Search Results for SpringerLink (Online service) - Narrowed by: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSpringerLink$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026te$003dILS$0026ps$003d300?dt=list
2024-12-22T12:24:44Z
Cybercryptography: Applicable Cryptography for Cyberspace Security
ent://SD_ILS/0/SD_ILS:484533
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Art of War for Computer Security
ent://SD_ILS/0/SD_ILS:483808
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Madsen, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in the Electricity Sector Managing Critical Infrastructure
ent://SD_ILS/0/SD_ILS:484738
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Leszczyna, Rafał. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-19538-0">https://doi.org/10.1007/978-3-030-19538-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Blockchain Second International Conference, SmartBlock 2019, Birmingham, UK, October 11–13, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485178
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Qiu, Meikang. editor. (orcid)0000-0002-1004-0140 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34083-4">https://doi.org/10.1007/978-3-030-34083-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction
ent://SD_ILS/0/SD_ILS:483593
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Flammini, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483608
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Albrecht, Martin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introductory Computer Forensics A Hands-on Practical Approach
ent://SD_ILS/0/SD_ILS:398966
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Lin, Xiaodong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Blockchain First International Conference, SmartBlock 2018, Tokyo, Japan, December 10–12, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399024
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Qiu, Meikang. editor. (orcid)0000-0002-1004-0140 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05764-0">https://doi.org/10.1007/978-3-030-05764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Monitoring in P2P Botnets A Dual Perspective
ent://SD_ILS/0/SD_ILS:400767
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Karuppayah, Shankar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Technology - New Generations 15th International Conference on Information Technology
ent://SD_ILS/0/SD_ILS:398948
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Latifi, Shahram. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-77028-4">https://doi.org/10.1007/978-3-319-77028-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber-Physical Systems Security
ent://SD_ILS/0/SD_ILS:399914
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Koç, Çetin Kaya. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98935-8">https://doi.org/10.1007/978-3-319-98935-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
ent://SD_ILS/0/SD_ILS:401907
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Petrenko, Sergei. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Physical Layer Approaches for Securing Wireless Communication Systems
ent://SD_ILS/0/SD_ILS:332050
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Wen, Hong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332050.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-6510-2">http://dx.doi.org/10.1007/978-1-4614-6510-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334635
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Gaborit, Philippe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334635.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335197
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Stam, Martijn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335197.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PBX Security and Forensics A Practical Approach
ent://SD_ILS/0/SD_ILS:331279
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Androulidakis, Iosif I. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331279.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Information Security and Privacy III
ent://SD_ILS/0/SD_ILS:331294
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Schneier, Bruce. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331294.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334863
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334863.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334880
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Prouff, Emmanuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334880.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Communication Networking 19th EUNICE/IFIP WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334966
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Bauschert, Thomas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334966.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40552-5">http://dx.doi.org/10.1007/978-3-642-40552-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT-Risikomanagement mit System Praxisorientiertes Management von Informationssicherheits- und IT-Risiken
ent://SD_ILS/0/SD_ILS:338328
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Königs, Hans-Peter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(338328.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2165-2">http://dx.doi.org/10.1007/978-3-8348-2165-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Netzwerk- und Datensicherheit Eine praktische Einführung
ent://SD_ILS/0/SD_ILS:338406
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Kappes, Martin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(338406.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8612-5">http://dx.doi.org/10.1007/978-3-8348-8612-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Economics of Information Security and Privacy
ent://SD_ILS/0/SD_ILS:334810
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Böhme, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334810.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Authentication Problems and Solutions
ent://SD_ILS/0/SD_ILS:331610
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Jakobsson, Markus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331610.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Deterrence and IT Protection for Critical Infrastructures
ent://SD_ILS/0/SD_ILS:332909
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Martellini, Maurizio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332909.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Enterprise Identity Management Towards an Investment Decision Support Approach
ent://SD_ILS/0/SD_ILS:333923
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Royer, Denis. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333923.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35040-5">http://dx.doi.org/10.1007/978-3-642-35040-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2013 The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334122
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Dawson, Ed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334122.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334242
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Sahai, Amit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334242.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334401
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Mangard, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334401.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Grid Security First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334518
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Cuellar, Jorge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334518.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38030-3">http://dx.doi.org/10.1007/978-3-642-38030-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security and Privacy Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335073
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Felici, Massimo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335073.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41205-9">http://dx.doi.org/10.1007/978-3-642-41205-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Risikomanagement kompakt Risiken und Unsicherheiten bewerten und beherrschen
ent://SD_ILS/0/SD_ILS:337388
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Ebert, Christof. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(337388.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41048-2">http://dx.doi.org/10.1007/978-3-642-41048-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Outlier Analysis
ent://SD_ILS/0/SD_ILS:332026
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Aggarwal, Charu C. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332026.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-6396-2">http://dx.doi.org/10.1007/978-1-4614-6396-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits
ent://SD_ILS/0/SD_ILS:332116
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Peeters, Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332116.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Phone Security and Forensics A Practical Approach
ent://SD_ILS/0/SD_ILS:173990
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Androulidakis, Iosif I. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1650-0">http://dx.doi.org/10.1007/978-1-4614-1650-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196237
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Danezis, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27576-0">http://dx.doi.org/10.1007/978-3-642-27576-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday
ent://SD_ILS/0/SD_ILS:196428
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Naccache, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196562
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Cramer, Ronald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28914-9">http://dx.doi.org/10.1007/978-3-642-28914-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196738
