführung
ent://SD_ILS/0/SD_ILS:338406
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Kappes, Martin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(338406.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8612-5">http://dx.doi.org/10.1007/978-3-8348-8612-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Outlier Analysis
ent://SD_ILS/0/SD_ILS:332026
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Aggarwal, Charu C. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332026.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-6396-2">http://dx.doi.org/10.1007/978-1-4614-6396-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Enterprise Identity Management Towards an Investment Decision Support Approach
ent://SD_ILS/0/SD_ILS:333923
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Royer, Denis. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333923.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35040-5">http://dx.doi.org/10.1007/978-3-642-35040-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT-Risikomanagement mit System Praxisorientiertes Management von Informationssicherheits- und IT-Risiken
ent://SD_ILS/0/SD_ILS:338328
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Königs, Hans-Peter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(338328.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2165-2">http://dx.doi.org/10.1007/978-3-8348-2165-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Phone Security and Forensics A Practical Approach
ent://SD_ILS/0/SD_ILS:173990
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Androulidakis, Iosif I. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1650-0">http://dx.doi.org/10.1007/978-1-4614-1650-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday
ent://SD_ILS/0/SD_ILS:196428
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Naccache, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196738
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Laud, Peeter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197153
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Kim, Howon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197303
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Keromytis, Angelos D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32946-3">http://dx.doi.org/10.1007/978-3-642-32946-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fast Software Encryption 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197464
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Canteaut, Anne. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34047-5">http://dx.doi.org/10.1007/978-3-642-34047-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Hacks - Intensivkurs Angriff und Verteidigung mit Python
ent://SD_ILS/0/SD_ILS:195598
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Ballmann, Bastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24305-9">http://dx.doi.org/10.1007/978-3-642-24305-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Security and Security Data 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196019
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author MacKinnon, Lachlan M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25704-9">http://dx.doi.org/10.1007/978-3-642-25704-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196237
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Danezis, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27576-0">http://dx.doi.org/10.1007/978-3-642-27576-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2012 The Cryptographers’ Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 – March 2, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196309
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Dunkelman, Orr. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27954-6">http://dx.doi.org/10.1007/978-3-642-27954-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security VII
ent://SD_ILS/0/SD_ILS:196512
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Shi, Yun Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28693-3">http://dx.doi.org/10.1007/978-3-642-28693-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196562
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Cramer, Ronald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28914-9">http://dx.doi.org/10.1007/978-3-642-28914-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding High-Dimensional Spaces
ent://SD_ILS/0/SD_ILS:197368
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Skillicorn, David B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33398-9">http://dx.doi.org/10.1007/978-3-642-33398-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tunnel und verdeckte Kanäle im Netz Grundlagen, Protokolle, Sicherheit und Methoden
ent://SD_ILS/0/SD_ILS:198870
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Wendzel, Steffen. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2143-0">http://dx.doi.org/10.1007/978-3-8348-2143-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197201
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Smith, Adam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32284-6">http://dx.doi.org/10.1007/978-3-642-32284-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Crittografia nel Paese delle Meraviglie
ent://SD_ILS/0/SD_ILS:204651
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Venturi, Daniele. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-88-470-2481-6">http://dx.doi.org/10.1007/978-88-470-2481-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194086
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Ishai, Yuval. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19571-6">http://dx.doi.org/10.1007/978-3-642-19571-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT-Sicherheit mit System Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung
ent://SD_ILS/0/SD_ILS:199017
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Müller, Klaus-Rainer. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8178-6">http://dx.doi.org/10.1007/978-3-8348-8178-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Preserving Privacy in Data Outsourcing
ent://SD_ILS/0/SD_ILS:172941
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Foresti, Sara. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7659-8">http://dx.doi.org/10.1007/978-1-4419-7659-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research
ent://SD_ILS/0/SD_ILS:173331
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-9866-8">http://dx.doi.org/10.1007/978-1-4419-9866-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2011 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195141
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Rogaway, Phillip. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22792-9">http://dx.doi.org/10.1007/978-3-642-22792-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transparent User Authentication Biometrics, RFID and Behavioural Profiling
ent://SD_ILS/0/SD_ILS:168600
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Clarke, Nathan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-85729-805-8">http://dx.doi.org/10.1007/978-0-85729-805-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2011 The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:193925
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Kiayias, Aggelos. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19074-2">http://dx.doi.org/10.1007/978-3-642-19074-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – EUROCRYPT 2011 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194380
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Paterson, Kenneth G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20465-4">http://dx.doi.org/10.1007/978-3-642-20465-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194466
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Fehr, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20728-0">http://dx.doi.org/10.1007/978-3-642-20728-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXV 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194997
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Li, Yingjiu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22348-8">http://dx.doi.org/10.1007/978-3-642-22348-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Parallel and Distributed Computing and Networks International Conference, PDCN 2010, Chongqing, China, December 13-14, 2010. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195111
