Search Results for Computer security.SirsiDynix Enterprisehttps://tarama.pau.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bsecurity.$0026ps$003d300?2026-04-02T07:18:59ZGuide to Computer Network Securityent://SD_ILS/0/SD_ILS:711402026-04-02T07:18:59Z2026-04-02T07:18:59Zby Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6654-2">http://dx.doi.org/10.1007/978-1-4471-6654-2</a><br/>Format: Electronic Resources<br/>Guide to Computer Network Securityent://SD_ILS/0/SD_ILS:706672026-04-02T07:18:59Z2026-04-02T07:18:59Zby Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-4543-1">http://dx.doi.org/10.1007/978-1-4471-4543-1</a><br/>Format: Electronic Resources<br/>What Is Computer Science? An Information Security Perspectiveent://SD_ILS/0/SD_ILS:755442026-04-02T07:18:59Z2026-04-02T07:18:59Zby Page, Daniel. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04042-4">http://dx.doi.org/10.1007/978-3-319-04042-4</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014. Proceedingsent://SD_ILS/0/SD_ILS:775942026-04-02T07:18:59Z2026-04-02T07:18:59Zby Bondavalli, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10506-2">http://dx.doi.org/10.1007/978-3-319-10506-2</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedingsent://SD_ILS/0/SD_ILS:837612026-04-02T07:18:59Z2026-04-02T07:18:59Zby Bitsch, Friedemann. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40793-2">http://dx.doi.org/10.1007/978-3-642-40793-2</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015, Proceedingsent://SD_ILS/0/SD_ILS:809492026-04-02T07:18:59Z2026-04-02T07:18:59Zby Koornneef, Floor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24255-2">http://dx.doi.org/10.1007/978-3-319-24255-2</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedingsent://SD_ILS/0/SD_ILS:836052026-04-02T07:18:59Z2026-04-02T07:18:59Zby Crampton, Jason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedingsent://SD_ILS/0/SD_ILS:773812026-04-02T07:18:59Z2026-04-02T07:18:59Zby Yoshida, Maki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09843-2">http://dx.doi.org/10.1007/978-3-319-09843-2</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:807312026-04-02T07:18:59Z2026-04-02T07:18:59Zby Tanaka, Keisuke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22425-1">http://dx.doi.org/10.1007/978-3-319-22425-1</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedingsent://SD_ILS/0/SD_ILS:839092026-04-02T07:18:59Z2026-04-02T07:18:59Zby Sakiyama, Kazuo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedingsent://SD_ILS/0/SD_ILS:843312026-04-02T07:18:59Z2026-04-02T07:18:59Zby Martínez Pérez, Gregorio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54525-2">http://dx.doi.org/10.1007/978-3-642-54525-2</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part Ient://SD_ILS/0/SD_ILS:778172026-04-02T07:18:59Z2026-04-02T07:18:59Zby Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11203-9">http://dx.doi.org/10.1007/978-3-319-11203-9</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part IIent://SD_ILS/0/SD_ILS:778202026-04-02T07:18:59Z2026-04-02T07:18:59Zby Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11212-1">http://dx.doi.org/10.1007/978-3-319-11212-1</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:809422026-04-02T07:18:59Z2026-04-02T07:18:59Zby Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:809412026-04-02T07:18:59Z2026-04-02T07:18:59Zby Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedingsent://SD_ILS/0/SD_ILS:809482026-04-02T07:18:59Z2026-04-02T07:18:59Zby Koornneef, Floor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24249-1">http://dx.doi.org/10.1007/978-3-319-24249-1</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014. Proceedingsent://SD_ILS/0/SD_ILS:776112026-04-02T07:18:59Z2026-04-02T07:18:59Zby Bondavalli, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10557-4">http://dx.doi.org/10.1007/978-3-319-10557-4</a><br/>Format: Electronic Resources<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:1171982026-04-02T07:18:59Z2026-04-02T07:18:59Zby Elbahadır, Hamza. author<br/>Format: Books<br/>IV. Ağ ve bilgi sempozyumu : bildiriler kitabı, Atılım Üniversitesi, 25-26 Kasım 2011ent://SD_ILS/0/SD_ILS:480822026-04-02T07:18:59Z2026-04-02T07:18:59Zby Ağ ve Bilgi Güvenliği Sempozyumu (4th : 2011 : Ankara, Turkey)<br/>Format: Books<br/>Aldatma sanatı : güvenliğin insan boyutunun kullanılmasıent://SD_ILS/0/SD_ILS:202382026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mitnick, Kevin D.<br/>Format: Books<br/>Aldatma sanatı : Bilgi güvenliğinde insan faktörünün kullanılmasıent://SD_ILS/0/SD_ILS:572942026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mitnick, Kevin D.<br/>Format: Books<br/>Ulusal bilgi güvenliği : strateji ve kurumsal yapılanmaent://SD_ILS/0/SD_ILS:680232026-04-02T07:18:59Z2026-04-02T07:18:59Zby Güngör, Murat<br/>Format: Books<br/>Sızma Sanatıent://SD_ILS/0/SD_ILS:572982026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mitnick, Kevin D. (Kevin David), 1963-<br/>Format: Books<br/>Bilişimin karanlık yüzüent://SD_ILS/0/SD_ILS:1258142026-04-02T07:18:59Z2026-04-02T07:18:59Zby Burlu, Kamil, yazar.<br/>Format: Books<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:380702026-04-02T07:18:59Z2026-04-02T07:18:59Zby Winkler, Ira.<br/>Tam Metin Erişim Linki <a href="http://site.ebrary.com/lib/pamukkale/Top?layout=document&id=10196336">electronic book</a><br/>Format: Electronic Resources<br/>How to break software security : effective techniques for security testingent://SD_ILS/0/SD_ILS:482102026-04-02T07:18:59Z2026-04-02T07:18:59Zby Whittaker, James A., 1965-<br/>Format: Electronic Resources<br/>Terminal compromiseent://SD_ILS/0/SD_ILS:437532026-04-02T07:18:59Z2026-04-02T07:18:59Zby Schwartau, Winn.<br/>Tam metin erişim linki <a href="http://www.netlibrary.com/urlapi.asp?action=summary&v=1&bookid=2009627">http://www.netlibrary.com/urlapi.asp?action=summary&v=1&bookid=2009627</a><br/>Format: Electronic Resources<br/>Practical cryptographyent://SD_ILS/0/SD_ILS:200482026-04-02T07:18:59Z2026-04-02T07:18:59Zby Ferguson, Niels.<br/>Format: Books<br/>Yeni başlayanlar için bilgi güvenliği ve uygulamalı hacking yöntemlerient://SD_ILS/0/SD_ILS:1110232026-04-02T07:18:59Z2026-04-02T07:18:59Zby Aslanbakan, Enes,<br/>Format: Books<br/>Trustworthy Computing and Services International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:850072026-04-02T07:18:59Z2026-04-02T07:18:59Zby Yuan, Yuyu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43908-1">http://dx.doi.org/10.1007/978-3-662-43908-1</a><br/>Format: Electronic Resources<br/>Information Security 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedingsent://SD_ILS/0/SD_ILS:808532026-04-02T07:18:59Z2026-04-02T07:18:59Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23318-5">http://dx.doi.org/10.1007/978-3-319-23318-5</a><br/>Format: Electronic Resources<br/>ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conferenceent://SD_ILS/0/SD_ILS:848882026-04-02T07:18:59Z2026-04-02T07:18:59Zby Reimer, Helmut. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-658-10934-9">http://dx.doi.org/10.1007/978-3-658-10934-9</a><br/>Format: Electronic Resources<br/>ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conferenceent://SD_ILS/0/SD_ILS:847422026-04-02T07:18:59Z2026-04-02T07:18:59Zby Reimer, Helmut. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-658-06708-3">http://dx.doi.org/10.1007/978-3-658-06708-3</a><br/>Format: Electronic Resources<br/>International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:809072026-04-02T07:18:59Z2026-04-02T07:18:59Zby Tian, Jing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23829-6">http://dx.doi.org/10.1007/978-3-319-23829-6</a><br/>Format: Electronic Resources<br/>International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:809032026-04-02T07:18:59Z2026-04-02T07:18:59Zby Tian, Jing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23802-9">http://dx.doi.org/10.1007/978-3-319-23802-9</a><br/>Format: Electronic Resources<br/>Etik hackerlığa giriş : ofansif siber güvenliğin ABC’si!ent://SD_ILS/0/SD_ILS:1110422026-04-02T07:18:59Z2026-04-02T07:18:59Zby Bülbül, İsmail.<br/>Format: Books<br/>Anne ben hacker oluyorument://SD_ILS/0/SD_ILS:1257942026-04-02T07:18:59Z2026-04-02T07:18:59Zby Bozkurtlar, Burak.<br/>Format: Books<br/>Linux güvenliğient://SD_ILS/0/SD_ILS:325812026-04-02T07:18:59Z2026-04-02T07:18:59Zby Barrett, Daniel J.<br/>Format: Books<br/>Aspect-Oriented Security Hardening of UML Design Modelsent://SD_ILS/0/SD_ILS:792922026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mouheb, Djedjiga. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16106-8">http://dx.doi.org/10.1007/978-3-319-16106-8</a><br/>Format: Electronic Resources<br/>Dijital güvenlik : dijital ortamlarda güvenle var olmakent://SD_ILS/0/SD_ILS:1197372026-04-02T07:18:59Z2026-04-02T07:18:59Zby Özer, Fatih.<br/>Format: Books<br/>Fundamentals of Sketch-Based Passwords A General Frameworkent://SD_ILS/0/SD_ILS:785672026-04-02T07:18:59Z2026-04-02T07:18:59Zby Riggan, Benjamin S. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13629-5">http://dx.doi.org/10.1007/978-3-319-13629-5</a><br/>Format: Electronic Resources<br/>ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conferenceent://SD_ILS/0/SD_ILS:846202026-04-02T07:18:59Z2026-04-02T07:18:59Zby Reimer, Helmut. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-658-03371-2">http://dx.doi.org/10.1007/978-3-658-03371-2</a><br/>Format: Electronic Resources<br/>ISA server 2006ent://SD_ILS/0/SD_ILS:686662026-04-02T07:18:59Z2026-04-02T07:18:59Zby İnan, Yüksel.<br/>Format: Books<br/>Elektronik ticarete ilişkin bazı temel belgeler.ent://SD_ILS/0/SD_ILS:1066552026-04-02T07:18:59Z2026-04-02T07:18:59ZFormat: Books<br/>Wireless Networks and Security Issues, Challenges and Research Trendsent://SD_ILS/0/SD_ILS:825482026-04-02T07:18:59Z2026-04-02T07:18:59Zby Khan, Shafiullah. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36169-2">http://dx.doi.org/10.1007/978-3-642-36169-2</a><br/>Format: Electronic Resources<br/>Iris Biometrics From Segmentation to Template Securityent://SD_ILS/0/SD_ILS:718242026-04-02T07:18:59Z2026-04-02T07:18:59Zby Rathgeb, Christian. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-5571-4">http://dx.doi.org/10.1007/978-1-4614-5571-4</a><br/>Format: Electronic Resources<br/>Hacking : bilişim korsanlığı ve korunma yöntemlerient://SD_ILS/0/SD_ILS:1257852026-04-02T07:18:59Z2026-04-02T07:18:59Zby Yılmaz, Davut.<br/>Format: Books<br/>Future Network Systems and Security First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedingsent://SD_ILS/0/SD_ILS:801442026-04-02T07:18:59Z2026-04-02T07:18:59Zby Doss, Robin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19210-9">http://dx.doi.org/10.1007/978-3-319-19210-9</a><br/>Format: Electronic Resources<br/>Computer Networks and Distributed Systems International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:777222026-04-02T07:18:59Z2026-04-02T07:18:59Zby Jahangir, Amir Hossein. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10903-9">http://dx.doi.org/10.1007/978-3-319-10903-9</a><br/>Format: Electronic Resources<br/>Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:852182026-04-02T07:18:59Z2026-04-02T07:18:59Zby Kotulski, Zbigniew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44893-9">http://dx.doi.org/10.1007/978-3-662-44893-9</a><br/>Format: Electronic Resources<br/>Hacker’ın aklı Türkiye’nin ilk bilgisayar korsanının anılarıent://SD_ILS/0/SD_ILS:1257932026-04-02T07:18:59Z2026-04-02T07:18:59Zby Şahin, Tamer<br/>Format: Books<br/>Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:758962026-04-02T07:18:59Z2026-04-02T07:18:59Zby Kim, Yongdae. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05149-9">http://dx.doi.org/10.1007/978-3-319-05149-9</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:853622026-04-02T07:18:59Z2026-04-02T07:18:59Zby Batten, Lynn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45670-5">http://dx.doi.org/10.1007/978-3-662-45670-5</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedingsent://SD_ILS/0/SD_ILS:753832026-04-02T07:18:59Z2026-04-02T07:18:59Zby Paul, Goutam. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03515-4">http://dx.doi.org/10.1007/978-3-319-03515-4</a><br/>Format: Electronic Resources<br/>Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:805792026-04-02T07:18:59Z2026-04-02T07:18:59Zby Ors, Berna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21356-9">http://dx.doi.org/10.1007/978-3-319-21356-9</a><br/>Format: Electronic Resources<br/>Security for Cloud Storage Systemsent://SD_ILS/0/SD_ILS:724982026-04-02T07:18:59Z2026-04-02T07:18:59Zby Yang, Kan. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7873-7">http://dx.doi.org/10.1007/978-1-4614-7873-7</a><br/>Format: Electronic Resources<br/>Building the Infrastructure for Cloud Security A Solutions viewent://SD_ILS/0/SD_ILS:702362026-04-02T07:18:59Z2026-04-02T07:18:59Zby Yeluri, Raghu. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6146-9">http://dx.doi.org/10.1007/978-1-4302-6146-9</a><br/>Format: Electronic Resources<br/>Continued Rise of the Cloud Advances and Trends in Cloud Computingent://SD_ILS/0/SD_ILS:710762026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6452-4">http://dx.doi.org/10.1007/978-1-4471-6452-4</a><br/>Format: Electronic Resources<br/>Cyber Operations Building, Defending, and Attacking Modern Computer Networksent://SD_ILS/0/SD_ILS:731272026-04-02T07:18:59Z2026-04-02T07:18:59Zby O'Leary, Mike. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4842-0457-3">http://dx.doi.org/10.1007/978-1-4842-0457-3</a><br/>Format: Electronic Resources<br/>Bio-inspiring Cyber Security and Cloud Services: Trends and Innovationsent://SD_ILS/0/SD_ILS:849482026-04-02T07:18:59Z2026-04-02T07:18:59Zby Hassanien, Aboul Ella. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43616-5">http://dx.doi.org/10.1007/978-3-662-43616-5</a><br/>Format: Electronic Resources<br/>Dijital kaleent://SD_ILS/0/SD_ILS:167482026-04-02T07:18:59Z2026-04-02T07:18:59Zby Brown, Dan, 1964-<br/>Format: Books<br/>TBMM'de fiziksel ve sanal güvenlik analizient://SD_ILS/0/SD_ILS:563622026-04-02T07:18:59Z2026-04-02T07:18:59Zby Yıldırım, Hakan<br/>Format: Books<br/>Computational Intelligence in Digital Forensics: Forensic Investigation and Applicationsent://SD_ILS/0/SD_ILS:761222026-04-02T07:18:59Z2026-04-02T07:18:59Zby Muda, Azah Kamilah. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05885-6">http://dx.doi.org/10.1007/978-3-319-05885-6</a><br/>Format: Electronic Resources<br/>Dijital imza rehberient://SD_ILS/0/SD_ILS:171922026-04-02T07:18:59Z2026-04-02T07:18:59Zby Bulut, Müge.<br/>Format: Books<br/>Mobility Data Management and Explorationent://SD_ILS/0/SD_ILS:734642026-04-02T07:18:59Z2026-04-02T07:18:59Zby Pelekis, Nikos. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0392-4">http://dx.doi.org/10.1007/978-1-4939-0392-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedingsent://SD_ILS/0/SD_ILS:766492026-04-02T07:18:59Z2026-04-02T07:18:59Zby Boureanu, Ioana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07536-5">http://dx.doi.org/10.1007/978-3-319-07536-5</a><br/>Format: Electronic Resources<br/>Secure IT Systems 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:779432026-04-02T07:18:59Z2026-04-02T07:18:59Zby Bernsmed, Karin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11599-3">http://dx.doi.org/10.1007/978-3-319-11599-3</a><br/>Format: Electronic Resources<br/>Siber casusluk : siber casusluk yöntemleri ve karşı tedbirlerent://SD_ILS/0/SD_ILS:1180892026-04-02T07:18:59Z2026-04-02T07:18:59Zby Şişman, Murat, yazar.<br/>Format: Books<br/>Primer on Client-Side Web Securityent://SD_ILS/0/SD_ILS:781422026-04-02T07:18:59Z2026-04-02T07:18:59Zby De Ryck, Philippe. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12226-7">http://dx.doi.org/10.1007/978-3-319-12226-7</a><br/>Format: Electronic Resources<br/>Trusted Systems 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedingsent://SD_ILS/0/SD_ILS:753752026-04-02T07:18:59Z2026-04-02T07:18:59Zby Bloem, Roderick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03491-1">http://dx.doi.org/10.1007/978-3-319-03491-1</a><br/>Format: Electronic Resources<br/>Security for Wireless Implantable Medical Devicesent://SD_ILS/0/SD_ILS:722892026-04-02T07:18:59Z2026-04-02T07:18:59Zby Hei, Xiali. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format: Electronic Resources<br/>Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systemsent://SD_ILS/0/SD_ILS:892122026-04-02T07:18:59Z2026-04-02T07:18:59Zby Hong, Y.-W. Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-981-4560-14-6">http://dx.doi.org/10.1007/978-981-4560-14-6</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:831312026-04-02T07:18:59Z2026-04-02T07:18:59Zby Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format: Electronic Resources<br/>Physical Layer Approaches for Securing Wireless Communication Systemsent://SD_ILS/0/SD_ILS:720882026-04-02T07:18:59Z2026-04-02T07:18:59Zby Wen, Hong. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-6510-2">http://dx.doi.org/10.1007/978-1-4614-6510-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Social Networksent://SD_ILS/0/SD_ILS:714242026-04-02T07:18:59Z2026-04-02T07:18:59Zby Altshuler, Yaniv. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-4139-7">http://dx.doi.org/10.1007/978-1-4614-4139-7</a><br/>Format: Electronic Resources<br/>Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedingsent://SD_ILS/0/SD_ILS:786362026-04-02T07:18:59Z2026-04-02T07:18:59Zby Prakash, Atul. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13841-1">http://dx.doi.org/10.1007/978-3-319-13841-1</a><br/>Format: Electronic Resources<br/>Risk Assessment and Risk-Driven Testing First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:765042026-04-02T07:18:59Z2026-04-02T07:18:59Zby Bauer, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07076-6">http://dx.doi.org/10.1007/978-3-319-07076-6</a><br/>Format: Electronic Resources<br/>Cyber-Development, Cyber-Democracy and Cyber-Defense Challenges, Opportunities and Implications for Theory, Policy and Practiceent://SD_ILS/0/SD_ILS:736312026-04-02T07:18:59Z2026-04-02T07:18:59Zby Carayannis, Elias G. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-1028-1">http://dx.doi.org/10.1007/978-1-4939-1028-1</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedingsent://SD_ILS/0/SD_ILS:857052026-04-02T07:18:59Z2026-04-02T07:18:59Zby Niu, Wenjia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48683-2">http://dx.doi.org/10.1007/978-3-662-48683-2</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedingsent://SD_ILS/0/SD_ILS:807992026-04-02T07:18:59Z2026-04-02T07:18:59Zby Abawajy, Jemal H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22915-7">http://dx.doi.org/10.1007/978-3-319-22915-7</a><br/>Format: Electronic Resources<br/>Automated Security Managementent://SD_ILS/0/SD_ILS:748042026-04-02T07:18:59Z2026-04-02T07:18:59Zby Al-Shaer, Ehab. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-01433-3">http://dx.doi.org/10.1007/978-3-319-01433-3</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:839342026-04-02T07:18:59Z2026-04-02T07:18:59Zby Hämmerli, Bernhard M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41485-5">http://dx.doi.org/10.1007/978-3-642-41485-5</a><br/>Format: Electronic Resources<br/>Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedingsent://SD_ILS/0/SD_ILS:839352026-04-02T07:18:59Z2026-04-02T07:18:59Zby Riis Nielson, Hanne. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41488-6">http://dx.doi.org/10.1007/978-3-642-41488-6</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:835202026-04-02T07:18:59Z2026-04-02T07:18:59Zby Rogers, Marcus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39891-9">http://dx.doi.org/10.1007/978-3-642-39891-9</a><br/>Format: Electronic Resources<br/>Türkiye'den örneklerle e-iş gerçeği: yönetici ve e-iş, pazarlama ve e-iş, satış ve e-iş, hizmet ve e-iş, e-rota.ent://SD_ILS/0/SD_ILS:1064662026-04-02T07:18:59Z2026-04-02T07:18:59ZFormat: Books<br/>Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applicationsent://SD_ILS/0/SD_ILS:808492026-04-02T07:18:59Z2026-04-02T07:18:59Zby Lu, Zhou. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23288-1">http://dx.doi.org/10.1007/978-3-319-23288-1</a><br/>Format: Electronic Resources<br/>QC-LDPC Code-Based Cryptographyent://SD_ILS/0/SD_ILS:751382026-04-02T07:18:59Z2026-04-02T07:18:59Zby Baldi, Marco. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02556-8">http://dx.doi.org/10.1007/978-3-319-02556-8</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:795562026-04-02T07:18:59Z2026-04-02T07:18:59Zby Cuppens, Frédéric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17040-4">http://dx.doi.org/10.1007/978-3-319-17040-4</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedingsent://SD_ILS/0/SD_ILS:852342026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mauri, Jaime Lloret. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44966-0">http://dx.doi.org/10.1007/978-3-662-44966-0</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedingsent://SD_ILS/0/SD_ILS:836462026-04-02T07:18:59Z2026-04-02T07:18:59Zby Bertoni, Guido. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40349-1">http://dx.doi.org/10.1007/978-3-642-40349-1</a><br/>Format: Electronic Resources<br/>Cyber Security: Analytics, Technology and Automationent://SD_ILS/0/SD_ILS:799002026-04-02T07:18:59Z2026-04-02T07:18:59Zby Lehto, Martti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18302-2">http://dx.doi.org/10.1007/978-3-319-18302-2</a><br/>Format: Electronic Resources<br/>Security and Privacy for Mobile Healthcare Networksent://SD_ILS/0/SD_ILS:809982026-04-02T07:18:59Z2026-04-02T07:18:59Zby Zhang, Kuan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24717-5">http://dx.doi.org/10.1007/978-3-319-24717-5</a><br/>Format: Electronic Resources<br/>Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defenseent://SD_ILS/0/SD_ILS:810402026-04-02T07:18:59Z2026-04-02T07:18:59Zby Heckman, Kristin E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25133-2">http://dx.doi.org/10.1007/978-3-319-25133-2</a><br/>Format: Electronic Resources<br/>SmartData Privacy Meets Evolutionary Roboticsent://SD_ILS/0/SD_ILS:720652026-04-02T07:18:59Z2026-04-02T07:18:59Zby Harvey, Inman. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-6409-9">http://dx.doi.org/10.1007/978-1-4614-6409-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedingsent://SD_ILS/0/SD_ILS:844852026-04-02T07:18:59Z2026-04-02T07:18:59Zby Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55220-5">http://dx.doi.org/10.1007/978-3-642-55220-5</a><br/>Format: Electronic Resources<br/>Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedingsent://SD_ILS/0/SD_ILS:751882026-04-02T07:18:59Z2026-04-02T07:18:59Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format: Electronic Resources<br/>Encrypted Email The History and Technology of Message Privacyent://SD_ILS/0/SD_ILS:805752026-04-02T07:18:59Z2026-04-02T07:18:59Zby Orman, Hilarie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21344-6">http://dx.doi.org/10.1007/978-3-319-21344-6</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedingsent://SD_ILS/0/SD_ILS:837062026-04-02T07:18:59Z2026-04-02T07:18:59Zby Thampi, Sabu M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40576-1">http://dx.doi.org/10.1007/978-3-642-40576-1</a><br/>Format: Electronic Resources<br/>Security, Privacy and Trust in Cloud Systemsent://SD_ILS/0/SD_ILS:831512026-04-02T07:18:59Z2026-04-02T07:18:59Zby Nepal, Surya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38586-5">http://dx.doi.org/10.1007/978-3-642-38586-5</a><br/>Format: Electronic Resources<br/>PBX Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:712422026-04-02T07:18:59Z2026-04-02T07:18:59Zby Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format: Electronic Resources<br/>Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedingsent://SD_ILS/0/SD_ILS:837132026-04-02T07:18:59Z2026-04-02T07:18:59Zby Awad, Ali Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedingsent://SD_ILS/0/SD_ILS:796782026-04-02T07:18:59Z2026-04-02T07:18:59Zby Lehmann, Anja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17470-9">http://dx.doi.org/10.1007/978-3-319-17470-9</a><br/>Format: Electronic Resources<br/>Touchless Palmprint Recognition Systemsent://SD_ILS/0/SD_ILS:775492026-04-02T07:18:59Z2026-04-02T07:18:59Zby Genovese, Angelo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10365-5">http://dx.doi.org/10.1007/978-3-319-10365-5</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:838962026-04-02T07:18:59Z2026-04-02T07:18:59Zby Hutter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41332-2">http://dx.doi.org/10.1007/978-3-642-41332-2</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:836592026-04-02T07:18:59Z2026-04-02T07:18:59Zby Avoine, Gildas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format: Electronic Resources<br/>Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Securityent://SD_ILS/0/SD_ILS:717962026-04-02T07:18:59Z2026-04-02T07:18:59Zby Korzun, Dmitry. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-5483-0">http://dx.doi.org/10.1007/978-1-4614-5483-0</a><br/>Format: Electronic Resources<br/>Cyberlaw, security and privacyent://SD_ILS/0/SD_ILS:245632026-04-02T07:18:59Z2026-04-02T07:18:59Zby Kierkegaard, Sylvia Mercado.<br/>Format: Books<br/>Digital Defense A Cybersecurity Primerent://SD_ILS/0/SD_ILS:803142026-04-02T07:18:59Z2026-04-02T07:18:59Zby Pelton, Joseph. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19953-5">http://dx.doi.org/10.1007/978-3-319-19953-5</a><br/>Format: Electronic Resources<br/>Security Planning An Applied Approachent://SD_ILS/0/SD_ILS:792662026-04-02T07:18:59Z2026-04-02T07:18:59Zby Lincke, Susan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16027-6">http://dx.doi.org/10.1007/978-3-319-16027-6</a><br/>Format: Electronic Resources<br/>Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedingsent://SD_ILS/0/SD_ILS:849832026-04-02T07:18:59Z2026-04-02T07:18:59Zby Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43813-8">http://dx.doi.org/10.1007/978-3-662-43813-8</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:755222026-04-02T07:18:59Z2026-04-02T07:18:59Zby Luiijf, Eric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2014 The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:757992026-04-02T07:18:59Z2026-04-02T07:18:59Zby Benaloh, Josh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04852-9">http://dx.doi.org/10.1007/978-3-319-04852-9</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013ent://SD_ILS/0/SD_ILS:854112026-04-02T07:18:59Z2026-04-02T07:18:59Zby Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45947-8">http://dx.doi.org/10.1007/978-3-662-45947-8</a><br/>Format: Electronic Resources<br/>Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:799512026-04-02T07:18:59Z2026-04-02T07:18:59Zby Damsgaard Jensen, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18491-3">http://dx.doi.org/10.1007/978-3-319-18491-3</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:759442026-04-02T07:18:59Z2026-04-02T07:18:59Zby Danger, Jean Luc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05302-8">http://dx.doi.org/10.1007/978-3-319-05302-8</a><br/>Format: Electronic Resources<br/>Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedingsent://SD_ILS/0/SD_ILS:840902026-04-02T07:18:59Z2026-04-02T07:18:59Zby Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format: Electronic Resources<br/>Visual Cryptography for Image Processing and Security Theory, Methods, and Applicationsent://SD_ILS/0/SD_ILS:808662026-04-02T07:18:59Z2026-04-02T07:18:59Zby Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23473-1">http://dx.doi.org/10.1007/978-3-319-23473-1</a><br/>Format: Electronic Resources<br/>Visual Cryptography for Image Processing and Security Theory, Methods, and Applicationsent://SD_ILS/0/SD_ILS:773172026-04-02T07:18:59Z2026-04-02T07:18:59Zby Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09644-5">http://dx.doi.org/10.1007/978-3-319-09644-5</a><br/>Format: Electronic Resources<br/>Smart Grid Securityent://SD_ILS/0/SD_ILS:711432026-04-02T07:18:59Z2026-04-02T07:18:59Zby Goel, Sanjay. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6663-4">http://dx.doi.org/10.1007/978-1-4471-6663-4</a><br/>Format: Electronic Resources<br/>Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedingsent://SD_ILS/0/SD_ILS:777442026-04-02T07:18:59Z2026-04-02T07:18:59Zby Teufel, Stephanie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10975-6">http://dx.doi.org/10.1007/978-3-319-10975-6</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedingsent://SD_ILS/0/SD_ILS:804442026-04-02T07:18:59Z2026-04-02T07:18:59Zby Almgren, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20550-2">http://dx.doi.org/10.1007/978-3-319-20550-2</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedingsent://SD_ILS/0/SD_ILS:796982026-04-02T07:18:59Z2026-04-02T07:18:59Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17533-1">http://dx.doi.org/10.1007/978-3-319-17533-1</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:801712026-04-02T07:18:59Z2026-04-02T07:18:59Zby Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:794822026-04-02T07:18:59Z2026-04-02T07:18:59Zby Joye, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16763-3">http://dx.doi.org/10.1007/978-3-319-16763-3</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedingsent://SD_ILS/0/SD_ILS:769072026-04-02T07:18:59Z2026-04-02T07:18:59Zby Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08344-5">http://dx.doi.org/10.1007/978-3-319-08344-5</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions and Defenses 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedingsent://SD_ILS/0/SD_ILS:778742026-04-02T07:18:59Z2026-04-02T07:18:59Zby Stavrou, Angelos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11379-1">http://dx.doi.org/10.1007/978-3-319-11379-1</a><br/>Format: Electronic Resources<br/>Detecting Peripheral-based Attacks on the Host Memoryent://SD_ILS/0/SD_ILS:785362026-04-02T07:18:59Z2026-04-02T07:18:59Zby Stewin, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13515-1">http://dx.doi.org/10.1007/978-3-319-13515-1</a><br/>Format: Electronic Resources<br/>Virtualization Techniques for Mobile Systemsent://SD_ILS/0/SD_ILS:760802026-04-02T07:18:59Z2026-04-02T07:18:59Zby Jaramillo, David. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05741-5">http://dx.doi.org/10.1007/978-3-319-05741-5</a><br/>Format: Electronic Resources<br/>Evolution of Cyber Technologies and Operations to 2035ent://SD_ILS/0/SD_ILS:808802026-04-02T07:18:59Z2026-04-02T07:18:59Zby Blowers, Misty. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23585-1">http://dx.doi.org/10.1007/978-3-319-23585-1</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedingsent://SD_ILS/0/SD_ILS:758212026-04-02T07:18:59Z2026-04-02T07:18:59Zby Faloutsos, Michalis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04918-2">http://dx.doi.org/10.1007/978-3-319-04918-2</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedingsent://SD_ILS/0/SD_ILS:810352026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mitton, Nathalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25067-0">http://dx.doi.org/10.1007/978-3-319-25067-0</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:768952026-04-02T07:18:59Z2026-04-02T07:18:59Zby Francillon, Aurélien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08302-5">http://dx.doi.org/10.1007/978-3-319-08302-5</a><br/>Format: Electronic Resources<br/>Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:773592026-04-02T07:18:59Z2026-04-02T07:18:59Zby Eckert, Claudia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09770-1">http://dx.doi.org/10.1007/978-3-319-09770-1</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedingsent://SD_ILS/0/SD_ILS:777152026-04-02T07:18:59Z2026-04-02T07:18:59Zby Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10879-7">http://dx.doi.org/10.1007/978-3-319-10879-7</a><br/>Format: Electronic Resources<br/>Trusted Cloud Computingent://SD_ILS/0/SD_ILS:782872026-04-02T07:18:59Z2026-04-02T07:18:59Zby Krcmar, Helmut. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12718-7">http://dx.doi.org/10.1007/978-3-319-12718-7</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 – July 2, 2014. Proceedingsent://SD_ILS/0/SD_ILS:849852026-04-02T07:18:59Z2026-04-02T07:18:59Zby Naccache, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43826-8">http://dx.doi.org/10.1007/978-3-662-43826-8</a><br/>Format: Electronic Resources<br/>Security Issues in Mobile NFC Devicesent://SD_ILS/0/SD_ILS:791012026-04-02T07:18:59Z2026-04-02T07:18:59Zby Roland, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15488-6">http://dx.doi.org/10.1007/978-3-319-15488-6</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:758062026-04-02T07:18:59Z2026-04-02T07:18:59Zby Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:781232026-04-02T07:18:59Z2026-04-02T07:18:59Zby Lee, Hyang-Sook. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12160-4">http://dx.doi.org/10.1007/978-3-319-12160-4</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:851942026-04-02T07:18:59Z2026-04-02T07:18:59Zby Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44791-8">http://dx.doi.org/10.1007/978-3-662-44791-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:829392026-04-02T07:18:59Z2026-04-02T07:18:59Zby Kwon, Taekyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format: Electronic Resources<br/>Trusted Computing for Embedded Systemsent://SD_ILS/0/SD_ILS:772462026-04-02T07:18:59Z2026-04-02T07:18:59Zby Candaele, Bernard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09420-5">http://dx.doi.org/10.1007/978-3-319-09420-5</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:843422026-04-02T07:18:59Z2026-04-02T07:18:59Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54568-9">http://dx.doi.org/10.1007/978-3-642-54568-9</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:851932026-04-02T07:18:59Z2026-04-02T07:18:59Zby Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44788-8">http://dx.doi.org/10.1007/978-3-662-44788-8</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communication 11th International Conference, WWIC 2013, St. Petersburg, Russia, June 5-7, 2013. Proceedingsent://SD_ILS/0/SD_ILS:830992026-04-02T07:18:59Z2026-04-02T07:18:59Zby Tsaoussidis, Vassilis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38401-1">http://dx.doi.org/10.1007/978-3-642-38401-1</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:795492026-04-02T07:18:59Z2026-04-02T07:18:59Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17016-9">http://dx.doi.org/10.1007/978-3-319-17016-9</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:811322026-04-02T07:18:59Z2026-04-02T07:18:59Zby Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25915-4">http://dx.doi.org/10.1007/978-3-319-25915-4</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedingsent://SD_ILS/0/SD_ILS:769592026-04-02T07:18:59Z2026-04-02T07:18:59Zby Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08509-8">http://dx.doi.org/10.1007/978-3-319-08509-8</a><br/>Format: Electronic Resources<br/>Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 – July 3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:849942026-04-02T07:18:59Z2026-04-02T07:18:59Zby Sperotto, Anna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43862-6">http://dx.doi.org/10.1007/978-3-662-43862-6</a><br/>Format: Electronic Resources<br/>Medical Data Privacy Handbookent://SD_ILS/0/SD_ILS:808832026-04-02T07:18:59Z2026-04-02T07:18:59Zby Gkoulalas-Divanis, Aris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23633-9">http://dx.doi.org/10.1007/978-3-319-23633-9</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedingsent://SD_ILS/0/SD_ILS:830042026-04-02T07:18:59Z2026-04-02T07:18:59Zby Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedingsent://SD_ILS/0/SD_ILS:807982026-04-02T07:18:59Z2026-04-02T07:18:59Zby Fischer-Hübner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22906-5">http://dx.doi.org/10.1007/978-3-319-22906-5</a><br/>Format: Electronic Resources<br/>Guide to Security Assurance for Cloud Computingent://SD_ILS/0/SD_ILS:811372026-04-02T07:18:59Z2026-04-02T07:18:59Zby Zhu, Shao Ying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25988-8">http://dx.doi.org/10.1007/978-3-319-25988-8</a><br/>Format: Electronic Resources<br/>Cybersecurity in Switzerlandent://SD_ILS/0/SD_ILS:776312026-04-02T07:18:59Z2026-04-02T07:18:59Zby Dunn Cavelty, Myriam. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10620-5">http://dx.doi.org/10.1007/978-3-319-10620-5</a><br/>Format: Electronic Resources<br/>Quantum Computational Number Theoryent://SD_ILS/0/SD_ILS:811222026-04-02T07:18:59Z2026-04-02T07:18:59Zby Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format: Electronic Resources<br/>Trustworthy Execution on Mobile Devicesent://SD_ILS/0/SD_ILS:725962026-04-02T07:18:59Z2026-04-02T07:18:59Zby Vasudevan, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8190-4">http://dx.doi.org/10.1007/978-1-4614-8190-4</a><br/>Format: Electronic Resources<br/>Protecting Privacy in Data Releaseent://SD_ILS/0/SD_ILS:792932026-04-02T07:18:59Z2026-04-02T07:18:59Zby Livraga, Giovanni. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16109-9">http://dx.doi.org/10.1007/978-3-319-16109-9</a><br/>Format: Electronic Resources<br/>Secure IP Mobility Management for VANETent://SD_ILS/0/SD_ILS:747792026-04-02T07:18:59Z2026-04-02T07:18:59Zby Taha, Sanaa. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-01351-0">http://dx.doi.org/10.1007/978-3-319-01351-0</a><br/>Format: Electronic Resources<br/>Handbook on Data Centersent://SD_ILS/0/SD_ILS:738862026-04-02T07:18:59Z2026-04-02T07:18:59Zby Khan, Samee U. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-2092-1">http://dx.doi.org/10.1007/978-1-4939-2092-1</a><br/>Format: Electronic Resources<br/>Trusted Computing Platforms TPM2.0 in Contextent://SD_ILS/0/SD_ILS:770342026-04-02T07:18:59Z2026-04-02T07:18:59Zby Proudler, Graeme. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08744-3">http://dx.doi.org/10.1007/978-3-319-08744-3</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management for the Future Internet in the Age of Globalisation 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:799882026-04-02T07:18:59Z2026-04-02T07:18:59Zby Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18621-4">http://dx.doi.org/10.1007/978-3-319-18621-4</a><br/>Format: Electronic Resources<br/>Security Protocols XXI 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:839772026-04-02T07:18:59Z2026-04-02T07:18:59Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41717-7">http://dx.doi.org/10.1007/978-3-642-41717-7</a><br/>Format: Electronic Resources<br/>The Economics of Information Security and Privacyent://SD_ILS/0/SD_ILS:834172026-04-02T07:18:59Z2026-04-02T07:18:59Zby Böhme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format: Electronic Resources<br/>Cybersecurity in Israelent://SD_ILS/0/SD_ILS:800812026-04-02T07:18:59Z2026-04-02T07:18:59Zby Tabansky, Lior. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18986-4">http://dx.doi.org/10.1007/978-3-319-18986-4</a><br/>Format: Electronic Resources<br/>Distributed Denial of Service Attack and Defenseent://SD_ILS/0/SD_ILS:729882026-04-02T07:18:59Z2026-04-02T07:18:59Zby Yu, Shui. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9491-1">http://dx.doi.org/10.1007/978-1-4614-9491-1</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedingsent://SD_ILS/0/SD_ILS:845192026-04-02T07:18:59Z2026-04-02T07:18:59Zby Cuppens-Boulahia, Nora. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55415-5">http://dx.doi.org/10.1007/978-3-642-55415-5</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:792412026-04-02T07:18:59Z2026-04-02T07:18:59Zby Lee, Jooyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15943-0">http://dx.doi.org/10.1007/978-3-319-15943-0</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:810102026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24837-0">http://dx.doi.org/10.1007/978-3-319-24837-0</a><br/>Format: Electronic Resources<br/>Cyberpatterns Unifying Design Patterns with Security and Attack Patternsent://SD_ILS/0/SD_ILS:756722026-04-02T07:18:59Z2026-04-02T07:18:59Zby Blackwell, Clive. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04447-7">http://dx.doi.org/10.1007/978-3-319-04447-7</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:844712026-04-02T07:18:59Z2026-04-02T07:18:59Zby Hansen, Marit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55137-6">http://dx.doi.org/10.1007/978-3-642-55137-6</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:851752026-04-02T07:18:59Z2026-04-02T07:18:59Zby Batina, Lejla. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44709-3">http://dx.doi.org/10.1007/978-3-662-44709-3</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedingsent://SD_ILS/0/SD_ILS:752492026-04-02T07:18:59Z2026-04-02T07:18:59Zby Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:825892026-04-02T07:18:59Z2026-04-02T07:18:59Zby Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:826632026-04-02T07:18:59Z2026-04-02T07:18:59Zby Sahai, Amit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format: Electronic Resources<br/>Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:764182026-04-02T07:18:59Z2026-04-02T07:18:59Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06811-4">http://dx.doi.org/10.1007/978-3-319-06811-4</a><br/>Format: Electronic Resources<br/>Secure Wireless Sensor Networks Threats and Solutionsent://SD_ILS/0/SD_ILS:740512026-04-02T07:18:59Z2026-04-02T07:18:59Zby Conti, Mauro. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3460-7">http://dx.doi.org/10.1007/978-1-4939-3460-7</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014. Proceedingsent://SD_ILS/0/SD_ILS:763982026-04-02T07:18:59Z2026-04-02T07:18:59Zby Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06749-0">http://dx.doi.org/10.1007/978-3-319-06749-0</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:842232026-04-02T07:18:59Z2026-04-02T07:18:59Zby Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54069-1">http://dx.doi.org/10.1007/978-3-642-54069-1</a><br/>Format: Electronic Resources<br/>Security Assessment in Vehicular Networksent://SD_ILS/0/SD_ILS:729512026-04-02T07:18:59Z2026-04-02T07:18:59Zby Du, Suguo. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format: Electronic Resources<br/>Intrusion Detection for IP-Based Multimedia Communications over Wireless Networksent://SD_ILS/0/SD_ILS:728472026-04-02T07:18:59Z2026-04-02T07:18:59Zby Tang, Jin. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:828522026-04-02T07:18:59Z2026-04-02T07:18:59Zby Flegel, Ulrich. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37300-8">http://dx.doi.org/10.1007/978-3-642-37300-8</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:843502026-04-02T07:18:59Z2026-04-02T07:18:59Zby Krawczyk, Hugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54631-0">http://dx.doi.org/10.1007/978-3-642-54631-0</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:826422026-04-02T07:18:59Z2026-04-02T07:18:59Zby Roughan, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36516-4">http://dx.doi.org/10.1007/978-3-642-36516-4</a><br/>Format: Electronic Resources<br/>Secure and Trustworthy Service Composition The Aniketos Approachent://SD_ILS/0/SD_ILS:785372026-04-02T07:18:59Z2026-04-02T07:18:59Zby Brucker, Achim D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13518-2">http://dx.doi.org/10.1007/978-3-319-13518-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 11th EAI International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Proceedingsent://SD_ILS/0/SD_ILS:812742026-04-02T07:18:59Z2026-04-02T07:18:59Zby Thuraisingham, Bhavani. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28865-9">http://dx.doi.org/10.1007/978-3-319-28865-9</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:781002026-04-02T07:18:59Z2026-04-02T07:18:59Zby Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12087-4">http://dx.doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Electronic Resources<br/>Querying over Encrypted Data in Smart Gridsent://SD_ILS/0/SD_ILS:762722026-04-02T07:18:59Z2026-04-02T07:18:59Zby Wen, Mi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06355-3">http://dx.doi.org/10.1007/978-3-319-06355-3</a><br/>Format: Electronic Resources<br/>Network Hardening An Automated Approach to Improving Network Securityent://SD_ILS/0/SD_ILS:757242026-04-02T07:18:59Z2026-04-02T07:18:59Zby Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04612-9">http://dx.doi.org/10.1007/978-3-319-04612-9</a><br/>Format: Electronic Resources<br/>Pervasive Wireless Environments: Detecting and Localizing User Spoofingent://SD_ILS/0/SD_ILS:765892026-04-02T07:18:59Z2026-04-02T07:18:59Zby Yang, Jie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07356-9">http://dx.doi.org/10.1007/978-3-319-07356-9</a><br/>Format: Electronic Resources<br/>Cyber Defense and Situational Awarenessent://SD_ILS/0/SD_ILS:778782026-04-02T07:18:59Z2026-04-02T07:18:59Zby Kott, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11391-3">http://dx.doi.org/10.1007/978-3-319-11391-3</a><br/>Format: Electronic Resources<br/>Physical Unclonable Functions in Theory and Practiceent://SD_ILS/0/SD_ILS:716642026-04-02T07:18:59Z2026-04-02T07:18:59Zby Böhm, Christoph. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-5040-5">http://dx.doi.org/10.1007/978-1-4614-5040-5</a><br/>Format: Electronic Resources<br/>Cyberspace and International Relations Theory, Prospects and Challengesent://SD_ILS/0/SD_ILS:828962026-04-02T07:18:59Z2026-04-02T07:18:59Zby Kremer, Jan-Frederik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37481-4">http://dx.doi.org/10.1007/978-3-642-37481-4</a><br/>Format: Electronic Resources<br/>Building Secure Defenses Against Code-Reuse Attacksent://SD_ILS/0/SD_ILS:810922026-04-02T07:18:59Z2026-04-02T07:18:59Zby Davi, Lucas. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25546-0">http://dx.doi.org/10.1007/978-3-319-25546-0</a><br/>Format: Electronic Resources<br/>Cyber Warfare Building the Scientific Foundationent://SD_ILS/0/SD_ILS:786912026-04-02T07:18:59Z2026-04-02T07:18:59Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format: Electronic Resources<br/>Counterterrorism and Cybersecurity Total Information Awarenessent://SD_ILS/0/SD_ILS:796122026-04-02T07:18:59Z2026-04-02T07:18:59Zby Lee, Newton. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17244-6">http://dx.doi.org/10.1007/978-3-319-17244-6</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 12th International Conference, WWIC 2014, Paris, France, May 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:784302026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mellouk, Abdelhamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13174-0">http://dx.doi.org/10.1007/978-3-319-13174-0</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:793692026-04-02T07:18:59Z2026-04-02T07:18:59Zby Eisenbarth, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16363-5">http://dx.doi.org/10.1007/978-3-319-16363-5</a><br/>Format: Electronic Resources<br/>Automated Firewall Analytics Design, Configuration and Optimizationent://SD_ILS/0/SD_ILS:775512026-04-02T07:18:59Z2026-04-02T07:18:59Zby Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10371-6">http://dx.doi.org/10.1007/978-3-319-10371-6</a><br/>Format: Electronic Resources<br/>Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:829862026-04-02T07:18:59Z2026-04-02T07:18:59Zby Singh, Karan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37949-9">http://dx.doi.org/10.1007/978-3-642-37949-9</a><br/>Format: Electronic Resources<br/>Leakage Resilient Password Systemsent://SD_ILS/0/SD_ILS:796882026-04-02T07:18:59Z2026-04-02T07:18:59Zby Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- INDOCRYPT 2015 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:811802026-04-02T07:18:59Z2026-04-02T07:18:59Zby Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26617-6">http://dx.doi.org/10.1007/978-3-319-26617-6</a><br/>Format: Electronic Resources<br/>Trustworthy Computing and Services International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papersent://SD_ILS/0/SD_ILS:856222026-04-02T07:18:59Z2026-04-02T07:18:59Zby Yueming, Lu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47401-3">http://dx.doi.org/10.1007/978-3-662-47401-3</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:783982026-04-02T07:18:59Z2026-04-02T07:18:59Zby Saxena, Nitesh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13066-8">http://dx.doi.org/10.1007/978-3-319-13066-8</a><br/>Format: Electronic Resources<br/>Cloud Computing Challenges, Limitations and R&D Solutionsent://SD_ILS/0/SD_ILS:776022026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10530-7">http://dx.doi.org/10.1007/978-3-319-10530-7</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:812392026-04-02T07:18:59Z2026-04-02T07:18:59Zby Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27668-7">http://dx.doi.org/10.1007/978-3-319-27668-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:783892026-04-02T07:18:59Z2026-04-02T07:18:59Zby Meier, Willi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13039-2">http://dx.doi.org/10.1007/978-3-319-13039-2</a><br/>Format: Electronic Resources<br/>E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:779792026-04-02T07:18:59Z2026-04-02T07:18:59Zby Sideridis, Alexander B. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11710-2">http://dx.doi.org/10.1007/978-3-319-11710-2</a><br/>Format: Electronic Resources<br/>A Mathematical Approach to Research Problems of Science and Technology Theoretical Basis and Developments in Mathematical Modelingent://SD_ILS/0/SD_ILS:861102026-04-02T07:18:59Z2026-04-02T07:18:59Zby Nishii, Ryuei. editor.<br/><a href="http://dx.doi.org/10.1007/978-4-431-55060-0">http://dx.doi.org/10.1007/978-4-431-55060-0</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:856572026-04-02T07:18:59Z2026-04-02T07:18:59Zby Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47974-2">http://dx.doi.org/10.1007/978-3-662-47974-2</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:839312026-04-02T07:18:59Z2026-04-02T07:18:59Zby Bologna, Sandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format: Electronic Resources<br/>Security and Trust Management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:829972026-04-02T07:18:59Z2026-04-02T07:18:59Zby Jøsang, Audun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38004-4">http://dx.doi.org/10.1007/978-3-642-38004-4</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security Xent://SD_ILS/0/SD_ILS:855362026-04-02T07:18:59Z2026-04-02T07:18:59Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format: Electronic Resources<br/>Sensor Systems and Software 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:755852026-04-02T07:18:59Z2026-04-02T07:18:59Zby Zuniga, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04166-7">http://dx.doi.org/10.1007/978-3-319-04166-7</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:855322026-04-02T07:18:59Z2026-04-02T07:18:59Zby Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format: Electronic Resources<br/>Secure IT Systems 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19–21, 2015, Proceedingsent://SD_ILS/0/SD_ILS:811682026-04-02T07:18:59Z2026-04-02T07:18:59Zby Buchegger, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26502-5">http://dx.doi.org/10.1007/978-3-319-26502-5</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedingsent://SD_ILS/0/SD_ILS:811882026-04-02T07:18:59Z2026-04-02T07:18:59Zby Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format: Electronic Resources<br/>Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:811412026-04-02T07:18:59Z2026-04-02T07:18:59Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedingsent://SD_ILS/0/SD_ILS:838722026-04-02T07:18:59Z2026-04-02T07:18:59Zby Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format: Electronic Resources<br/>E-Democracy – Citizen Rights in the World of the New Computing Paradigms 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedingsent://SD_ILS/0/SD_ILS:812122026-04-02T07:18:59Z2026-04-02T07:18:59Zby Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27164-4">http://dx.doi.org/10.1007/978-3-319-27164-4</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:851902026-04-02T07:18:59Z2026-04-02T07:18:59Zby Böhme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44774-1">http://dx.doi.org/10.1007/978-3-662-44774-1</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:853192026-04-02T07:18:59Z2026-04-02T07:18:59Zby Christin, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45472-5">http://dx.doi.org/10.1007/978-3-662-45472-5</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedingsent://SD_ILS/0/SD_ILS:791072026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mirkovic, Jelena. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15509-8">http://dx.doi.org/10.1007/978-3-319-15509-8</a><br/>Format: Electronic Resources<br/>Trust Management VII 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedingsent://SD_ILS/0/SD_ILS:830792026-04-02T07:18:59Z2026-04-02T07:18:59Zby Fernández-Gago, Carmen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38323-6">http://dx.doi.org/10.1007/978-3-642-38323-6</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 4th International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:827662026-04-02T07:18:59Z2026-04-02T07:18:59Zby Zheng, Jun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36958-2">http://dx.doi.org/10.1007/978-3-642-36958-2</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VII FOSAD 2012/2013 Tutorial Lecturesent://SD_ILS/0/SD_ILS:774602026-04-02T07:18:59Z2026-04-02T07:18:59Zby Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10082-1">http://dx.doi.org/10.1007/978-3-319-10082-1</a><br/>Format: Electronic Resources<br/>Cybersecurity Systems for Human Cognition Augmentationent://SD_ILS/0/SD_ILS:775522026-04-02T07:18:59Z2026-04-02T07:18:59Zby Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10374-7">http://dx.doi.org/10.1007/978-3-319-10374-7</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptographyent://SD_ILS/0/SD_ILS:844492026-04-02T07:18:59Z2026-04-02T07:18:59Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55046-1">http://dx.doi.org/10.1007/978-3-642-55046-1</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:784792026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mitton, Natalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13329-4">http://dx.doi.org/10.1007/978-3-319-13329-4</a><br/>Format: Electronic Resources<br/>Intelligent Mechanisms for Network Configuration and Security 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedingsent://SD_ILS/0/SD_ILS:803342026-04-02T07:18:59Z2026-04-02T07:18:59Zby Latré, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20034-7">http://dx.doi.org/10.1007/978-3-319-20034-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part Ient://SD_ILS/0/SD_ILS:850972026-04-02T07:18:59Z2026-04-02T07:18:59Zby Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44371-2">http://dx.doi.org/10.1007/978-3-662-44371-2</a><br/>Format: Electronic Resources<br/>Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:789882026-04-02T07:18:59Z2026-04-02T07:18:59Zby Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedingsent://SD_ILS/0/SD_ILS:780912026-04-02T07:18:59Z2026-04-02T07:18:59Zby Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12060-7">http://dx.doi.org/10.1007/978-3-319-12060-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedingsent://SD_ILS/0/SD_ILS:831402026-04-02T07:18:59Z2026-04-02T07:18:59Zby Youssef, Amr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format: Electronic Resources<br/>The Hash Function BLAKEent://SD_ILS/0/SD_ILS:851882026-04-02T07:18:59Z2026-04-02T07:18:59Zby Aumasson, Jean-Philippe. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44757-4">http://dx.doi.org/10.1007/978-3-662-44757-4</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:755652026-04-02T07:18:59Z2026-04-02T07:18:59Zby Sherif, Mostafa Hashem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04105-6">http://dx.doi.org/10.1007/978-3-319-04105-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:856592026-04-02T07:18:59Z2026-04-02T07:18:59Zby Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47989-6">http://dx.doi.org/10.1007/978-3-662-47989-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:856622026-04-02T07:18:59Z2026-04-02T07:18:59Zby Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48000-7">http://dx.doi.org/10.1007/978-3-662-48000-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:850992026-04-02T07:18:59Z2026-04-02T07:18:59Zby Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44381-1">http://dx.doi.org/10.1007/978-3-662-44381-1</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:803172026-04-02T07:18:59Z2026-04-02T07:18:59Zby Foo, Ernest. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19962-7">http://dx.doi.org/10.1007/978-3-319-19962-7</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:808482026-04-02T07:18:59Z2026-04-02T07:18:59Zby Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:856702026-04-02T07:18:59Z2026-04-02T07:18:59Zby Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:850142026-04-02T07:18:59Z2026-04-02T07:18:59Zby Moriai, Shiho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43933-3">http://dx.doi.org/10.1007/978-3-662-43933-3</a><br/>Format: Electronic Resources<br/>Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:794692026-04-02T07:18:59Z2026-04-02T07:18:59Zby Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:849152026-04-02T07:18:59Z2026-04-02T07:18:59Zby Lange, Tanja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43414-7">http://dx.doi.org/10.1007/978-3-662-43414-7</a><br/>Format: Electronic Resources<br/>Secure Cloud Computingent://SD_ILS/0/SD_ILS:729272026-04-02T07:18:59Z2026-04-02T07:18:59Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9278-8">http://dx.doi.org/10.1007/978-1-4614-9278-8</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:854032026-04-02T07:18:59Z2026-04-02T07:18:59Zby Maffei, Matteo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45917-1">http://dx.doi.org/10.1007/978-3-662-45917-1</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking First International Conference, MSPN 2015, Paris, France, June 15-17, 2015, Selected Papersent://SD_ILS/0/SD_ILS:811082026-04-02T07:18:59Z2026-04-02T07:18:59Zby Boumerdassi, Selma. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25744-0">http://dx.doi.org/10.1007/978-3-319-25744-0</a><br/>Format: Electronic Resources<br/>Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:782422026-04-02T07:18:59Z2026-04-02T07:18:59Zby Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12574-9">http://dx.doi.org/10.1007/978-3-319-12574-9</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedingsent://SD_ILS/0/SD_ILS:754042026-04-02T07:18:59Z2026-04-02T07:18:59Zby Wang, Guojun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03584-0">http://dx.doi.org/10.1007/978-3-319-03584-0</a><br/>Format: Electronic Resources<br/>Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuitsent://SD_ILS/0/SD_ILS:721702026-04-02T07:18:59Z2026-04-02T07:18:59Zby Peeters, Eric. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedingsent://SD_ILS/0/SD_ILS:838872026-04-02T07:18:59Z2026-04-02T07:18:59Zby Stolfo, Salvatore J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41284-4">http://dx.doi.org/10.1007/978-3-642-41284-4</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:758872026-04-02T07:18:59Z2026-04-02T07:18:59Zby Abadi, Martín. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05119-2">http://dx.doi.org/10.1007/978-3-319-05119-2</a><br/>Format: Electronic Resources<br/>Risk Assessment and Risk-Driven Testing Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:811612026-04-02T07:18:59Z2026-04-02T07:18:59Zby Seehusen, Fredrik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26416-5">http://dx.doi.org/10.1007/978-3-319-26416-5</a><br/>Format: Electronic Resources<br/>Encyclopedia of Biometricsent://SD_ILS/0/SD_ILS:733622026-04-02T07:18:59Z2026-04-02T07:18:59Zby Li, Stan Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4899-7488-4">http://dx.doi.org/10.1007/978-1-4899-7488-4</a><br/>Format: Electronic Resources<br/>Advances in Computer Science and Ubiquitous Computing CSA & CUTEent://SD_ILS/0/SD_ILS:889982026-04-02T07:18:59Z2026-04-02T07:18:59Zby Park, Doo-Soon. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0281-6">http://dx.doi.org/10.1007/978-981-10-0281-6</a><br/>Format: Electronic Resources<br/>Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:775372026-04-02T07:18:59Z2026-04-02T07:18:59Zby Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10329-7">http://dx.doi.org/10.1007/978-3-319-10329-7</a><br/>Format: Electronic Resources<br/>Botnetsent://SD_ILS/0/SD_ILS:708732026-04-02T07:18:59Z2026-04-02T07:18:59Zby Tiirmaa-Klaar, Heli. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-5216-3">http://dx.doi.org/10.1007/978-1-4471-5216-3</a><br/>Format: Electronic Resources<br/>Smart Grid Security First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:830032026-04-02T07:18:59Z2026-04-02T07:18:59Zby Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38030-3">http://dx.doi.org/10.1007/978-3-642-38030-3</a><br/>Format: Electronic Resources<br/>Cyber Security and Privacy 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:810652026-04-02T07:18:59Z2026-04-02T07:18:59Zby Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25360-2">http://dx.doi.org/10.1007/978-3-319-25360-2</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 9th International Conference, ICDCIT 2013, Bhubaneswar, India, February 5-8, 2013. Proceedingsent://SD_ILS/0/SD_ILS:825202026-04-02T07:18:59Z2026-04-02T07:18:59Zby Hota, Chittaranjan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36071-8">http://dx.doi.org/10.1007/978-3-642-36071-8</a><br/>Format: Electronic Resources<br/>Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedingsent://SD_ILS/0/SD_ILS:780232026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11851-2">http://dx.doi.org/10.1007/978-3-319-11851-2</a><br/>Format: Electronic Resources<br/>Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May 28 – June 2, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:824432026-04-02T07:18:59Z2026-04-02T07:18:59Zby Yuan, Yuyu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35795-4">http://dx.doi.org/10.1007/978-3-642-35795-4</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:838932026-04-02T07:18:59Z2026-04-02T07:18:59Zby