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Laud, Peeter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197201
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Smith, Adam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32284-6">http://dx.doi.org/10.1007/978-3-642-32284-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fast Software Encryption 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197464
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Canteaut, Anne. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34047-5">http://dx.doi.org/10.1007/978-3-642-34047-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Hacks - Intensivkurs Angriff und Verteidigung mit Python
ent://SD_ILS/0/SD_ILS:195598
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Ballmann, Bastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24305-9">http://dx.doi.org/10.1007/978-3-642-24305-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Security and Security Data 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196019
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author MacKinnon, Lachlan M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25704-9">http://dx.doi.org/10.1007/978-3-642-25704-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security VII
ent://SD_ILS/0/SD_ILS:196512
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Shi, Yun Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28693-3">http://dx.doi.org/10.1007/978-3-642-28693-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197153
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Kim, Howon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2012 The Cryptographers’ Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 – March 2, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196309
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Dunkelman, Orr. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27954-6">http://dx.doi.org/10.1007/978-3-642-27954-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197303
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Keromytis, Angelos D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32946-3">http://dx.doi.org/10.1007/978-3-642-32946-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding High-Dimensional Spaces
ent://SD_ILS/0/SD_ILS:197368
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Skillicorn, David B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33398-9">http://dx.doi.org/10.1007/978-3-642-33398-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tunnel und verdeckte Kanäle im Netz Grundlagen, Protokolle, Sicherheit und Methoden
ent://SD_ILS/0/SD_ILS:198870
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Wendzel, Steffen. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2143-0">http://dx.doi.org/10.1007/978-3-8348-2143-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Crittografia nel Paese delle Meraviglie
ent://SD_ILS/0/SD_ILS:204651
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Venturi, Daniele. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-88-470-2481-6">http://dx.doi.org/10.1007/978-88-470-2481-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fast Software Encryption 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194789
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Joux, Antoine. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21702-9">http://dx.doi.org/10.1007/978-3-642-21702-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Programming Languages and Systems 9th Asian Symposium, APLAS 2011, Kenting, Taiwan, December 5-7, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195911
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Yang, Hongseok. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25318-8">http://dx.doi.org/10.1007/978-3-642-25318-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2011 The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:193925
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Kiayias, Aggelos. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19074-2">http://dx.doi.org/10.1007/978-3-642-19074-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194086
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Ishai, Yuval. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19571-6">http://dx.doi.org/10.1007/978-3-642-19571-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2011 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195141
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Rogaway, Phillip. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22792-9">http://dx.doi.org/10.1007/978-3-642-22792-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Counterterrorism and Open Source Intelligence
ent://SD_ILS/0/SD_ILS:197734
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Wiil, Uffe Kock. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-7091-0388-3">http://dx.doi.org/10.1007/978-3-7091-0388-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Risk Management Risikomanagement mit ISO/IEC 27001, 27005 und 31010
ent://SD_ILS/0/SD_ILS:199932
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Klipper, Sebastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9870-8">http://dx.doi.org/10.1007/978-3-8348-9870-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transparent User Authentication Biometrics, RFID and Behavioural Profiling
ent://SD_ILS/0/SD_ILS:168600
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Clarke, Nathan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-85729-805-8">http://dx.doi.org/10.1007/978-0-85729-805-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Preserving Privacy in Data Outsourcing
ent://SD_ILS/0/SD_ILS:172941
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Foresti, Sara. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7659-8">http://dx.doi.org/10.1007/978-1-4419-7659-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research
ent://SD_ILS/0/SD_ILS:173331
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-9866-8">http://dx.doi.org/10.1007/978-1-4419-9866-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – EUROCRYPT 2011 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194380
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Paterson, Kenneth G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20465-4">http://dx.doi.org/10.1007/978-3-642-20465-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194466
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Fehr, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20728-0">http://dx.doi.org/10.1007/978-3-642-20728-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXV 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194997
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Li, Yingjiu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22348-8">http://dx.doi.org/10.1007/978-3-642-22348-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Parallel and Distributed Computing and Networks International Conference, PDCN 2010, Chongqing, China, December 13-14, 2010. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195111
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Qi, Luo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22706-6">http://dx.doi.org/10.1007/978-3-642-22706-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195937
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Yang, Bo-Yin. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25405-5">http://dx.doi.org/10.1007/978-3-642-25405-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195967
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Chen, Liqun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Card Research and Advanced Applications 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196143
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Prouff, Emmanuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27257-8">http://dx.doi.org/10.1007/978-3-642-27257-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT-Sicherheit mit System Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung
ent://SD_ILS/0/SD_ILS:199017
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Müller, Klaus-Rainer. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8178-6">http://dx.doi.org/10.1007/978-3-8348-8178-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Metriken – der Schlüssel zum erfolgreichen Security und Compliance Monitoring Design, Implementierung und Validierung in der Praxis
ent://SD_ILS/0/SD_ILS:199028
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Sowa, Aleksandra. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8194-6">http://dx.doi.org/10.1007/978-3-8348-8194-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Embedded Devices
ent://SD_ILS/0/SD_ILS:172275
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Gebotys, Catherine H. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-1530-6">http://dx.doi.org/10.1007/978-1-4419-1530-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
sicher & mobil Sicherheit in der drahtlosen Kommunikation
ent://SD_ILS/0/SD_ILS:190513
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Osterhage, Wolfgang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03083-3">http://dx.doi.org/10.1007/978-3-642-03083-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191801
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Micciancio, Daniele. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11799-2">http://dx.doi.org/10.1007/978-3-642-11799-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology - CT-RSA 2010 The Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191839
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Pieprzyk, Josef. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11925-5">http://dx.doi.org/10.1007/978-3-642-11925-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192157
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Sendrier, Nicolas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12929-2">http://dx.doi.org/10.1007/978-3-642-12929-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2010 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192716
