Search Results for Data Encryption. SirsiDynix Enterprise https://tarama.pau.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bEncryption.$0026ps$003d300? 2026-04-02T03:32:09Z The Manager&rsquo;s Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web ent://SD_ILS/0/SD_ILS:73071 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Lepofsky, Ron. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4842-0148-0">http://dx.doi.org/10.1007/978-1-4842-0148-0</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats ent://SD_ILS/0/SD_ILS:70226 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Donaldson, Scott E. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6083-7">http://dx.doi.org/10.1007/978-1-4302-6083-7</a><br/>Format:&#160;Electronic Resources<br/> Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Records ent://SD_ILS/0/SD_ILS:70361 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Robichau, Bernard Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6677-8">http://dx.doi.org/10.1007/978-1-4302-6677-8</a><br/>Format:&#160;Electronic Resources<br/> 10 Don&rsquo;ts on Your Digital Devices The Non-Techie&rsquo;s Survival Guide to Cyber Security and Privacy ent://SD_ILS/0/SD_ILS:73108 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Bachrach, Daniel G. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4842-0367-5">http://dx.doi.org/10.1007/978-1-4842-0367-5</a><br/>Format:&#160;Electronic Resources<br/> Smart TV Security Media Playback and Digital Video Broadcast ent://SD_ILS/0/SD_ILS:80522 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Mich&eacute;le, Benjamin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20994-4">http://dx.doi.org/10.1007/978-3-319-20994-4</a><br/>Format:&#160;Electronic Resources<br/> Protecting Oracle Database 12c ent://SD_ILS/0/SD_ILS:70251 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Wright, Paul. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6212-1">http://dx.doi.org/10.1007/978-1-4302-6212-1</a><br/>Format:&#160;Electronic Resources<br/> Expert Oracle Application Express Security ent://SD_ILS/0/SD_ILS:70078 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Spendolini, Scott. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-4732-6">http://dx.doi.org/10.1007/978-1-4302-4732-6</a><br/>Format:&#160;Electronic Resources<br/> Practical Hadoop Security ent://SD_ILS/0/SD_ILS:70331 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Lakhe, Bhushan. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6545-0">http://dx.doi.org/10.1007/978-1-4302-6545-0</a><br/>Format:&#160;Electronic Resources<br/> Intel&reg; Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters ent://SD_ILS/0/SD_ILS:70237 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Futral, William. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6149-0">http://dx.doi.org/10.1007/978-1-4302-6149-0</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85218 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Kotulski, Zbigniew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44893-9">http://dx.doi.org/10.1007/978-3-662-44893-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75896 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Kim, Yongdae. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05149-9">http://dx.doi.org/10.1007/978-3-319-05149-9</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85362 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Batten, Lynn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45670-5">http://dx.doi.org/10.1007/978-3-662-45670-5</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:75383 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Paul, Goutam. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03515-4">http://dx.doi.org/10.1007/978-3-319-03515-4</a><br/>Format:&#160;Electronic Resources<br/> Diffusion in Social Networks ent://SD_ILS/0/SD_ILS:80818 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Shakarian, Paulo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23105-1">http://dx.doi.org/10.1007/978-3-319-23105-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:80579 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Ors, Berna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21356-9">http://dx.doi.org/10.1007/978-3-319-21356-9</a><br/>Format:&#160;Electronic Resources<br/> Security for Cloud Storage Systems ent://SD_ILS/0/SD_ILS:72498 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Yang, Kan. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7873-7">http://dx.doi.org/10.1007/978-1-4614-7873-7</a><br/>Format:&#160;Electronic Resources<br/> The InfoSec Handbook An Introduction to Information Security ent://SD_ILS/0/SD_ILS:70294 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Rao, Umesh Hodeghatta. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6383-8">http://dx.doi.org/10.1007/978-1-4302-6383-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77381 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Yoshida, Maki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09843-2">http://dx.doi.org/10.1007/978-3-319-09843-2</a><br/>Format:&#160;Electronic Resources<br/> Building the Infrastructure for Cloud Security A Solutions view ent://SD_ILS/0/SD_ILS:70236 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Yeluri, Raghu. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6146-9">http://dx.doi.org/10.1007/978-1-4302-6146-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Audio Watermarking Based on Singular Value Decomposition ent://SD_ILS/0/SD_ILS:78910 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Dhar, Pranab Kumar. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14800-7">http://dx.doi.org/10.1007/978-3-319-14800-7</a><br/>Format:&#160;Electronic Resources<br/> Cyber Operations Building, Defending, and Attacking Modern Computer Networks ent://SD_ILS/0/SD_ILS:73127 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;O'Leary, Mike. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4842-0457-3">http://dx.doi.org/10.1007/978-1-4842-0457-3</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy for Implantable Medical Devices ent://SD_ILS/0/SD_ILS:71244 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Burleson, Wayne. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-1674-6">http://dx.doi.org/10.1007/978-1-4614-1674-6</a><br/>Format:&#160;Electronic Resources<br/> Managing Risk and Information Security Protect to Enable ent://SD_ILS/0/SD_ILS:70148 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Harkins, Malcolm. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-5114-9">http://dx.doi.org/10.1007/978-1-4302-5114-9</a><br/>Format:&#160;Electronic Resources<br/> A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security ent://SD_ILS/0/SD_ILS:70341 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Arthur, Will. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6584-9">http://dx.doi.org/10.1007/978-1-4302-6584-9</a><br/>Format:&#160;Electronic Resources<br/> Platform Embedded Security Technology Revealed ent://SD_ILS/0/SD_ILS:70337 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Ruan, Xiaoyu. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6572-6">http://dx.doi.org/10.1007/978-1-4302-6572-6</a><br/>Format:&#160;Electronic Resources<br/> The Privacy Engineer&rsquo;s Manifesto Getting from Policy to Code to QA to Value ent://SD_ILS/0/SD_ILS:70286 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Dennedy, Michelle Finneran. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6356-2">http://dx.doi.org/10.1007/978-1-4302-6356-2</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76649 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Boureanu, Ioana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07536-5">http://dx.doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 19th Nordic Conference, NordSec 2014, Troms&oslash;, Norway, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:77943 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Bernsmed, Karin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11599-3">http://dx.doi.org/10.1007/978-3-319-11599-3</a><br/>Format:&#160;Electronic Resources<br/> Secure Information Management Using Linguistic Threshold Approach ent://SD_ILS/0/SD_ILS:70808 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Ogiela, Marek R. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-5016-9">http://dx.doi.org/10.1007/978-1-4471-5016-9</a><br/>Format:&#160;Electronic Resources<br/> Trusted Systems 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings ent://SD_ILS/0/SD_ILS:75375 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Bloem, Roderick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03491-1">http://dx.doi.org/10.1007/978-3-319-03491-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83131 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings ent://SD_ILS/0/SD_ILS:78636 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Prakash, Atul. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13841-1">http://dx.doi.org/10.1007/978-3-319-13841-1</a><br/>Format:&#160;Electronic Resources<br/> Wireless Network Security Theories and Applications ent://SD_ILS/0/SD_ILS:82641 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Chen, Lei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36511-9">http://dx.doi.org/10.1007/978-3-642-36511-9</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings ent://SD_ILS/0/SD_ILS:85705 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Niu, Wenjia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48683-2">http://dx.doi.org/10.1007/978-3-662-48683-2</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings ent://SD_ILS/0/SD_ILS:83935 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Riis Nielson, Hanne. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41488-6">http://dx.doi.org/10.1007/978-3-642-41488-6</a><br/>Format:&#160;Electronic Resources<br/> Automated Security Management ent://SD_ILS/0/SD_ILS:74804 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Al-Shaer, Ehab. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-01433-3">http://dx.doi.org/10.1007/978-3-319-01433-3</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:79556 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17040-4">http://dx.doi.org/10.1007/978-3-319-17040-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83646 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Bertoni, Guido. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40349-1">http://dx.doi.org/10.1007/978-3-642-40349-1</a><br/>Format:&#160;Electronic Resources<br/> Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense ent://SD_ILS/0/SD_ILS:81040 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Heckman, Kristin E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25133-2">http://dx.doi.org/10.1007/978-3-319-25133-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84485 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55220-5">http://dx.doi.org/10.1007/978-3-642-55220-5</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings ent://SD_ILS/0/SD_ILS:75188 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format:&#160;Electronic Resources<br/> Encrypted Email The History and Technology of Message Privacy ent://SD_ILS/0/SD_ILS:80575 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Orman, Hilarie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21344-6">http://dx.doi.org/10.1007/978-3-319-21344-6</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings ent://SD_ILS/0/SD_ILS:84331 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Mart&iacute;nez P&eacute;rez, Gregorio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54525-2">http://dx.doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:83151 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Nepal, Surya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38586-5">http://dx.doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings ent://SD_ILS/0/SD_ILS:79678 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Lehmann, Anja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17470-9">http://dx.doi.org/10.1007/978-3-319-17470-9</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83896 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Hutter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41332-2">http://dx.doi.org/10.1007/978-3-642-41332-2</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83659 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Avoine, Gildas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2014 The Cryptographer&rsquo;s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:75799 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Benaloh, Josh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04852-9">http://dx.doi.org/10.1007/978-3-319-04852-9</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75944 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Danger, Jean Luc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05302-8">http://dx.doi.org/10.1007/978-3-319-05302-8</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings ent://SD_ILS/0/SD_ILS:84090 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:79482 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Joye, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16763-3">http://dx.doi.org/10.1007/978-3-319-16763-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings ent://SD_ILS/0/SD_ILS:79698 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17533-1">http://dx.doi.org/10.1007/978-3-319-17533-1</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:80171 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76907 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08344-5">http://dx.doi.org/10.1007/978-3-319-08344-5</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77359 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Eckert, Claudia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09770-1">http://dx.doi.org/10.1007/978-3-319-09770-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:76895 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Francillon, Aur&eacute;lien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08302-5">http://dx.doi.org/10.1007/978-3-319-08302-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77715 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10879-7">http://dx.doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/> Construction and Analysis of Cryptographic Functions ent://SD_ILS/0/SD_ILS:78374 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Budaghyan, Lilya. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12991-4">http://dx.doi.org/10.1007/978-3-319-12991-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 &ndash; July 2, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84985 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Naccache, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43826-8">http://dx.doi.org/10.1007/978-3-662-43826-8</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography &ndash; Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75806 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:77820 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11212-1">http://dx.doi.org/10.1007/978-3-319-11212-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78123 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Lee, Hyang-Sook. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12160-4">http://dx.doi.org/10.1007/978-3-319-12160-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:77817 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11203-9">http://dx.doi.org/10.1007/978-3-319-11203-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82939 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Kwon, Taekyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84342 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54568-9">http://dx.doi.org/10.1007/978-3-642-54568-9</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:79549 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17016-9">http://dx.doi.org/10.1007/978-3-319-17016-9</a><br/>Format:&#160;Electronic Resources<br/> Communication Networks for Smart Grids Making Smart Grid Real ent://SD_ILS/0/SD_ILS:71028 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Budka, Kenneth C. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6302-2">http://dx.doi.org/10.1007/978-1-4471-6302-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83004 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format:&#160;Electronic Resources<br/> Quantum Computational Number Theory ent://SD_ILS/0/SD_ILS:81122 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Execution on Mobile Devices ent://SD_ILS/0/SD_ILS:72596 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Vasudevan, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8190-4">http://dx.doi.org/10.1007/978-1-4614-8190-4</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:77034 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Proudler, Graeme. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08744-3">http://dx.doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/> What Is Computer Science? An Information Security Perspective ent://SD_ILS/0/SD_ILS:75544 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Page, Daniel. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04042-4">http://dx.doi.org/10.1007/978-3-319-04042-4</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXI 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83977 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41717-7">http://dx.doi.org/10.1007/978-3-642-41717-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79241 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Lee, Jooyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15943-0">http://dx.doi.org/10.1007/978-3-319-15943-0</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81010 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24837-0">http://dx.doi.org/10.1007/978-3-319-24837-0</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85175 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Batina, Lejla. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44709-3">http://dx.doi.org/10.1007/978-3-662-44709-3</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography &ndash; Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82589 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings ent://SD_ILS/0/SD_ILS:75249 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82663 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Sahai, Amit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:76418 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06811-4">http://dx.doi.org/10.1007/978-3-319-06811-4</a><br/>Format:&#160;Electronic Resources<br/> Secure Wireless Sensor Networks Threats and Solutions ent://SD_ILS/0/SD_ILS:74051 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Conti, Mauro. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3460-7">http://dx.doi.org/10.1007/978-1-4939-3460-7</a><br/>Format:&#160;Electronic Resources<br/> Security Assessment in Vehicular Networks ent://SD_ILS/0/SD_ILS:72951 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Du, Suguo. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:72847 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Tang, Jin. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84350 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Krawczyk, Hugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54631-0">http://dx.doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 11th EAI International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81274 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Thuraisingham, Bhavani. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28865-9">http://dx.doi.org/10.1007/978-3-319-28865-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78100 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12087-4">http://dx.doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Electronic Resources<br/> Querying over Encrypted Data in Smart Grids ent://SD_ILS/0/SD_ILS:76272 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Wen, Mi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06355-3">http://dx.doi.org/10.1007/978-3-319-06355-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber Defense and Situational Awareness ent://SD_ILS/0/SD_ILS:77878 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Kott, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11391-3">http://dx.doi.org/10.1007/978-3-319-11391-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber Warfare Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:78691 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79369 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Eisenbarth, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16363-5">http://dx.doi.org/10.1007/978-3-319-16363-5</a><br/>Format:&#160;Electronic Resources<br/> Automated Firewall Analytics Design, Configuration and Optimization ent://SD_ILS/0/SD_ILS:77551 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10371-6">http://dx.doi.org/10.1007/978-3-319-10371-6</a><br/>Format:&#160;Electronic Resources<br/> Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82986 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Singh, Karan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37949-9">http://dx.doi.org/10.1007/978-3-642-37949-9</a><br/>Format:&#160;Electronic Resources<br/> Leakage Resilient Password Systems ent://SD_ILS/0/SD_ILS:79688 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- INDOCRYPT 2015 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81180 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26617-6">http://dx.doi.org/10.1007/978-3-319-26617-6</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78398 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Saxena, Nitesh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13066-8">http://dx.doi.org/10.1007/978-3-319-13066-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:78389 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Meier, Willi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13039-2">http://dx.doi.org/10.1007/978-3-319-13039-2</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83931 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Bologna, Sandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82997 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;J&oslash;sang, Audun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38004-4">http://dx.doi.org/10.1007/978-3-642-38004-4</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security X ent://SD_ILS/0/SD_ILS:85536 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19&ndash;21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81168 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Buchegger, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26502-5">http://dx.doi.org/10.1007/978-3-319-26502-5</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:85532 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81141 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81188 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83872 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85319 