Adams, Andrew A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format: Electronic Resources<br/>Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasuresent://SD_ILS/0/SD_ILS:837232026-04-02T07:18:59Z2026-04-02T07:18:59Zby Haataja, Keijo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 7th International Conference, IDCS 2014, Calabria, Italy, September 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:779732026-04-02T07:18:59Z2026-04-02T07:18:59Zby Fortino, Giancarlo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11692-1">http://dx.doi.org/10.1007/978-3-319-11692-1</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedingsent://SD_ILS/0/SD_ILS:834712026-04-02T07:18:59Z2026-04-02T07:18:59Zby Wang, G. Alan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39693-9">http://dx.doi.org/10.1007/978-3-642-39693-9</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedingsent://SD_ILS/0/SD_ILS:789542026-04-02T07:18:59Z2026-04-02T07:18:59Zby Natarajan, Raja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14977-6">http://dx.doi.org/10.1007/978-3-319-14977-6</a><br/>Format: Electronic Resources<br/>Understanding Network Hacks Attack and Defense with Pythonent://SD_ILS/0/SD_ILS:851092026-04-02T07:18:59Z2026-04-02T07:18:59Zby Ballmann, Bastian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44437-5">http://dx.doi.org/10.1007/978-3-662-44437-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2013 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedingsent://SD_ILS/0/SD_ILS:830862026-04-02T07:18:59Z2026-04-02T07:18:59Zby Johansson, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38348-9">http://dx.doi.org/10.1007/978-3-642-38348-9</a><br/>Format: Electronic Resources<br/>Self- and Co-regulation in Cybercrime, Cybersecurity and National Securityent://SD_ILS/0/SD_ILS:793902026-04-02T07:18:59Z2026-04-02T07:18:59Zby Tropina, Tatiana. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16447-2">http://dx.doi.org/10.1007/978-3-319-16447-2</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:835192026-04-02T07:18:59Z2026-04-02T07:18:59Zby Sadeghi, Ahmad-Reza. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014. Proceedingsent://SD_ILS/0/SD_ILS:852142026-04-02T07:18:59Z2026-04-02T07:18:59Zby Villari, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44879-3">http://dx.doi.org/10.1007/978-3-662-44879-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part Ient://SD_ILS/0/SD_ILS:835582026-04-02T07:18:59Z2026-04-02T07:18:59Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40041-4">http://dx.doi.org/10.1007/978-3-642-40041-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part IIent://SD_ILS/0/SD_ILS:835712026-04-02T07:18:59Z2026-04-02T07:18:59Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40084-1">http://dx.doi.org/10.1007/978-3-642-40084-1</a><br/>Format: Electronic Resources<br/>Security and the Networked Societyent://SD_ILS/0/SD_ILS:750852026-04-02T07:18:59Z2026-04-02T07:18:59Zby Gregory, Mark A. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format: Electronic Resources<br/>Security and Privacy in Mobile Social Networksent://SD_ILS/0/SD_ILS:728022026-04-02T07:18:59Z2026-04-02T07:18:59Zby Liang, Xiaohui. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8857-6">http://dx.doi.org/10.1007/978-1-4614-8857-6</a><br/>Format: Electronic Resources<br/>Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Frameworkent://SD_ILS/0/SD_ILS:768742026-04-02T07:18:59Z2026-04-02T07:18:59Zby Ben Ayed, Ghazi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08231-8">http://dx.doi.org/10.1007/978-3-319-08231-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:855462026-04-02T07:18:59Z2026-04-02T07:18:59Zby Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46803-6">http://dx.doi.org/10.1007/978-3-662-46803-6</a><br/>Format: Electronic Resources<br/>Service Oriented and Cloud Computing 4th European Conference, ESOCC 2015, Taormina, Italy, September 15-17, 2015, Proceedingsent://SD_ILS/0/SD_ILS:809292026-04-02T07:18:59Z2026-04-02T07:18:59Zby Dustdar, Schahram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24072-5">http://dx.doi.org/10.1007/978-3-319-24072-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:855452026-04-02T07:18:59Z2026-04-02T07:18:59Zby Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46800-5">http://dx.doi.org/10.1007/978-3-662-46800-5</a><br/>Format: Electronic Resources<br/>Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:781902026-04-02T07:18:59Z2026-04-02T07:18:59Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12400-1">http://dx.doi.org/10.1007/978-3-319-12400-1</a><br/>Format: Electronic Resources<br/>Game Theoretic Analysis of Congestion, Safety and Security Traffic and Transportation Theoryent://SD_ILS/0/SD_ILS:779682026-04-02T07:18:59Z2026-04-02T07:18:59Zby Hausken, Kjell. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11674-7">http://dx.doi.org/10.1007/978-3-319-11674-7</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014. Proceedingsent://SD_ILS/0/SD_ILS:756832026-04-02T07:18:59Z2026-04-02T07:18:59Zby Natarajan, Raja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04483-5">http://dx.doi.org/10.1007/978-3-319-04483-5</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:756202026-04-02T07:18:59Z2026-04-02T07:18:59Zby Zia, Tanveer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXIX 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedingsent://SD_ILS/0/SD_ILS:804872026-04-02T07:18:59Z2026-04-02T07:18:59Zby Samarati, Pierangela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20810-7">http://dx.doi.org/10.1007/978-3-319-20810-7</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedingsent://SD_ILS/0/SD_ILS:850152026-04-02T07:18:59Z2026-04-02T07:18:59Zby Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43936-4">http://dx.doi.org/10.1007/978-3-662-43936-4</a><br/>Format: Electronic Resources<br/>Introduction to Public Key Infrastructuresent://SD_ILS/0/SD_ILS:837262026-04-02T07:18:59Z2026-04-02T07:18:59Zby Buchmann, Johannes A. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:854942026-04-02T07:18:59Z2026-04-02T07:18:59Zby Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46497-7">http://dx.doi.org/10.1007/978-3-662-46497-7</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:779632026-04-02T07:18:59Z2026-04-02T07:18:59Zby Mosca, Michele. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11659-4">http://dx.doi.org/10.1007/978-3-319-11659-4</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:799432026-04-02T07:18:59Z2026-04-02T07:18:59Zby Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedingsent://SD_ILS/0/SD_ILS:762612026-04-02T07:18:59Z2026-04-02T07:18:59Zby Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Electronic Resources<br/>e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:769142026-04-02T07:18:59Z2026-04-02T07:18:59Zby Bissyandé, Tegawendé F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08368-1">http://dx.doi.org/10.1007/978-3-319-08368-1</a><br/>Format: Electronic Resources<br/>Cyberterrorism Understanding, Assessment, and Responseent://SD_ILS/0/SD_ILS:736112026-04-02T07:18:59Z2026-04-02T07:18:59Zby Chen, Thomas M. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0962-9">http://dx.doi.org/10.1007/978-1-4939-0962-9</a><br/>Format: Electronic Resources<br/>Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedingsent://SD_ILS/0/SD_ILS:838402026-04-02T07:18:59Z2026-04-02T07:18:59Zby Accorsi, Rafael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41098-7">http://dx.doi.org/10.1007/978-3-642-41098-7</a><br/>Format: Electronic Resources<br/>Web-Age Information Management 14th International Conference, WAIM 2013, Beidaihe, China, June 14-16, 2013. Proceedingsent://SD_ILS/0/SD_ILS:831432026-04-02T07:18:59Z2026-04-02T07:18:59Zby Wang, Jianyong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38562-9">http://dx.doi.org/10.1007/978-3-642-38562-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:854932026-04-02T07:18:59Z2026-04-02T07:18:59Zby Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46494-6">http://dx.doi.org/10.1007/978-3-662-46494-6</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2015 Conferences Confederated International Conferences: CoopIS, ODBASE, and C&TC 2015, Rhodes, Greece, October 26-30, 2015. Proceedingsent://SD_ILS/0/SD_ILS:811472026-04-02T07:18:59Z2026-04-02T07:18:59Zby Debruyne, Christophe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26148-5">http://dx.doi.org/10.1007/978-3-319-26148-5</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papersent://SD_ILS/0/SD_ILS:793482026-04-02T07:18:59Z2026-04-02T07:18:59Zby Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:812202026-04-02T07:18:59Z2026-04-02T07:18:59Zby Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedingsent://SD_ILS/0/SD_ILS:778342026-04-02T07:18:59Z2026-04-02T07:18:59Zby Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11257-2">http://dx.doi.org/10.1007/978-3-319-11257-2</a><br/>Format: Electronic Resources<br/>