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Rabin, Tal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14623-7">http://dx.doi.org/10.1007/978-3-642-14623-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193421
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Ors Yalcin, Siddika Berna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16822-2">http://dx.doi.org/10.1007/978-3-642-16822-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Programming Languages and Systems 8th Asian Symposium, APLAS 2010, Shanghai, China, November 28 - December 1, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193511
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Ueda, Kazunori. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17164-2">http://dx.doi.org/10.1007/978-3-642-17164-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193582
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbuch Unternehmenssicherheit Umfassendes Sicherheits-, Kontinuitätsund Risikomanagement mit System
ent://SD_ILS/0/SD_ILS:199875
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Müller, Klaus-Rainer. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9772-5">http://dx.doi.org/10.1007/978-3-8348-9772-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Integrated Circuits and Systems
ent://SD_ILS/0/SD_ILS:166890
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Verbauwhede, Ingrid M.R. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-71829-3">http://dx.doi.org/10.1007/978-0-387-71829-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elements of Computer Security
ent://SD_ILS/0/SD_ILS:168393
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Salomon, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-85729-006-9">http://dx.doi.org/10.1007/978-0-85729-006-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191714
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Weerasinghe, Dasun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – EUROCRYPT 2010 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192256
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Gilbert, Henri. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13190-5">http://dx.doi.org/10.1007/978-3-642-13190-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security V
ent://SD_ILS/0/SD_ILS:192607
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Shi, Yun Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14298-7">http://dx.doi.org/10.1007/978-3-642-14298-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192673
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14496-7">http://dx.doi.org/10.1007/978-3-642-14496-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193040
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Schoitsch, Erwin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15651-9">http://dx.doi.org/10.1007/978-3-642-15651-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Konfliktmanagement für Sicherheitsprofis Auswege aus der „Buhmann-Falle“ für IT-Sicherheitsbeauftragte, Datenschützer und Co
ent://SD_ILS/0/SD_ILS:199750
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Klipper, Sebastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9641-4">http://dx.doi.org/10.1007/978-3-8348-9641-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Datenschutz kompakt und verständlich Eine praxisorientierte Einführung
ent://SD_ILS/0/SD_ILS:199762
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Witt, Bernhard C. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9653-7">http://dx.doi.org/10.1007/978-3-8348-9653-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sicherheit und Kryptographie im Internet Von sicherer E-Mail bis zu IP-Verschlüsselung
ent://SD_ILS/0/SD_ILS:199774
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Schwenk, Jörg. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9665-0">http://dx.doi.org/10.1007/978-3-8348-9665-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
I contenuti digitali tecnologie, diritti e libertà
ent://SD_ILS/0/SD_ILS:204402
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Lucchi, Nicola. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-88-470-1399-5">http://dx.doi.org/10.1007/978-88-470-1399-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Les virus informatiques: théorie, pratique et applications
ent://SD_ILS/0/SD_ILS:176476
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Filiol, Éric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-2-287-98240-8">http://dx.doi.org/10.1007/978-2-287-98240-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189693
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Reingold, Omer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00457-5">http://dx.doi.org/10.1007/978-3-642-00457-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – AFRICACRYPT 2009 Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190306
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Preneel, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02384-2">http://dx.doi.org/10.1007/978-3-642-02384-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - CRYPTO 2009 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190600
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Halevi, Shai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03356-8">http://dx.doi.org/10.1007/978-3-642-03356-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing Information Risk and the Economics of Security
ent://SD_ILS/0/SD_ILS:164782
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Johnson, M. Eric. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09762-6">http://dx.doi.org/10.1007/978-0-387-09762-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Algebraic Cryptanalysis
ent://SD_ILS/0/SD_ILS:167905
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Bard, Gregory V. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88757-9">http://dx.doi.org/10.1007/978-0-387-88757-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identifying Malicious Code Through Reverse Engineering
ent://SD_ILS/0/SD_ILS:167947
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Singh, Abhishek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Finite Automata and Application to Cryptography
ent://SD_ILS/0/SD_ILS:188068
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Tao, Renji. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78257-5">http://dx.doi.org/10.1007/978-3-540-78257-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2009 The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189815
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Fischlin, Marc. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00862-7">http://dx.doi.org/10.1007/978-3-642-00862-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - EUROCRYPT 2009 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189852
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Joux, Antoine. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01001-9">http://dx.doi.org/10.1007/978-3-642-01001-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evaluation of Electronic Voting Requirements and Evaluation Procedures to Support Responsible Election Authorities
ent://SD_ILS/0/SD_ILS:190078
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Volkamer, Melanie. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01662-2">http://dx.doi.org/10.1007/978-3-642-01662-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security IV
ent://SD_ILS/0/SD_ILS:190112
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Shi, Yun Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01757-5">http://dx.doi.org/10.1007/978-3-642-01757-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191307
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Desmedt, Yvo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10230-1">http://dx.doi.org/10.1007/978-3-642-10230-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191346
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191425
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Datta, Anupam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191500
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Parker, Matthew G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Programming Languages and Systems 7th Asian Symposium, APLAS 2009, Seoul, Korea, December 14-16, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191441
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Hu, Zhenjiang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10672-9">http://dx.doi.org/10.1007/978-3-642-10672-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT-Risiko-Management mit System Von den Grundlagen bis zur Realisierung – Ein praxisorientierter Leitfaden
ent://SD_ILS/0/SD_ILS:200022
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Königs, Hans-Peter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9993-4">http://dx.doi.org/10.1007/978-3-8348-9993-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing and Mining Uncertain Data
ent://SD_ILS/0/SD_ILS:164752
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Aggarwal, Charu C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09690-2">http://dx.doi.org/10.1007/978-0-387-09690-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primality Testing and Integer Factorization in Public-Key Cryptography
ent://SD_ILS/0/SD_ILS:167452
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Key Establishment
ent://SD_ILS/0/SD_ILS:167859
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Choo, Kim-Kwang Raymond. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-87969-7">http://dx.doi.org/10.1007/978-0-387-87969-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Computing Systems Challenges, Approaches and Solutions
ent://SD_ILS/0/SD_ILS:188131
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Biskup, Joachim. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78442-5">http://dx.doi.org/10.1007/978-3-540-78442-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Kryptologie Eine Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen.