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Qi, Luo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22706-6">http://dx.doi.org/10.1007/978-3-642-22706-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Programming Languages and Systems 9th Asian Symposium, APLAS 2011, Kenting, Taiwan, December 5-7, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195911
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Yang, Hongseok. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25318-8">http://dx.doi.org/10.1007/978-3-642-25318-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195937
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Yang, Bo-Yin. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25405-5">http://dx.doi.org/10.1007/978-3-642-25405-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195967
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Chen, Liqun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Card Research and Advanced Applications 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196143
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Prouff, Emmanuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27257-8">http://dx.doi.org/10.1007/978-3-642-27257-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Counterterrorism and Open Source Intelligence
ent://SD_ILS/0/SD_ILS:197734
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Wiil, Uffe Kock. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-7091-0388-3">http://dx.doi.org/10.1007/978-3-7091-0388-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Metriken – der Schlüssel zum erfolgreichen Security und Compliance Monitoring Design, Implementierung und Validierung in der Praxis
ent://SD_ILS/0/SD_ILS:199028
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Sowa, Aleksandra. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8194-6">http://dx.doi.org/10.1007/978-3-8348-8194-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Risk Management Risikomanagement mit ISO/IEC 27001, 27005 und 31010
ent://SD_ILS/0/SD_ILS:199932
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Klipper, Sebastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9870-8">http://dx.doi.org/10.1007/978-3-8348-9870-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fast Software Encryption 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194789
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Joux, Antoine. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21702-9">http://dx.doi.org/10.1007/978-3-642-21702-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
sicher & mobil Sicherheit in der drahtlosen Kommunikation
ent://SD_ILS/0/SD_ILS:190513
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Osterhage, Wolfgang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03083-3">http://dx.doi.org/10.1007/978-3-642-03083-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191801
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Micciancio, Daniele. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11799-2">http://dx.doi.org/10.1007/978-3-642-11799-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology - CT-RSA 2010 The Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191839
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Pieprzyk, Josef. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11925-5">http://dx.doi.org/10.1007/978-3-642-11925-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2010 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192716
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Rabin, Tal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14623-7">http://dx.doi.org/10.1007/978-3-642-14623-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193040
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Schoitsch, Erwin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15651-9">http://dx.doi.org/10.1007/978-3-642-15651-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193421
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Ors Yalcin, Siddika Berna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16822-2">http://dx.doi.org/10.1007/978-3-642-16822-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Programming Languages and Systems 8th Asian Symposium, APLAS 2010, Shanghai, China, November 28 - December 1, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193511
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Ueda, Kazunori. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17164-2">http://dx.doi.org/10.1007/978-3-642-17164-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193582
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Integrated Circuits and Systems
ent://SD_ILS/0/SD_ILS:166890
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Verbauwhede, Ingrid M.R. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-71829-3">http://dx.doi.org/10.1007/978-0-387-71829-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191714
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Weerasinghe, Dasun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – EUROCRYPT 2010 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192256
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Gilbert, Henri. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13190-5">http://dx.doi.org/10.1007/978-3-642-13190-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security V
ent://SD_ILS/0/SD_ILS:192607
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Shi, Yun Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14298-7">http://dx.doi.org/10.1007/978-3-642-14298-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192673
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14496-7">http://dx.doi.org/10.1007/978-3-642-14496-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elements of Computer Security
ent://SD_ILS/0/SD_ILS:168393
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Salomon, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-85729-006-9">http://dx.doi.org/10.1007/978-0-85729-006-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192157
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Sendrier, Nicolas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12929-2">http://dx.doi.org/10.1007/978-3-642-12929-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbuch Unternehmenssicherheit Umfassendes Sicherheits-, Kontinuitätsund Risikomanagement mit System
ent://SD_ILS/0/SD_ILS:199875
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Müller, Klaus-Rainer. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9772-5">http://dx.doi.org/10.1007/978-3-8348-9772-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Konfliktmanagement für Sicherheitsprofis Auswege aus der „Buhmann-Falle“ für IT-Sicherheitsbeauftragte, Datenschützer und Co
ent://SD_ILS/0/SD_ILS:199750
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Klipper, Sebastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9641-4">http://dx.doi.org/10.1007/978-3-8348-9641-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Datenschutz kompakt und verständlich Eine praxisorientierte Einführung
ent://SD_ILS/0/SD_ILS:199762
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Witt, Bernhard C. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9653-7">http://dx.doi.org/10.1007/978-3-8348-9653-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sicherheit und Kryptographie im Internet Von sicherer E-Mail bis zu IP-Verschlüsselung
ent://SD_ILS/0/SD_ILS:199774
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Schwenk, Jörg. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9665-0">http://dx.doi.org/10.1007/978-3-8348-9665-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Embedded Devices
ent://SD_ILS/0/SD_ILS:172275
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Gebotys, Catherine H. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-1530-6">http://dx.doi.org/10.1007/978-1-4419-1530-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
I contenuti digitali tecnologie, diritti e libertà
ent://SD_ILS/0/SD_ILS:204402
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Lucchi, Nicola. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-88-470-1399-5">http://dx.doi.org/10.1007/978-88-470-1399-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2009 The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189815