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Christin, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45472-5">http://dx.doi.org/10.1007/978-3-662-45472-5</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85190 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;B&ouml;hme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44774-1">http://dx.doi.org/10.1007/978-3-662-44774-1</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 4th International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82766 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Zheng, Jun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36958-2">http://dx.doi.org/10.1007/978-3-642-36958-2</a><br/>Format:&#160;Electronic Resources<br/> Trust Management VII 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83079 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Fern&aacute;ndez-Gago, Carmen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38323-6">http://dx.doi.org/10.1007/978-3-642-38323-6</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:84449 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55046-1">http://dx.doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VII FOSAD 2012/2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:77460 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10082-1">http://dx.doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:85097 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44371-2">http://dx.doi.org/10.1007/978-3-662-44371-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:78988 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78091 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12060-7">http://dx.doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83140 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Youssef, Amr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format:&#160;Electronic Resources<br/> The Hash Function BLAKE ent://SD_ILS/0/SD_ILS:85188 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Aumasson, Jean-Philippe. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44757-4">http://dx.doi.org/10.1007/978-3-662-44757-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:85659 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47989-6">http://dx.doi.org/10.1007/978-3-662-47989-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85662 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48000-7">http://dx.doi.org/10.1007/978-3-662-48000-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85099 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44381-1">http://dx.doi.org/10.1007/978-3-662-44381-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80317 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Foo, Ernest. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19962-7">http://dx.doi.org/10.1007/978-3-319-19962-7</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85670 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:85014 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Moriai, Shiho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43933-3">http://dx.doi.org/10.1007/978-3-662-43933-3</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash;- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:79469 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84915 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Lange, Tanja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43414-7">http://dx.doi.org/10.1007/978-3-662-43414-7</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Safety and Security 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings ent://SD_ILS/0/SD_ILS:75404 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Wang, Guojun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03584-0">http://dx.doi.org/10.1007/978-3-319-03584-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78023 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11851-2">http://dx.doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May 28 &ndash; June 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82443 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Yuan, Yuyu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35795-4">http://dx.doi.org/10.1007/978-3-642-35795-4</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83893 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Adams, Andrew A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2013 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83086 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Johansson, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38348-9">http://dx.doi.org/10.1007/978-3-642-38348-9</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83519 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Sadeghi, Ahmad-Reza. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I ent://SD_ILS/0/SD_ILS:83558 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40041-4">http://dx.doi.org/10.1007/978-3-642-40041-4</a><br/>Format:&#160;Electronic Resources<br/> Security and the Networked Society ent://SD_ILS/0/SD_ILS:75085 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Gregory, Mark A. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II ent://SD_ILS/0/SD_ILS:83571 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40084-1">http://dx.doi.org/10.1007/978-3-642-40084-1</a><br/>Format:&#160;Electronic Resources<br/> Embedded Multimedia Security Systems Algorithms and Architectures ent://SD_ILS/0/SD_ILS:70641 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Pande, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-4459-5">http://dx.doi.org/10.1007/978-1-4471-4459-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85546 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46803-6">http://dx.doi.org/10.1007/978-3-662-46803-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:85545 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46800-5">http://dx.doi.org/10.1007/978-3-662-46800-5</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78190 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12400-1">http://dx.doi.org/10.1007/978-3-319-12400-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75620 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Zia, Tanveer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85494 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46497-7">http://dx.doi.org/10.1007/978-3-662-46497-7</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77963 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Mosca, Michele. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11659-4">http://dx.doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:79943 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76261 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83840 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Accorsi, Rafael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41098-7">http://dx.doi.org/10.1007/978-3-642-41098-7</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:85493 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46494-6">http://dx.doi.org/10.1007/978-3-662-46494-6</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florian&oacute;polis, Brazil, September 17&ndash;19, 2014 Revised Selected Papers ent://SD_ILS/0/SD_ILS:79348 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80731 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Tanaka, Keisuke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22425-1">http://dx.doi.org/10.1007/978-3-319-22425-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:81220 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77834 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11257-2">http://dx.doi.org/10.1007/978-3-319-11257-2</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76958 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08506-7">http://dx.doi.org/10.1007/978-3-319-08506-7</a><br/>Format:&#160;Electronic Resources<br/> Homomorphic Encryption and Applications ent://SD_ILS/0/SD_ILS:78143 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Yi, Xun. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12229-8">http://dx.doi.org/10.1007/978-3-319-12229-8</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78696 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14054-4">http://dx.doi.org/10.1007/978-3-319-14054-4</a><br/>Format:&#160;Electronic Resources<br/> Guide to Cloud Computing Principles and Practice ent://SD_ILS/0/SD_ILS:70686 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Hill, Richard. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85649 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;B&ouml;hme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47854-7">http://dx.doi.org/10.1007/978-3-662-47854-7</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78393 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Joux, Antoine. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13051-4">http://dx.doi.org/10.1007/978-3-319-13051-4</a><br/>Format:&#160;Electronic Resources<br/> Algebraic Informatics 6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80811 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Maletti, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23021-4">http://dx.doi.org/10.1007/978-3-319-23021-4</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82499 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Knudsen, Lars R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80935 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81013 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24858-5">http://dx.doi.org/10.1007/978-3-319-24858-5</a><br/>Format:&#160;Electronic Resources<br/> Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger ent://SD_ILS/0/SD_ILS:80001 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;El Hajji, Said. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18681-8">http://dx.doi.org/10.1007/978-3-319-18681-8</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81210 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27152-1">http://dx.doi.org/10.1007/978-3-319-27152-1</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80785 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings ent://SD_ILS/0/SD_ILS:81196 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:80941 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:80942 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78158 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 &ndash; July 2, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76985 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:85002 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43886-2">http://dx.doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/> Mobile Authentication Problems and Solutions ent://SD_ILS/0/SD_ILS:71613 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Jakobsson, Markus. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81101 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81144 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26135-5">http://dx.doi.org/10.1007/978-3-319-26135-5</a><br/>Format:&#160;Electronic Resources<br/> Automatic Malware Analysis An Emulator Based Approach ent://SD_ILS/0/SD_ILS:71808 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Yin, Heng. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format:&#160;Electronic Resources<br/> The International Workshop on Digital Forensics and Watermarking 2012 11th International Workshop, IWDW 2012, Shanghai, China, October 31 &ndash; November 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83576 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40099-5">http://dx.doi.org/10.1007/978-3-642-40099-5</a><br/>Format:&#160;Electronic Resources<br/> Android Malware ent://SD_ILS/0/SD_ILS:72365 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Jiang, Xuxian. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83161 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Gaborit, Philippe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79579 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17127-2">http://dx.doi.org/10.1007/978-3-319-17127-2</a><br/>Format:&#160;Electronic Resources<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:72872 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Liu, Xinxin. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83605 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Crampton, Jason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81139 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Au, Man-Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26059-4">http://dx.doi.org/10.1007/978-3-319-26059-4</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84263 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Lindell, Yehuda. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54242-8">http://dx.doi.org/10.1007/978-3-642-54242-8</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems -- CHES 2015 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings ent://SD_ILS/0/SD_ILS:85684 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;G&uuml;neysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48324-4">http://dx.doi.org/10.1007/978-3-662-48324-4</a><br/>Format:&#160;Electronic Resources<br/> Dynamic Secrets in Communication Security ent://SD_ILS/0/SD_ILS:72487 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Xiao, Sheng. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7831-7">http://dx.doi.org/10.1007/978-1-4614-7831-7</a><br/>Format:&#160;Electronic Resources<br/> Security Engineering and Intelligence Informatics CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83710 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Cuzzocrea, Alfredo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40588-4">http://dx.doi.org/10.1007/978-3-642-40588-4</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Deterrence and IT Protection for Critical Infrastructures ent://SD_ILS/0/SD_ILS:75056 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Martellini, Maurizio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format:&#160;Electronic Resources<br/> Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83272 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Doyen, Guillaume. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38998-6">http://dx.doi.org/10.1007/978-3-642-38998-6</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85665 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Brenner, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48051-9">http://dx.doi.org/10.1007/978-3-662-48051-9</a><br/>Format:&#160;Electronic Resources<br/> Accountability and Security in the Cloud First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures ent://SD_ILS/0/SD_ILS:79600 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Felici, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17199-9">http://dx.doi.org/10.1007/978-3-319-17199-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings ent://SD_ILS/0/SD_ILS:83909 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Sakiyama, Kazuo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82735 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Basin, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82600 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Kirchner, Matthias. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36373-3">http://dx.doi.org/10.1007/978-3-642-36373-3</a><br/>Format:&#160;Electronic Resources<br/> Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82848 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Fischer-H&uuml;bner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85216 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44885-4">http://dx.doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XI 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:80934 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24123-4">http://dx.doi.org/10.1007/978-3-319-24123-4</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:81214 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Bica, Ion. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27179-8">http://dx.doi.org/10.1007/978-3-319-27179-8</a><br/>Format:&#160;Electronic Resources<br/> Network Science and Cybersecurity ent://SD_ILS/0/SD_ILS:72417 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7597-2">http://dx.doi.org/10.1007/978-1-4614-7597-2</a><br/>Format:&#160;Electronic Resources<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:71777 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79479 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16745-9">http://dx.doi.org/10.1007/978-3-319-16745-9</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83757 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy Preserving in Social Networks ent://SD_ILS/0/SD_ILS:85727 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Chbeir, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7091-0894-9">http://dx.doi.org/10.1007/978-3-7091-0894-9</a><br/>Format:&#160;Electronic Resources<br/> An Introduction to Mathematical Cryptography ent://SD_ILS/0/SD_ILS:73795 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Hoffstein, Jeffrey. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-1711-2">http://dx.doi.org/10.1007/978-1-4939-1711-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics X 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85231 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44952-3">http://dx.doi.org/10.1007/978-3-662-44952-3</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:78307 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12778-1">http://dx.doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85404 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45921-8">http://dx.doi.org/10.1007/978-3-662-45921-8</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings ent://SD_ILS/0/SD_ILS:79143 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15618-7">http://dx.doi.org/10.1007/978-3-319-15618-7</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:81201 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Huang, Zhiqiu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27051-7">http://dx.doi.org/10.1007/978-3-319-27051-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83134 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Cavallaro, Lorenzo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format:&#160;Electronic Resources<br/> Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83688 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Cuzzocrea, Alfredo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format:&#160;Electronic Resources<br/> SOFSEM 2015: Theory and Practice of Computer Science 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sněžkou, Czech Republic, January 24-29, 2015. Proceedings ent://SD_ILS/0/SD_ILS:85426 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Italiano, Giuseppe F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46078-8">http://dx.doi.org/10.1007/978-3-662-46078-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83850 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:80943 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83293 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80922 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Akram, Raja Naeem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24018-3">http://dx.doi.org/10.1007/978-3-319-24018-3</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82597 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Kurosawa, Kaoru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:85707 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85708 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83873 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83853 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Palamidessi, Catuscia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41157-1">http://dx.doi.org/10.1007/978-3-642-41157-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82850 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:85482 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:82750 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Keromytis, Angelos D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Future Internet Services and Systems Current Research ent://SD_ILS/0/SD_ILS:76621 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Heisel, Maritta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07452-8">http://dx.doi.org/10.1007/978-3-319-07452-8</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81262 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85345 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:85346 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:80665 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83348 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Wang, Lingyu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83336 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Janczewski, Lech J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:79343 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16277-5">http://dx.doi.org/10.1007/978-3-319-16277-5</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 8th International Conference, NSS 2014, Xi&rsquo;an, China, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:77975 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Au, Man Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11698-3">http://dx.doi.org/10.1007/978-3-319-11698-3</a><br/>Format:&#160;Electronic Resources<br/> Internet of Vehicles - Safe and Intelligent Mobility Second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81224 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Hsu, Ching-Hsien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27293-1">http://dx.doi.org/10.1007/978-3-319-27293-1</a><br/>Format:&#160;Electronic Resources<br/> Advanced Infocomm Technology 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012. Revised Papers ent://SD_ILS/0/SD_ILS:83054 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Guyot, Vincent. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38227-7">http://dx.doi.org/10.1007/978-3-642-38227-7</a><br/>Format:&#160;Electronic Resources<br/> E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80710 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Haenni, Rolf. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22270-7">http://dx.doi.org/10.1007/978-3-319-22270-7</a><br/>Format:&#160;Electronic Resources<br/> Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday ent://SD_ILS/0/SD_ILS:84008 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format:&#160;Electronic Resources<br/> Quantum Attacks on Public-Key Cryptosystems ent://SD_ILS/0/SD_ILS:70443 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78212 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12475-9">http://dx.doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2013 The Cryptographers&rsquo; Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82528 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format:&#160;Electronic Resources<br/> Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings ent://SD_ILS/0/SD_ILS:81131 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83268 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Jacobson, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83552 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Capitani di Vimercati, Sabrina De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format:&#160;Electronic Resources<br/> Ethical and Social Issues in the Information Age ent://SD_ILS/0/SD_ILS:70800 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-4990-3">http://dx.doi.org/10.1007/978-1-4471-4990-3</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Biometrics ent://SD_ILS/0/SD_ILS:70877 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Campisi, Patrizio. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-5230-9">http://dx.doi.org/10.1007/978-1-4471-5230-9</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:82474 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Pietro, Roberto Di. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35890-6">http://dx.doi.org/10.1007/978-3-642-35890-6</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83165 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83555 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78456 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13257-0">http://dx.doi.org/10.1007/978-3-319-13257-0</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76393 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06734-6">http://dx.doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/> Soliton Coding for Secured Optical Communication Link ent://SD_ILS/0/SD_ILS:89037 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Sadegh Amiri, Iraj. author.<br/><a href="http://dx.doi.org/10.1007/978-981-287-161-9">http://dx.doi.org/10.1007/978-981-287-161-9</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:77487 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84206 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:75615 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Padr&oacute;, Carles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04268-8">http://dx.doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80697 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83248 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Huth, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38908-5">http://dx.doi.org/10.1007/978-3-642-38908-5</a><br/>Format:&#160;Electronic Resources<br/> Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82731 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Mustofa, Khabib. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36818-9">http://dx.doi.org/10.1007/978-3-642-36818-9</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:84387 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Abadi, Mart&iacute;n. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54792-8">http://dx.doi.org/10.1007/978-3-642-54792-8</a><br/>Format:&#160;Electronic Resources<br/> E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83325 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Heather, James. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings ent://SD_ILS/0/SD_ILS:85521 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I ent://SD_ILS/0/SD_ILS:84015 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II ent://SD_ILS/0/SD_ILS:84019 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:82554 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83287 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format:&#160;Electronic Resources<br/> Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81257 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:80599 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21476-4">http://dx.doi.org/10.1007/978-3-319-21476-4</a><br/>Format:&#160;Electronic Resources<br/> Code Breaking in the Pacific ent://SD_ILS/0/SD_ILS:76888 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Donovan, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08278-3">http://dx.doi.org/10.1007/978-3-319-08278-3</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82540 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Hoepman, Jaap-Henk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82655 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;J&uuml;rjens, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36563-8">http://dx.doi.org/10.1007/978-3-642-36563-8</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:75814 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;J&uuml;rjens, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04897-0">http://dx.doi.org/10.1007/978-3-319-04897-0</a><br/>Format:&#160;Electronic Resources<br/> Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:78172 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Schmidt, Kai-Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12325-7">http://dx.doi.org/10.1007/978-3-319-12325-7</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:84100 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Stam, Martijn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/> Attribute-based Credentials for Trust Identity in the Information Society ent://SD_ILS/0/SD_ILS:78803 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Rannenberg, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14439-9">http://dx.doi.org/10.1007/978-3-319-14439-9</a><br/>Format:&#160;Electronic Resources<br/> Symmetric Cryptographic Protocols ent://SD_ILS/0/SD_ILS:76664 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Ramkumar, Mahalingam. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07584-6">http://dx.doi.org/10.1007/978-3-319-07584-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Social Networks ent://SD_ILS/0/SD_ILS:71424 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Altshuler, Yaniv. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-4139-7">http://dx.doi.org/10.1007/978-1-4614-4139-7</a><br/>Format:&#160;Electronic Resources<br/> Textbook of Forensic Science ent://SD_ILS/0/SD_ILS:122800 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Shrivastava, Pankaj. editor.<br/><a href="https://doi.org/10.1007/978-981-99-1377-0">https://doi.org/10.1007/978-981-99-1377-0</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Collective Intelligence XIX ent://SD_ILS/0/SD_ILS:85715 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Nguyen, Ngoc Thanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49017-4">http://dx.doi.org/10.1007/978-3-662-49017-4</a><br/>Format:&#160;Electronic Resources<br/> Mathematics in the Real World ent://SD_ILS/0/SD_ILS:72697 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Wallis, W.D. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8529-2">http://dx.doi.org/10.1007/978-1-4614-8529-2</a><br/>Format:&#160;Electronic Resources<br/> Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise ent://SD_ILS/0/SD_ILS:84760 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Pape, Sebastian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-07116-5">http://dx.doi.org/10.1007/978-3-658-07116-5</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems IX ent://SD_ILS/0/SD_ILS:83566 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40069-8">http://dx.doi.org/10.1007/978-3-642-40069-8</a><br/>Format:&#160;Electronic Resources<br/> Runtime Verification Third International Conference, RV 2012, Istanbul, Turkey, September 25-28, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82406 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Qadeer, Shaz. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35632-2">http://dx.doi.org/10.1007/978-3-642-35632-2</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85015 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43936-4">http://dx.doi.org/10.1007/978-3-662-43936-4</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Information Technology RAIT-2014 Proceedings ent://SD_ILS/0/SD_ILS:86440 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Biswas, G. P. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1856-2">http://dx.doi.org/10.1007/978-81-322-1856-2</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82807 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37119-6">http://dx.doi.org/10.1007/978-3-642-37119-6</a><br/>Format:&#160;Electronic Resources<br/> Advanced Parallel Processing Technologies 10th International Symposium, APPT 2013, Stockholm, Sweden, August 27-28, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84115 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Wu, Chenggang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45293-2">http://dx.doi.org/10.1007/978-3-642-45293-2</a><br/>Format:&#160;Electronic Resources<br/> Pattern Analysis, Intelligent Security and the Internet of Things ent://SD_ILS/0/SD_ILS:79658 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Abraham, Ajith. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17398-6">http://dx.doi.org/10.1007/978-3-319-17398-6</a><br/>Format:&#160;Electronic Resources<br/> A Mathematical Approach to Research Problems of Science and Technology Theoretical Basis and Developments in Mathematical Modeling ent://SD_ILS/0/SD_ILS:86110 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Nishii, Ryuei. editor.<br/><a href="http://dx.doi.org/10.1007/978-4-431-55060-0">http://dx.doi.org/10.1007/978-4-431-55060-0</a><br/>Format:&#160;Electronic Resources<br/> Wireless Mobile Communication and Healthcare Third International Conference, MobiHealth 2012, Paris, France, November 21-23, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82973 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Godara, Balwant. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37893-5">http://dx.doi.org/10.1007/978-3-642-37893-5</a><br/>Format:&#160;Electronic Resources<br/> Database Systems for Advanced Applications 18th International Conference, DASFAA 2013, Wuhan, China, April 22-25, 2013. Proceedings, Part II ent://SD_ILS/0/SD_ILS:82887 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Meng, Weiyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37450-0">http://dx.doi.org/10.1007/978-3-642-37450-0</a><br/>Format:&#160;Electronic Resources<br/> Database Systems for Advanced Applications 18th International Conference, DASFAA 2013, Wuhan, China, April 22-25, 2013. Proceedings, Part I ent://SD_ILS/0/SD_ILS:82898 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Meng, Weiyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37487-6">http://dx.doi.org/10.1007/978-3-642-37487-6</a><br/>Format:&#160;Electronic Resources<br/> Knowledge and Systems Engineering Proceedings of the Fifth International Conference KSE 2013, Volume 1 ent://SD_ILS/0/SD_ILS:75193 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Huynh, Van Nam. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02741-8">http://dx.doi.org/10.1007/978-3-319-02741-8</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84101 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Chatterjee, Mainak. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45249-9">http://dx.doi.org/10.1007/978-3-642-45249-9</a><br/>Format:&#160;Electronic Resources<br/> Big Data Computing and Communications First International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80677 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Wang, Yu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22047-5">http://dx.doi.org/10.1007/978-3-319-22047-5</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2014 ent://SD_ILS/0/SD_ILS:76850 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;K&ouml;mer, Pavel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08156-4">http://dx.doi.org/10.1007/978-3-319-08156-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Information Systems and Industrial Management 12th IFIP TC8 International Conference, CISIM 2013, Krakow, Poland, September 25-27, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83799 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Saeed, Khalid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40925-7">http://dx.doi.org/10.1007/978-3-642-40925-7</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing - ICSOC 2012 Workshops ICSOC 2012, International Workshops ASC, DISA, PAASC, SCEB, SeMaPS, WESOA, and Satellite Events, Shanghai, China, November 12-15, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82955 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Ghose, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37804-1">http://dx.doi.org/10.1007/978-3-642-37804-1</a><br/>Format:&#160;Electronic Resources<br/> Theory and Engineering of Complex Systems and Dependability Proceedings of the Tenth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, June 29 &ndash; July 3 2015, Brun&oacute;w, Poland ent://SD_ILS/0/SD_ILS:80146 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Zamojski, Wojciech. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19216-1">http://dx.doi.org/10.1007/978-3-319-19216-1</a><br/>Format:&#160;Electronic Resources<br/> Advanced Concepts for Intelligent Vision Systems 15th International Conference, ACIVS 2013, Poznań, Poland, October 28-31, 2013. Proceedings ent://SD_ILS/0/SD_ILS:75237 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Blanc-Talon, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02895-8">http://dx.doi.org/10.1007/978-3-319-02895-8</a><br/>Format:&#160;Electronic Resources<br/> Image Analysis and Recognition 12th International Conference, ICIAR 2015, Niagara Falls, ON, Canada, July 22-24, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80484 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Kamel, Mohamed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20801-5">http://dx.doi.org/10.1007/978-3-319-20801-5</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing ent://SD_ILS/0/SD_ILS:71319 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Das, Vinu V. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-3363-7">http://dx.doi.org/10.1007/978-1-4614-3363-7</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Biometrics ent://SD_ILS/0/SD_ILS:73362 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Li, Stan Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4899-7488-4">http://dx.doi.org/10.1007/978-1-4899-7488-4</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80643 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Xu, Kuai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21837-3">http://dx.doi.org/10.1007/978-3-319-21837-3</a><br/>Format:&#160;Electronic Resources<br/> Human Centered Computing First International Conference, HCC 2014, Phnom Penh, Cambodia, November 27-29, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79122 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Zu, Qiaohong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15554-8">http://dx.doi.org/10.1007/978-3-319-15554-8</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Computing, Communication and Devices Proceedings of ICCD 2014, Volume 1 ent://SD_ILS/0/SD_ILS:86491 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Jain, Lakhmi C. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2012-1">http://dx.doi.org/10.1007/978-81-322-2012-1</a><br/>Format:&#160;Electronic Resources<br/> Emerging Research in Electronics, Computer Science and Technology Proceedings of International Conference, ICERECT 2012 ent://SD_ILS/0/SD_ILS:86323 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Sridhar, V. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1157-0">http://dx.doi.org/10.1007/978-81-322-1157-0</a><br/>Format:&#160;Electronic Resources<br/> Innovations and Advances in Computer, Information, Systems Sciences, and Engineering ent://SD_ILS/0/SD_ILS:71334 2026-04-02T03:32:09Z 2026-04-02T03:32:09Z by&#160;Elleithy, Khaled. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-3535-8">http://dx.doi.org/10.1007/978-1-4614-3535-8</a><br/>Format:&#160;Electronic Resources<br/>