ent://SD_ILS/0/SD_ILS:199715
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Beutelspacher, Albrecht. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9606-3">http://dx.doi.org/10.1007/978-3-8348-9606-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189234
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Pieprzyk, Josef. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185381
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188292
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Smart, Nigel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2008 The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188378
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Malkin, Tal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188588
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188624
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Wagner, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptanalytic Attacks on RSA
ent://SD_ILS/0/SD_ILS:166422
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security III
ent://SD_ILS/0/SD_ILS:185689
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Shi, Yun Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185981
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Zamboni, Diego. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:185991
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Atluri, Vijay. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing Systeme Konzepte und Anforderungen
ent://SD_ILS/0/SD_ILS:187607
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Müller, Thomas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76410-6">http://dx.doi.org/10.1007/978-3-540-76410-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188159
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Canetti, Ran. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:188645
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Tsudik, Gene. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Warehousing and Data Mining Techniques for Cyber Security
ent://SD_ILS/0/SD_ILS:166379
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Identity Theft: Avoidance, Causes and Possible Cures
ent://SD_ILS/0/SD_ILS:166606
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Camp, L. Jean. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Online Business Security Systems
ent://SD_ILS/0/SD_ILS:166641
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Williams, Godfried B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Grid Computing Security
ent://SD_ILS/0/SD_ILS:184773
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Chakrabarti, Anirban. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmustern
ent://SD_ILS/0/SD_ILS:185059
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Meier, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-48258-1">http://dx.doi.org/10.1007/978-3-540-48258-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186107
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Vadhan, Salil P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Anti-Spam Measures Analysis and Design
ent://SD_ILS/0/SD_ILS:186358
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Schryen, Guido. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-71750-8">http://dx.doi.org/10.1007/978-3-540-71750-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security II
ent://SD_ILS/0/SD_ILS:186739
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Shi, Yun Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187827
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Galbraith, Steven D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Resilience and Protection
ent://SD_ILS/0/SD_ILS:166891
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Hyslop, Maitland. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-71862-0">http://dx.doi.org/10.1007/978-0-387-71862-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal Correctness of Security Protocols With 62 Figures and 4 Tables
ent://SD_ILS/0/SD_ILS:185368
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Bella, Giampaolo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186573
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Naor, Moni. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187068
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Menezes, Alfred. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187720
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187727
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Cervesato, Iliano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:185591
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Nguyen, Phong Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11958239">http://dx.doi.org/10.1007/11958239</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2007 The Cryptographers’ Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:185787
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11967668">http://dx.doi.org/10.1007/11967668</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers
ent://SD_ILS/0/SD_ILS:185707
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Histories of Computing in Eastern Europe IFIP WG 9.7 International Workshop on the History of Computing, HC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznań, Poland, September 19–21, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485365
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Leslie, Christopher. editor. Schmitt, Martin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29160-0">https://doi.org/10.1007/978-3-030-29160-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483295
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Ding, Jintai. editor. Steinwandt, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Multimedia Information Security: Techniques and Applications
ent://SD_ILS/0/SD_ILS:483348
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Singh, Amit Kumar. editor. Mohan, Anand. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proactive and Dynamic Network Defense
ent://SD_ILS/0/SD_ILS:486655
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Wang, Cliff. editor. Lu, Zhuo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10597-6">https://doi.org/10.1007/978-3-030-10597-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486939
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400126
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Staggs, Jason. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ad Hoc Networks 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:401013
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Zhou, Yifeng. editor. Kunz, Thomas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-74439-1">https://doi.org/10.1007/978-3-319-74439-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Adversary Detection For Cognitive Radio Networks
ent://SD_ILS/0/SD_ILS:401405
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author He, Xiaofan. author. Dai, Huaiyu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75868-8">https://doi.org/10.1007/978-3-319-75868-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Internet Technologies and Trends First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:401813
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Patel, Zuber. editor. Gupta, Shilpi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-73712-6">https://doi.org/10.1007/978-3-319-73712-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:402205
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Sun, Guanglu. editor. Liu, Shuai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399665
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Saracino, Andrea. editor. Mori, Paolo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Multimedia First International Conference, ICSM 2018, Toulon, France, August 24–26, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399927
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Basu, Anup. editor. Berretti, Stefano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04375-9">https://doi.org/10.1007/978-3-030-04375-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Smart Grid
ent://SD_ILS/0/SD_ILS:399960
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Abdallah, Asmaa. author. Shen, Xuemin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dynamic Games for Network Security
ent://SD_ILS/0/SD_ILS:401109
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author He, Xiaofan. author. Dai, Huaiyu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:401948
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Matoušek, Petr. editor. Schmiedecker, Martin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
ent://SD_ILS/0/SD_ILS:331785
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Korzun, Dmitry. author. Gurtov, Andrei. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331785.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5483-0">http://dx.doi.org/10.1007/978-1-4614-5483-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automatic Malware Analysis An Emulator Based Approach
ent://SD_ILS/0/SD_ILS:331796