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Fischlin, Marc. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00862-7">http://dx.doi.org/10.1007/978-3-642-00862-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - CRYPTO 2009 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190600
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Halevi, Shai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03356-8">http://dx.doi.org/10.1007/978-3-642-03356-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191500
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Parker, Matthew G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Computing Systems Challenges, Approaches and Solutions
ent://SD_ILS/0/SD_ILS:188131
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Biskup, Joachim. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78442-5">http://dx.doi.org/10.1007/978-3-540-78442-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evaluation of Electronic Voting Requirements and Evaluation Procedures to Support Responsible Election Authorities
ent://SD_ILS/0/SD_ILS:190078
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Volkamer, Melanie. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01662-2">http://dx.doi.org/10.1007/978-3-642-01662-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191307
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Desmedt, Yvo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10230-1">http://dx.doi.org/10.1007/978-3-642-10230-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191346
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing and Mining Uncertain Data
ent://SD_ILS/0/SD_ILS:164752
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Aggarwal, Charu C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09690-2">http://dx.doi.org/10.1007/978-0-387-09690-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing Information Risk and the Economics of Security
ent://SD_ILS/0/SD_ILS:164782
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Johnson, M. Eric. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09762-6">http://dx.doi.org/10.1007/978-0-387-09762-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Key Establishment
ent://SD_ILS/0/SD_ILS:167859
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Choo, Kim-Kwang Raymond. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-87969-7">http://dx.doi.org/10.1007/978-0-387-87969-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identifying Malicious Code Through Reverse Engineering
ent://SD_ILS/0/SD_ILS:167947
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Singh, Abhishek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Les virus informatiques: théorie, pratique et applications
ent://SD_ILS/0/SD_ILS:176476
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Filiol, Éric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-2-287-98240-8">http://dx.doi.org/10.1007/978-2-287-98240-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Finite Automata and Application to Cryptography
ent://SD_ILS/0/SD_ILS:188068
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Tao, Renji. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78257-5">http://dx.doi.org/10.1007/978-3-540-78257-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189693
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Reingold, Omer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00457-5">http://dx.doi.org/10.1007/978-3-642-00457-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - EUROCRYPT 2009 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189852
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Joux, Antoine. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01001-9">http://dx.doi.org/10.1007/978-3-642-01001-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security IV
ent://SD_ILS/0/SD_ILS:190112
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Shi, Yun Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01757-5">http://dx.doi.org/10.1007/978-3-642-01757-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – AFRICACRYPT 2009 Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190306
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Preneel, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02384-2">http://dx.doi.org/10.1007/978-3-642-02384-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191425
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Datta, Anupam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Programming Languages and Systems 7th Asian Symposium, APLAS 2009, Seoul, Korea, December 14-16, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191441
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Hu, Zhenjiang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10672-9">http://dx.doi.org/10.1007/978-3-642-10672-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Kryptologie Eine Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen.
ent://SD_ILS/0/SD_ILS:199715
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Beutelspacher, Albrecht. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9606-3">http://dx.doi.org/10.1007/978-3-8348-9606-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT-Risiko-Management mit System Von den Grundlagen bis zur Realisierung – Ein praxisorientierter Leitfaden
ent://SD_ILS/0/SD_ILS:200022
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Königs, Hans-Peter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9993-4">http://dx.doi.org/10.1007/978-3-8348-9993-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primality Testing and Integer Factorization in Public-Key Cryptography
ent://SD_ILS/0/SD_ILS:167452
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Algebraic Cryptanalysis
ent://SD_ILS/0/SD_ILS:167905
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Bard, Gregory V. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88757-9">http://dx.doi.org/10.1007/978-0-387-88757-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185381
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188159
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Canetti, Ran. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189234
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Pieprzyk, Josef. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptanalytic Attacks on RSA
ent://SD_ILS/0/SD_ILS:166422
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security III
ent://SD_ILS/0/SD_ILS:185689
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Shi, Yun Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188292
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Smart, Nigel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2008 The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188378
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Malkin, Tal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188588
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188624
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Wagner, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:188645
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Tsudik, Gene. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185981
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Zamboni, Diego. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:185991
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Atluri, Vijay. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing Systeme Konzepte und Anforderungen
ent://SD_ILS/0/SD_ILS:187607
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Müller, Thomas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76410-6">http://dx.doi.org/10.1007/978-3-540-76410-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmustern
ent://SD_ILS/0/SD_ILS:185059
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Meier, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-48258-1">http://dx.doi.org/10.1007/978-3-540-48258-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Resilience and Protection
ent://SD_ILS/0/SD_ILS:166891
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Hyslop, Maitland. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-71862-0">http://dx.doi.org/10.1007/978-0-387-71862-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Grid Computing Security
ent://SD_ILS/0/SD_ILS:184773