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Yin, Heng. author. Song, Dawn. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331796.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334316
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Keromytis, Angelos D. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334316.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334767
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Wang, Lingyu. editor. Shafiq, Basit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334767.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:335157
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335157.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:335160
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334878
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Capitani di Vimercati, Sabrina. editor. Mitchell, Chris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334878.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334938
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Avoine, Gildas. editor. Kara, Orhun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334938.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335057
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Accorsi, Rafael. editor. Ranise, Silvio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335057.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41098-7">http://dx.doi.org/10.1007/978-3-642-41098-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335063
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335063.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Human Aspects of Information Security, Privacy, and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334786
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Marinos, Louis. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334786.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39345-7">http://dx.doi.org/10.1007/978-3-642-39345-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334794
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Dodge, Ronald C. editor. Futcher, Lynn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334794.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IP Mobility Management for VANET
ent://SD_ILS/0/SD_ILS:332861
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Taha, Sanaa. author. Shen, Xuemin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332861.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-01351-0">http://dx.doi.org/10.1007/978-3-319-01351-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and the Networked Society
ent://SD_ILS/0/SD_ILS:332915
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Gregory, Mark A. author. Glance, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332915.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Systems 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:332976
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Bloem, Roderick. editor. Lipp, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332976.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03491-1">http://dx.doi.org/10.1007/978-3-319-03491-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:332978
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Paul, Goutam. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332978.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03515-4">http://dx.doi.org/10.1007/978-3-319-03515-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:333008
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Luiijf, Eric. editor. Hartel, Pieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333008.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sensor Systems and Software 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:333015
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Zuniga, Marco. editor. Dini, Gianluca. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333015.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-04166-7">http://dx.doi.org/10.1007/978-3-319-04166-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334097
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Knudsen, Lars R. editor. Wu, Huapeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334097.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334132
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Hoepman, Jaap-Henk. editor. Verbauwhede, Ingrid. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334132.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography – Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334179
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Abdalla, Michel. editor. Lange, Tanja. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334179.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334184
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Kurosawa, Kaoru. editor. Hanaoka, Goichiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334184.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Passive and Active Measurement 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334223
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Roughan, Matthew. editor. Chang, Rocky. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334223.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36516-4">http://dx.doi.org/10.1007/978-3-642-36516-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334519
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Deng, Robert H. editor. Feng, Tao. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334519.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334613
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Kutyłowski, Mirosław. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334613.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334616
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334616.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334720
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Boyd, Colin. editor. Simpson, Leonie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334720.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334726
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Cristofaro, Emiliano. editor. Wright, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334726.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335077
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Susilo, Willy. editor. Reyhanitabar, Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335077.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335194
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Bagchi, Aditya. editor. Ray, Indrakshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335194.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335209
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Butts, Jonathan. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335209.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45330-4">http://dx.doi.org/10.1007/978-3-642-45330-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335098
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335098.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335111
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Riis Nielson, Hanne. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335111.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41488-6">http://dx.doi.org/10.1007/978-3-642-41488-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Physical Unclonable Functions in Theory and Practice
ent://SD_ILS/0/SD_ILS:331657
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Böhm, Christoph. author. Hofer, Maximilian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331657.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5040-5">http://dx.doi.org/10.1007/978-1-4614-5040-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Wireless Implantable Medical Devices
ent://SD_ILS/0/SD_ILS:332220
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Hei, Xiali. author. Du, Xiaojiang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332220.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Android Malware
ent://SD_ILS/0/SD_ILS:332276
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Jiang, Xuxian. author. Zhou, Yajin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332276.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
ent://SD_ILS/0/SD_ILS:332461
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Tang, Jin. author. Cheng, Yu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332461.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Location Privacy Protection in Mobile Networks
ent://SD_ILS/0/SD_ILS:332468
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Liu, Xinxin. author. Li, Xiaolin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332468.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Assessment in Vehicular Networks
ent://SD_ILS/0/SD_ILS:332479
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Du, Suguo. author. Zhu, Haojin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332479.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Software Similarity and Classification
ent://SD_ILS/0/SD_ILS:173499
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Cesare, Silvio. author. Xiang, Yang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-2909-7">http://dx.doi.org/10.1007/978-1-4471-2909-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Protocol Security Analysis Based on Trusted Freshness
ent://SD_ILS/0/SD_ILS:195536
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Dong, Ling. author. Chen, Kefei. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24073-7">http://dx.doi.org/10.1007/978-3-642-24073-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
RFID. Security and Privacy 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195902
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Juels, Ari. editor. Paar, Christof. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25286-0">http://dx.doi.org/10.1007/978-3-642-25286-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196240
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Camenisch, Jan. editor. Kesdogan, Dogan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27585-2">http://dx.doi.org/10.1007/978-3-642-27585-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196588
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Pointcheval, David. editor. Johansson, Thomas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29011-4">http://dx.doi.org/10.1007/978-3-642-29011-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Interactive Theorem Proving Third International Conference, ITP 2012, Princeton, NJ, USA, August 13-15, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197211
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Beringer, Lennart. editor. Felty, Amy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32347-8">http://dx.doi.org/10.1007/978-3-642-32347-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Internet of Things International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197216
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Wang, Yongheng. editor. Zhang, Xiaoming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32427-7">http://dx.doi.org/10.1007/978-3-642-32427-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197384
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Hevia, Alejandro. editor. Neven, Gregory. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stabilization, Safety, and Security of Distributed Systems 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197399
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Richa, Andréa W. editor. Scheideler, Christian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33536-5">http://dx.doi.org/10.1007/978-3-642-33536-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197411
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Domingo-Ferrer, Josep. editor. Tinnirello, Ilenia. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33627-0">http://dx.doi.org/10.1007/978-3-642-33627-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197419
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33675-1">http://dx.doi.org/10.1007/978-3-642-33675-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197420
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33678-2">http://dx.doi.org/10.1007/978-3-642-33678-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197425
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33704-8">http://dx.doi.org/10.1007/978-3-642-33704-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics VIII 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197449
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33962-2">http://dx.doi.org/10.1007/978-3-642-33962-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Programming Languages and Systems 10th Asian Symposium, APLAS 2012, Kyoto, Japan, December 11-13, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197577
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Jhala, Ranjit. editor. Igarashi, Atsushi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35182-2">http://dx.doi.org/10.1007/978-3-642-35182-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Systems 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197598
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Mitchell, Chris J. editor. Tomlinson, Allan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35371-0">http://dx.doi.org/10.1007/978-3-642-35371-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197604
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Lee, Dong Hoon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35416-8">http://dx.doi.org/10.1007/978-3-642-35416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197566
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Venkatakrishnan, Venkat. editor. Goswami, Diganta. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35130-3">http://dx.doi.org/10.1007/978-3-642-35130-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Enhancing Technologies 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197124
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Fischer-Hübner, Simone. editor. Wright, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31680-7">http://dx.doi.org/10.1007/978-3-642-31680-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security VIII Special Issue on Pattern Recognition for IT Security
ent://SD_ILS/0/SD_ILS:197164
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Shi, Yun Q. editor. Katzenbeisser, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31971-6">http://dx.doi.org/10.1007/978-3-642-31971-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197168
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Safavi-Naini, Reihaneh. editor. Canetti, Ran. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32009-5">http://dx.doi.org/10.1007/978-3-642-32009-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Voting and Identity Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197268
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Kiayias, Aggelos. editor. Lipmaa, Helger. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32747-6">http://dx.doi.org/10.1007/978-3-642-32747-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197475
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Research in Cryptology 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197481
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Armknecht, Frederik. editor. Lucks, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34159-5">http://dx.doi.org/10.1007/978-3-642-34159-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 – November 2, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197492
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Jøsang, Audun. editor. Carlsson, Bengt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34210-3">http://dx.doi.org/10.1007/978-3-642-34210-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Decision and Game Theory for Security Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197500
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Grossklags, Jens. editor. Walrand, Jean. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34266-0">http://dx.doi.org/10.1007/978-3-642-34266-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197516
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Bogdanov, Andrey. editor. Sanadhya, Somitra. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34416-9">http://dx.doi.org/10.1007/978-3-642-34416-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197557
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Galbraith, Steven. editor. Nandi, Mridul. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34931-7">http://dx.doi.org/10.1007/978-3-642-34931-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197559
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197638
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Butts, Jonathan. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35764-0">http://dx.doi.org/10.1007/978-3-642-35764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
ent://SD_ILS/0/SD_ILS:198953
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Achieving Systems Safety Proceedings of the Twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012
ent://SD_ILS/0/SD_ILS:173458
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Dale, Chris. editor. Anderson, Tom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-2494-8">http://dx.doi.org/10.1007/978-1-4471-2494-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Collaborative Financial Infrastructure Protection Tools, Abstractions, and Middleware
ent://SD_ILS/0/SD_ILS:194366
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Baldoni, Roberto. editor. Chockler, Gregory. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20420-3">http://dx.doi.org/10.1007/978-3-642-20420-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196291
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Jung, Souhwan. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27890-7">http://dx.doi.org/10.1007/978-3-642-27890-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196459
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Miri, Ali. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28496-0">http://dx.doi.org/10.1007/978-3-642-28496-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197072