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Chakrabarti, Anirban. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal Correctness of Security Protocols With 62 Figures and 4 Tables
ent://SD_ILS/0/SD_ILS:185368
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Bella, Giampaolo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186573
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Naor, Moni. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187068
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Menezes, Alfred. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187827
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Galbraith, Steven D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186107
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Vadhan, Salil P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Anti-Spam Measures Analysis and Design
ent://SD_ILS/0/SD_ILS:186358
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Schryen, Guido. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-71750-8">http://dx.doi.org/10.1007/978-3-540-71750-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security II
ent://SD_ILS/0/SD_ILS:186739
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Shi, Yun Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187720
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187727
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Cervesato, Iliano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Warehousing and Data Mining Techniques for Cyber Security
ent://SD_ILS/0/SD_ILS:166379
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Identity Theft: Avoidance, Causes and Possible Cures
ent://SD_ILS/0/SD_ILS:166606
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Camp, L. Jean. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Online Business Security Systems
ent://SD_ILS/0/SD_ILS:166641
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Williams, Godfried B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:185591
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Nguyen, Phong Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11958239">http://dx.doi.org/10.1007/11958239</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers
ent://SD_ILS/0/SD_ILS:185707
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2007 The Cryptographers’ Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:185787
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11967668">http://dx.doi.org/10.1007/11967668</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Explainable AI for Cybersecurity
ent://SD_ILS/0/SD_ILS:528936
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Pan, Zhixin. author. Mishra, Prabhat. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-46479-9">https://doi.org/10.1007/978-3-031-46479-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483295
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Ding, Jintai. editor. Steinwandt, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Multimedia Information Security: Techniques and Applications
ent://SD_ILS/0/SD_ILS:483348
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Singh, Amit Kumar. editor. Mohan, Anand. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proactive and Dynamic Network Defense
ent://SD_ILS/0/SD_ILS:486655
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Wang, Cliff. editor. Lu, Zhuo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10597-6">https://doi.org/10.1007/978-3-030-10597-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486939
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Histories of Computing in Eastern Europe IFIP WG 9.7 International Workshop on the History of Computing, HC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznań, Poland, September 19–21, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485365
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Leslie, Christopher. editor. Schmitt, Martin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29160-0">https://doi.org/10.1007/978-3-030-29160-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ad Hoc Networks 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:401013
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Zhou, Yifeng. editor. Kunz, Thomas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-74439-1">https://doi.org/10.1007/978-3-319-74439-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dynamic Games for Network Security
ent://SD_ILS/0/SD_ILS:401109
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author He, Xiaofan. author. Dai, Huaiyu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Internet Technologies and Trends First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:401813
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Patel, Zuber. editor. Gupta, Shilpi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-73712-6">https://doi.org/10.1007/978-3-319-73712-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399665
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Saracino, Andrea. editor. Mori, Paolo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Multimedia First International Conference, ICSM 2018, Toulon, France, August 24–26, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399927
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Basu, Anup. editor. Berretti, Stefano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04375-9">https://doi.org/10.1007/978-3-030-04375-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400126
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Adversary Detection For Cognitive Radio Networks
ent://SD_ILS/0/SD_ILS:401405
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author He, Xiaofan. author. Dai, Huaiyu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75868-8">https://doi.org/10.1007/978-3-319-75868-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:401948
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Matoušek, Petr. editor. Schmiedecker, Martin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:402205
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Sun, Guanglu. editor. Liu, Shuai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Smart Grid
ent://SD_ILS/0/SD_ILS:399960
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Abdallah, Asmaa. author. Shen, Xuemin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Game Theoretic Analysis of Congestion, Safety and Security Traffic and Transportation Theory
ent://SD_ILS/0/SD_ILS:529429
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Hausken, Kjell. editor. Zhuang, Jun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11674-7">https://doi.org/10.1007/978-3-319-11674-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Game Theoretic Analysis of Congestion, Safety and Security Networks, Air Traffic and Emergency Departments
ent://SD_ILS/0/SD_ILS:529568
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Hausken, Kjell. editor. Zhuang, Jun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13009-5">https://doi.org/10.1007/978-3-319-13009-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security: Analytics, Technology and Automation
ent://SD_ILS/0/SD_ILS:529962
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-18302-2">https://doi.org/10.1007/978-3-319-18302-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334097
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Knudsen, Lars R. editor. Wu, Huapeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334097.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Passive and Active Measurement 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334223
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Roughan, Matthew. editor. Chang, Rocky. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334223.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36516-4">http://dx.doi.org/10.1007/978-3-642-36516-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334316
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Keromytis, Angelos D. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334316.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334519
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Deng, Robert H. editor. Feng, Tao. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334519.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334767