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Mitrokotsa, Aikaterini. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31410-0">http://dx.doi.org/10.1007/978-3-642-31410-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communication Technologies 18th EUNICE/ IFIP WG 6.2, 6.6 International Conference, EUNICE 2012, Budapest, Hungary, August 29-31, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197281
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Szabó, Róbert. editor. Vidács, Attila. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32808-4">http://dx.doi.org/10.1007/978-3-642-32808-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Management 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197291
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Jonker, Willem. editor. Petković, Milan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32873-2">http://dx.doi.org/10.1007/978-3-642-32873-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197299
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Visconti, Ivan. editor. Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32928-9">http://dx.doi.org/10.1007/978-3-642-32928-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems – CHES 2012 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197310
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Prouff, Emmanuel. editor. Schaumont, Patrick. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33027-8">http://dx.doi.org/10.1007/978-3-642-33027-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Ubiquitous Computing
ent://SD_ILS/0/SD_ILS:207047
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Khalil, Ismail. editor. Mantoro, Teddy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.2991/978-94-91216-71-8">http://dx.doi.org/10.2991/978-94-91216-71-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligence Management Knowledge Driven Frameworks for Combating Terrorism and Organized Crime
ent://SD_ILS/0/SD_ILS:173369
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Akhgar, Babak. editor. Yates, Simeon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-2140-4">http://dx.doi.org/10.1007/978-1-4471-2140-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2010, Corfu, Greece, September 22-24, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193101
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Domingo-Ferrer, Josep. editor. Magkos, Emmanouil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15838-4">http://dx.doi.org/10.1007/978-3-642-15838-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193686
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Jha, Somesh. editor. Mathuria, Anish. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193761
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Chung, Yongwha. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17955-6">http://dx.doi.org/10.1007/978-3-642-17955-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194568
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Bao, Feng. editor. Weng, Jian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194571
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Ardagna, Claudio A. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Security Analysis and Design VI FOSAD Tutorial Lectures
ent://SD_ILS/0/SD_ILS:195231
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Aldini, Alessandro. editor. Gorrieri, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23082-0">http://dx.doi.org/10.1007/978-3-642-23082-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195931
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection V 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195772
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Butts, Jonathan. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24864-1">http://dx.doi.org/10.1007/978-3-642-24864-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194738
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Lopez, Javier. editor. Tsudik, Gene. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194663
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Herrero, Álvaro. editor. Corchado, Emilio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21323-6">http://dx.doi.org/10.1007/978-3-642-21323-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – AFRICACRYPT 2011 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194876
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Nitaj, Abderrahmane. editor. Pointcheval, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21969-6">http://dx.doi.org/10.1007/978-3-642-21969-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Enhancing Technologies 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194968
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Fischer-Hübner, Simone. editor. Hopper, Nicholas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22263-4">http://dx.doi.org/10.1007/978-3-642-22263-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195578
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Rhee, Kyung-Hyune. editor. Nyang, DaeHun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems – CHES 2011 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195497
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Preneel, Bart. editor. Takagi, Tsuyoshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23951-9">http://dx.doi.org/10.1007/978-3-642-23951-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 5th International Conference, ProvSec 2011, Xi’an, China, October 16-18, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195600
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Boyen, Xavier. editor. Chen, Xiaofeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24316-5">http://dx.doi.org/10.1007/978-3-642-24316-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195856
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Iwata, Tetsu. editor. Nishigaki, Masakatsu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – INDOCRYPT 2011 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195988
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Bernstein, Daniel J. editor. Chatterjee, Sanjit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25578-6">http://dx.doi.org/10.1007/978-3-642-25578-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Systems Safety Proceedings of the Nineteenth Safety-Critical Systems Symposium, Southampton, UK, 8-10th February 2011
ent://SD_ILS/0/SD_ILS:168431
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Dale, Chris. editor. Anderson, Tom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-85729-133-2">http://dx.doi.org/10.1007/978-0-85729-133-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantitative Security Risk Assessment of Enterprise Networks
ent://SD_ILS/0/SD_ILS:174032
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Ou, Xinming. author. Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1860-3">http://dx.doi.org/10.1007/978-1-4614-1860-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks Critical Information Infrastructure Protection
ent://SD_ILS/0/SD_ILS:204062
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Raghavan, S.V. editor. Dawson, E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-81-322-0277-6">http://dx.doi.org/10.1007/978-81-322-0277-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Research on Electronic Commerce, Web Application, and Communication International Conference, ECWAC 2011, Guangzhou, China, April 16-17, 2011. Proceedings, Part I
ent://SD_ILS/0/SD_ILS:194345
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Shen, Gang. editor. Huang, Xiong. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20367-1">http://dx.doi.org/10.1007/978-3-642-20367-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Infrastructures, Services and Applications 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195089
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Camenisch, Jan. editor. Lambrinoudakis, Costas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22633-5">http://dx.doi.org/10.1007/978-3-642-22633-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Systems Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195901
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Chen, Liqun. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25283-9">http://dx.doi.org/10.1007/978-3-642-25283-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings
ent://SD_ILS/0/SD_ILS:195982
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25560-1">http://dx.doi.org/10.1007/978-3-642-25560-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encryption for Digital Content
ent://SD_ILS/0/SD_ILS:171850
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Kiayias, Aggelos. author. Pehlivanoglu, Serdar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open Source Software for Digital Forensics
ent://SD_ILS/0/SD_ILS:172432
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Huebner, Ewa. editor. Zanero, Stefano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-5803-7">http://dx.doi.org/10.1007/978-1-4419-5803-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy and Anonymity in Information Management Systems New Techniques for New Practical Problems
ent://SD_ILS/0/SD_ILS:176195
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Nin, Jordi. editor. Herranz, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84996-238-4">http://dx.doi.org/10.1007/978-1-84996-238-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Making Systems Safer Proceedings of the Eighteenth Safety-Critical Systems Symposium, Bristol, UK, 9-11th February 2010
ent://SD_ILS/0/SD_ILS:176151
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Dale, Chris. editor. Anderson, Tom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84996-086-1">http://dx.doi.org/10.1007/978-1-84996-086-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – AFRICACRYPT 2010 Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192074
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Bernstein, Daniel J. editor. Lange, Tanja. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12678-9">http://dx.doi.org/10.1007/978-3-642-12678-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192472
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Hong, Seokhie. editor. Iwata, Tetsu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13858-4">http://dx.doi.org/10.1007/978-3-642-13858-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192544
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Steinfeld, Ron. editor. Hawkes, Philip. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192649
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Lee, Donghoon. editor. Hong, Seokhie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Systems First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192708
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Chen, Liqun. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14597-1">http://dx.doi.org/10.1007/978-3-642-14597-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193245
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Heng, Swee-Huay. editor. Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16280-0">http://dx.doi.org/10.1007/978-3-642-16280-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Infrastructures, Services and Applications 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193296
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Martinelli, Fabio. editor. Preneel, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16441-5">http://dx.doi.org/10.1007/978-3-642-16441-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Cryptography A Textbook for Students and Practitioners
ent://SD_ILS/0/SD_ILS:190836
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Paar, Christof. author. Pelzl, Jan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04101-3">http://dx.doi.org/10.1007/978-3-642-04101-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Information and Communication Security
ent://SD_ILS/0/SD_ILS:190841
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Stavroulakis, Peter. editor. Stamp, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Kryptologie Algebraische Methoden und Algorithmen
ent://SD_ILS/0/SD_ILS:199476
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Karpfinger, Christian. author. Kiechle, Hubert. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9356-7">http://dx.doi.org/10.1007/978-3-8348-9356-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT Security Management IT Securiteers - Setting up an IT Security Function
ent://SD_ILS/0/SD_ILS:205344
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Partida, Alberto. author. Andina, Diego. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-90-481-8882-6">http://dx.doi.org/10.1007/978-90-481-8882-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptography – PKC 2010 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192187
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Nguyen, Phong Q. editor. Pointcheval, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13013-7">http://dx.doi.org/10.1007/978-3-642-13013-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192420
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Zhou, Jianying. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192932
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Garay, Juan A. editor. Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15317-4">http://dx.doi.org/10.1007/978-3-642-15317-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Rollen und Berechtigungskonzepte Ansätze für das Identity- und Access Management im Unternehmen
ent://SD_ILS/0/SD_ILS:199849
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Tsolkas, Alexander. author. Schmidt, Klaus. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9745-9">http://dx.doi.org/10.1007/978-3-8348-9745-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust Management for Service-Oriented Environments
ent://SD_ILS/0/SD_ILS:171928
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Malik, Zaki. author. Bouguettaya, Athman. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0310-5">http://dx.doi.org/10.1007/978-1-4419-0310-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security XXIII 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190488
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Gudes, Ehud. editor. Vaidya, Jaideep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03007-9">http://dx.doi.org/10.1007/978-3-642-03007-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190460
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Flegel, Ulrich. editor. Bruschi, Danilo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02918-9">http://dx.doi.org/10.1007/978-3-642-02918-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190657
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Dingledine, Roger. editor. Golle, Philippe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03549-4">http://dx.doi.org/10.1007/978-3-642-03549-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:191078
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Takagi, Tsuyoshi. editor. Mambo, Masahiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stabilization, Safety, and Security of Distributed Systems 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191165
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Guerraoui, Rachid. editor. Petit, Franck. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05118-0">http://dx.doi.org/10.1007/978-3-642-05118-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
iNetSec 2009 – Open Research Problems in Network Security IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191270
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Camenisch, Jan. editor. Kesdogan, Dogan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05437-2">http://dx.doi.org/10.1007/978-3-642-05437-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Initiatives to Secure Cyberspace An Emerging Landscape
ent://SD_ILS/0/SD_ILS:164783
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Portnoy, Michael. editor. Goodman, Seymour. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Engineering for Service-Oriented Architectures
ent://SD_ILS/0/SD_ILS:188468
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Hafner, Michael. author. Breu, Ruth. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79539-1">http://dx.doi.org/10.1007/978-3-540-79539-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Global Computing 4th International Symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189836
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Kaklamanis, Christos. editor. Nielson, Flemming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00945-7">http://dx.doi.org/10.1007/978-3-642-00945-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Methods for Counterterrorism
ent://SD_ILS/0/SD_ILS:189900
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Argamon, Shlomo. editor. Howard, Newton. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01141-2">http://dx.doi.org/10.1007/978-3-642-01141-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189928
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Gritzalis, Dimitris. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01244-0">http://dx.doi.org/10.1007/978-3-642-01244-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Voting and Identity Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190847
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Ryan, Peter Y. A. editor. Schoenmakers, Berry. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04135-8">http://dx.doi.org/10.1007/978-3-642-04135-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems - CHES 2009 11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190848
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Clavier, Christophe. editor. Gaj, Kris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04138-9">http://dx.doi.org/10.1007/978-3-642-04138-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190950
2024-12-22T12:24:44Z
2024-12-22T12:24:44Z
Author Backes, Michael. editor. Ning, Peng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>