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Wang, Lingyu. editor. Shafiq, Basit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334767.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334878
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Capitani di Vimercati, Sabrina. editor. Mitchell, Chris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334878.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334938
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Avoine, Gildas. editor. Kara, Orhun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334938.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335057
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Accorsi, Rafael. editor. Ranise, Silvio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335057.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41098-7">http://dx.doi.org/10.1007/978-3-642-41098-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335063
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335063.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335077
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Susilo, Willy. editor. Reyhanitabar, Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335077.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335111
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Riis Nielson, Hanne. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335111.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41488-6">http://dx.doi.org/10.1007/978-3-642-41488-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335098
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335098.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Wireless Implantable Medical Devices
ent://SD_ILS/0/SD_ILS:332220
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Hei, Xiali. author. Du, Xiaojiang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332220.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Android Malware
ent://SD_ILS/0/SD_ILS:332276
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Jiang, Xuxian. author. Zhou, Yajin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332276.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and the Networked Society
ent://SD_ILS/0/SD_ILS:332915
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Gregory, Mark A. author. Glance, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332915.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Systems 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:332976
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Bloem, Roderick. editor. Lipp, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332976.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03491-1">http://dx.doi.org/10.1007/978-3-319-03491-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:332978
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Paul, Goutam. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332978.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03515-4">http://dx.doi.org/10.1007/978-3-319-03515-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Physical Unclonable Functions in Theory and Practice
ent://SD_ILS/0/SD_ILS:331657
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Böhm, Christoph. author. Hofer, Maximilian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331657.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5040-5">http://dx.doi.org/10.1007/978-1-4614-5040-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
ent://SD_ILS/0/SD_ILS:331785
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Korzun, Dmitry. author. Gurtov, Andrei. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331785.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5483-0">http://dx.doi.org/10.1007/978-1-4614-5483-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automatic Malware Analysis An Emulator Based Approach
ent://SD_ILS/0/SD_ILS:331796
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Yin, Heng. author. Song, Dawn. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331796.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
ent://SD_ILS/0/SD_ILS:332461
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Tang, Jin. author. Cheng, Yu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332461.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Location Privacy Protection in Mobile Networks
ent://SD_ILS/0/SD_ILS:332468
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Liu, Xinxin. author. Li, Xiaolin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332468.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Assessment in Vehicular Networks
ent://SD_ILS/0/SD_ILS:332479
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Du, Suguo. author. Zhu, Haojin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332479.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IP Mobility Management for VANET
ent://SD_ILS/0/SD_ILS:332861
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Taha, Sanaa. author. Shen, Xuemin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332861.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-01351-0">http://dx.doi.org/10.1007/978-3-319-01351-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334132
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Hoepman, Jaap-Henk. editor. Verbauwhede, Ingrid. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334132.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography – Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334179
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Abdalla, Michel. editor. Lange, Tanja. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334179.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334184
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Kurosawa, Kaoru. editor. Hanaoka, Goichiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334184.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334613
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Kutyłowski, Mirosław. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334613.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334616
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334616.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334720
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Boyd, Colin. editor. Simpson, Leonie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334720.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334726
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Cristofaro, Emiliano. editor. Wright, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334726.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Human Aspects of Information Security, Privacy, and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334786
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Marinos, Louis. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334786.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39345-7">http://dx.doi.org/10.1007/978-3-642-39345-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334794
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Dodge, Ronald C. editor. Futcher, Lynn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334794.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:335157
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335157.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:335160
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335194
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Bagchi, Aditya. editor. Ray, Indrakshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335194.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335209
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Butts, Jonathan. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335209.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45330-4">http://dx.doi.org/10.1007/978-3-642-45330-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:333008
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Luiijf, Eric. editor. Hartel, Pieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333008.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sensor Systems and Software 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:333015
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Zuniga, Marco. editor. Dini, Gianluca. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333015.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-04166-7">http://dx.doi.org/10.1007/978-3-319-04166-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197420
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33678-2">http://dx.doi.org/10.1007/978-3-642-33678-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communication Technologies 18th EUNICE/ IFIP WG 6.2, 6.6 International Conference, EUNICE 2012, Budapest, Hungary, August 29-31, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197281
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Szabó, Róbert. editor. Vidács, Attila. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32808-4">http://dx.doi.org/10.1007/978-3-642-32808-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Management 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197291
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Jonker, Willem. editor. Petković, Milan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32873-2">http://dx.doi.org/10.1007/978-3-642-32873-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197384
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Hevia, Alejandro. editor. Neven, Gregory. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Decision and Game Theory for Security Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197500
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Grossklags, Jens. editor. Walrand, Jean. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34266-0">http://dx.doi.org/10.1007/978-3-642-34266-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics VIII 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197449
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33962-2">http://dx.doi.org/10.1007/978-3-642-33962-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Achieving Systems Safety Proceedings of the Twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012
ent://SD_ILS/0/SD_ILS:173458
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Dale, Chris. editor. Anderson, Tom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-2494-8">http://dx.doi.org/10.1007/978-1-4471-2494-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Software Similarity and Classification
ent://SD_ILS/0/SD_ILS:173499
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Cesare, Silvio. author. Xiang, Yang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-2909-7">http://dx.doi.org/10.1007/978-1-4471-2909-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Collaborative Financial Infrastructure Protection Tools, Abstractions, and Middleware
ent://SD_ILS/0/SD_ILS:194366
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Baldoni, Roberto. editor. Chockler, Gregory. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20420-3">http://dx.doi.org/10.1007/978-3-642-20420-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
RFID. Security and Privacy 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195902
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Juels, Ari. editor. Paar, Christof. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25286-0">http://dx.doi.org/10.1007/978-3-642-25286-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197072
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Mitrokotsa, Aikaterini. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31410-0">http://dx.doi.org/10.1007/978-3-642-31410-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Enhancing Technologies 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197124
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Fischer-Hübner, Simone. editor. Wright, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31680-7">http://dx.doi.org/10.1007/978-3-642-31680-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197299
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Visconti, Ivan. editor. Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32928-9">http://dx.doi.org/10.1007/978-3-642-32928-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems – CHES 2012 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197310
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Prouff, Emmanuel. editor. Schaumont, Patrick. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33027-8">http://dx.doi.org/10.1007/978-3-642-33027-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197638
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Butts, Jonathan. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35764-0">http://dx.doi.org/10.1007/978-3-642-35764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197557
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Galbraith, Steven. editor. Nandi, Mridul. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34931-7">http://dx.doi.org/10.1007/978-3-642-34931-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197566
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Venkatakrishnan, Venkat. editor. Goswami, Diganta. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35130-3">http://dx.doi.org/10.1007/978-3-642-35130-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197475
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Research in Cryptology 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197481
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Armknecht, Frederik. editor. Lucks, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34159-5">http://dx.doi.org/10.1007/978-3-642-34159-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Protocol Security Analysis Based on Trusted Freshness
ent://SD_ILS/0/SD_ILS:195536
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Dong, Ling. author. Chen, Kefei. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24073-7">http://dx.doi.org/10.1007/978-3-642-24073-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196240
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Camenisch, Jan. editor. Kesdogan, Dogan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27585-2">http://dx.doi.org/10.1007/978-3-642-27585-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196459
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Miri, Ali. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28496-0">http://dx.doi.org/10.1007/978-3-642-28496-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196588
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Pointcheval, David. editor. Johansson, Thomas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29011-4">http://dx.doi.org/10.1007/978-3-642-29011-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197411
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Domingo-Ferrer, Josep. editor. Tinnirello, Ilenia. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33627-0">http://dx.doi.org/10.1007/978-3-642-33627-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197516
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Bogdanov, Andrey. editor. Sanadhya, Somitra. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34416-9">http://dx.doi.org/10.1007/978-3-642-34416-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Systems 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197598
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Mitchell, Chris J. editor. Tomlinson, Allan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35371-0">http://dx.doi.org/10.1007/978-3-642-35371-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197604
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Lee, Dong Hoon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35416-8">http://dx.doi.org/10.1007/978-3-642-35416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197559
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Programming Languages and Systems 10th Asian Symposium, APLAS 2012, Kyoto, Japan, December 11-13, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197577
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Jhala, Ranjit. editor. Igarashi, Atsushi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35182-2">http://dx.doi.org/10.1007/978-3-642-35182-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 – November 2, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197492
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Jøsang, Audun. editor. Carlsson, Bengt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34210-3">http://dx.doi.org/10.1007/978-3-642-34210-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
ent://SD_ILS/0/SD_ILS:198953
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196291
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Jung, Souhwan. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27890-7">http://dx.doi.org/10.1007/978-3-642-27890-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Interactive Theorem Proving Third International Conference, ITP 2012, Princeton, NJ, USA, August 13-15, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197211
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Beringer, Lennart. editor. Felty, Amy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32347-8">http://dx.doi.org/10.1007/978-3-642-32347-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Internet of Things International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197216
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Wang, Yongheng. editor. Zhang, Xiaoming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32427-7">http://dx.doi.org/10.1007/978-3-642-32427-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security VIII Special Issue on Pattern Recognition for IT Security
ent://SD_ILS/0/SD_ILS:197164
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Shi, Yun Q. editor. Katzenbeisser, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31971-6">http://dx.doi.org/10.1007/978-3-642-31971-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197168
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Safavi-Naini, Reihaneh. editor. Canetti, Ran. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32009-5">http://dx.doi.org/10.1007/978-3-642-32009-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stabilization, Safety, and Security of Distributed Systems 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197399
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Richa, Andréa W. editor. Scheideler, Christian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33536-5">http://dx.doi.org/10.1007/978-3-642-33536-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197419
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33675-1">http://dx.doi.org/10.1007/978-3-642-33675-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Voting and Identity Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197268
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Kiayias, Aggelos. editor. Lipmaa, Helger. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32747-6">http://dx.doi.org/10.1007/978-3-642-32747-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197425
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33704-8">http://dx.doi.org/10.1007/978-3-642-33704-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Ubiquitous Computing
ent://SD_ILS/0/SD_ILS:207047
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Khalil, Ismail. editor. Mantoro, Teddy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.2991/978-94-91216-71-8">http://dx.doi.org/10.2991/978-94-91216-71-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193686
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Jha, Somesh. editor. Mathuria, Anish. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194663
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Herrero, Álvaro. editor. Corchado, Emilio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21323-6">http://dx.doi.org/10.1007/978-3-642-21323-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligence Management Knowledge Driven Frameworks for Combating Terrorism and Organized Crime
ent://SD_ILS/0/SD_ILS:173369
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Akhgar, Babak. editor. Yates, Simeon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-2140-4">http://dx.doi.org/10.1007/978-1-4471-2140-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Research on Electronic Commerce, Web Application, and Communication International Conference, ECWAC 2011, Guangzhou, China, April 16-17, 2011. Proceedings, Part I
ent://SD_ILS/0/SD_ILS:194345
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Shen, Gang. editor. Huang, Xiong. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20367-1">http://dx.doi.org/10.1007/978-3-642-20367-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194568
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Bao, Feng. editor. Weng, Jian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194571
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Ardagna, Claudio A. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – AFRICACRYPT 2011 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194876
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Nitaj, Abderrahmane. editor. Pointcheval, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21969-6">http://dx.doi.org/10.1007/978-3-642-21969-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Enhancing Technologies 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194968
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Fischer-Hübner, Simone. editor. Hopper, Nicholas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22263-4">http://dx.doi.org/10.1007/978-3-642-22263-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems – CHES 2011 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195497
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Preneel, Bart. editor. Takagi, Tsuyoshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23951-9">http://dx.doi.org/10.1007/978-3-642-23951-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2010, Corfu, Greece, September 22-24, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193101
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Domingo-Ferrer, Josep. editor. Magkos, Emmanouil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15838-4">http://dx.doi.org/10.1007/978-3-642-15838-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193761
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Chung, Yongwha. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17955-6">http://dx.doi.org/10.1007/978-3-642-17955-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194738
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Lopez, Javier. editor. Tsudik, Gene. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Infrastructures, Services and Applications 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195089
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Camenisch, Jan. editor. Lambrinoudakis, Costas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22633-5">http://dx.doi.org/10.1007/978-3-642-22633-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Security Analysis and Design VI FOSAD Tutorial Lectures
ent://SD_ILS/0/SD_ILS:195231
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Aldini, Alessandro. editor. Gorrieri, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23082-0">http://dx.doi.org/10.1007/978-3-642-23082-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195578
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Rhee, Kyung-Hyune. editor. Nyang, DaeHun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 5th International Conference, ProvSec 2011, Xi’an, China, October 16-18, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195600
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Boyen, Xavier. editor. Chen, Xiaofeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24316-5">http://dx.doi.org/10.1007/978-3-642-24316-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection V 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195772
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Butts, Jonathan. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24864-1">http://dx.doi.org/10.1007/978-3-642-24864-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195856
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Iwata, Tetsu. editor. Nishigaki, Masakatsu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Systems Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195901
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Chen, Liqun. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25283-9">http://dx.doi.org/10.1007/978-3-642-25283-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195931
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings
ent://SD_ILS/0/SD_ILS:195982
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25560-1">http://dx.doi.org/10.1007/978-3-642-25560-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – INDOCRYPT 2011 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195988
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Bernstein, Daniel J. editor. Chatterjee, Sanjit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25578-6">http://dx.doi.org/10.1007/978-3-642-25578-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks Critical Information Infrastructure Protection
ent://SD_ILS/0/SD_ILS:204062
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Raghavan, S.V. editor. Dawson, E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-81-322-0277-6">http://dx.doi.org/10.1007/978-81-322-0277-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantitative Security Risk Assessment of Enterprise Networks
ent://SD_ILS/0/SD_ILS:174032
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Ou, Xinming. author. Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1860-3">http://dx.doi.org/10.1007/978-1-4614-1860-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Systems Safety Proceedings of the Nineteenth Safety-Critical Systems Symposium, Southampton, UK, 8-10th February 2011
ent://SD_ILS/0/SD_ILS:168431
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Dale, Chris. editor. Anderson, Tom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-85729-133-2">http://dx.doi.org/10.1007/978-0-85729-133-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Cryptography A Textbook for Students and Practitioners
ent://SD_ILS/0/SD_ILS:190836
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Paar, Christof. author. Pelzl, Jan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04101-3">http://dx.doi.org/10.1007/978-3-642-04101-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192544
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Steinfeld, Ron. editor. Hawkes, Philip. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Systems First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192708
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Chen, Liqun. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14597-1">http://dx.doi.org/10.1007/978-3-642-14597-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192932
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Garay, Juan A. editor. Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15317-4">http://dx.doi.org/10.1007/978-3-642-15317-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193245
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Heng, Swee-Huay. editor. Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16280-0">http://dx.doi.org/10.1007/978-3-642-16280-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Infrastructures, Services and Applications 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193296
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Martinelli, Fabio. editor. Preneel, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16441-5">http://dx.doi.org/10.1007/978-3-642-16441-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encryption for Digital Content
ent://SD_ILS/0/SD_ILS:171850
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Kiayias, Aggelos. author. Pehlivanoglu, Serdar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy and Anonymity in Information Management Systems New Techniques for New Practical Problems
ent://SD_ILS/0/SD_ILS:176195
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Nin, Jordi. editor. Herranz, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84996-238-4">http://dx.doi.org/10.1007/978-1-84996-238-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – AFRICACRYPT 2010 Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192074
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Bernstein, Daniel J. editor. Lange, Tanja. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12678-9">http://dx.doi.org/10.1007/978-3-642-12678-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptography – PKC 2010 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192187
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Nguyen, Phong Q. editor. Pointcheval, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13013-7">http://dx.doi.org/10.1007/978-3-642-13013-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192420
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Zhou, Jianying. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192472
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Hong, Seokhie. editor. Iwata, Tetsu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13858-4">http://dx.doi.org/10.1007/978-3-642-13858-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192649
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Lee, Donghoon. editor. Hong, Seokhie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Making Systems Safer Proceedings of the Eighteenth Safety-Critical Systems Symposium, Bristol, UK, 9-11th February 2010
ent://SD_ILS/0/SD_ILS:176151
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Dale, Chris. editor. Anderson, Tom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84996-086-1">http://dx.doi.org/10.1007/978-1-84996-086-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Information and Communication Security
ent://SD_ILS/0/SD_ILS:190841
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Stavroulakis, Peter. editor. Stamp, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Rollen und Berechtigungskonzepte Ansätze für das Identity- und Access Management im Unternehmen
ent://SD_ILS/0/SD_ILS:199849
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Tsolkas, Alexander. author. Schmidt, Klaus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9745-9">http://dx.doi.org/10.1007/978-3-8348-9745-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT Security Management IT Securiteers - Setting up an IT Security Function
ent://SD_ILS/0/SD_ILS:205344
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Partida, Alberto. author. Andina, Diego. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-90-481-8882-6">http://dx.doi.org/10.1007/978-90-481-8882-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Kryptologie Algebraische Methoden und Algorithmen
ent://SD_ILS/0/SD_ILS:199476
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Karpfinger, Christian. author. Kiechle, Hubert. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9356-7">http://dx.doi.org/10.1007/978-3-8348-9356-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open Source Software for Digital Forensics
ent://SD_ILS/0/SD_ILS:172432
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Huebner, Ewa. editor. Zanero, Stefano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-5803-7">http://dx.doi.org/10.1007/978-1-4419-5803-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Methods for Counterterrorism
ent://SD_ILS/0/SD_ILS:189900
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Argamon, Shlomo. editor. Howard, Newton. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01141-2">http://dx.doi.org/10.1007/978-3-642-01141-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190460
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Flegel, Ulrich. editor. Bruschi, Danilo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02918-9">http://dx.doi.org/10.1007/978-3-642-02918-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security XXIII 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190488
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Gudes, Ehud. editor. Vaidya, Jaideep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03007-9">http://dx.doi.org/10.1007/978-3-642-03007-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190657
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Dingledine, Roger. editor. Golle, Philippe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03549-4">http://dx.doi.org/10.1007/978-3-642-03549-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems - CHES 2009 11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190848
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Clavier, Christophe. editor. Gaj, Kris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04138-9">http://dx.doi.org/10.1007/978-3-642-04138-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190950
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Backes, Michael. editor. Ning, Peng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191012
2025-12-10T19:22:51Z
2025-12-10T19:22:51Z
Author Pieprzyk, Josef. editor. Zhang, Fangguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04642-1">http://dx.doi.org/10.1007/978-3-642-04642-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>