Search Results for Data encryption (Computer science).SirsiDynix Enterprisehttps://tarama.pau.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?2026-04-02T03:31:08ZThe Manager’s Guide to Web Application Security: A Concise Guide to the Weaker Side of the Webent://SD_ILS/0/SD_ILS:730712026-04-02T03:31:08Z2026-04-02T03:31:08Zby Lepofsky, Ron. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4842-0148-0">http://dx.doi.org/10.1007/978-1-4842-0148-0</a><br/>Format: Electronic Resources<br/>Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threatsent://SD_ILS/0/SD_ILS:702262026-04-02T03:31:08Z2026-04-02T03:31:08Zby Donaldson, Scott E. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6083-7">http://dx.doi.org/10.1007/978-1-4302-6083-7</a><br/>Format: Electronic Resources<br/>Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Recordsent://SD_ILS/0/SD_ILS:703612026-04-02T03:31:08Z2026-04-02T03:31:08Zby Robichau, Bernard Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6677-8">http://dx.doi.org/10.1007/978-1-4302-6677-8</a><br/>Format: Electronic Resources<br/>10 Don’ts on Your Digital Devices The Non-Techie’s Survival Guide to Cyber Security and Privacyent://SD_ILS/0/SD_ILS:731082026-04-02T03:31:08Z2026-04-02T03:31:08Zby Bachrach, Daniel G. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4842-0367-5">http://dx.doi.org/10.1007/978-1-4842-0367-5</a><br/>Format: Electronic Resources<br/>Smart TV Security Media Playback and Digital Video Broadcastent://SD_ILS/0/SD_ILS:805222026-04-02T03:31:08Z2026-04-02T03:31:08Zby Michéle, Benjamin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20994-4">http://dx.doi.org/10.1007/978-3-319-20994-4</a><br/>Format: Electronic Resources<br/>Protecting Oracle Database 12cent://SD_ILS/0/SD_ILS:702512026-04-02T03:31:08Z2026-04-02T03:31:08Zby Wright, Paul. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6212-1">http://dx.doi.org/10.1007/978-1-4302-6212-1</a><br/>Format: Electronic Resources<br/>Expert Oracle Application Express Securityent://SD_ILS/0/SD_ILS:700782026-04-02T03:31:08Z2026-04-02T03:31:08Zby Spendolini, Scott. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-4732-6">http://dx.doi.org/10.1007/978-1-4302-4732-6</a><br/>Format: Electronic Resources<br/>Practical Hadoop Securityent://SD_ILS/0/SD_ILS:703312026-04-02T03:31:08Z2026-04-02T03:31:08Zby Lakhe, Bhushan. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6545-0">http://dx.doi.org/10.1007/978-1-4302-6545-0</a><br/>Format: Electronic Resources<br/>Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacentersent://SD_ILS/0/SD_ILS:702372026-04-02T03:31:08Z2026-04-02T03:31:08Zby Futral, William. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6149-0">http://dx.doi.org/10.1007/978-1-4302-6149-0</a><br/>Format: Electronic Resources<br/>Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:852182026-04-02T03:31:08Z2026-04-02T03:31:08Zby Kotulski, Zbigniew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44893-9">http://dx.doi.org/10.1007/978-3-662-44893-9</a><br/>Format: Electronic Resources<br/>Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:758962026-04-02T03:31:08Z2026-04-02T03:31:08Zby Kim, Yongdae. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05149-9">http://dx.doi.org/10.1007/978-3-319-05149-9</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:853622026-04-02T03:31:08Z2026-04-02T03:31:08Zby Batten, Lynn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45670-5">http://dx.doi.org/10.1007/978-3-662-45670-5</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedingsent://SD_ILS/0/SD_ILS:753832026-04-02T03:31:08Z2026-04-02T03:31:08Zby Paul, Goutam. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03515-4">http://dx.doi.org/10.1007/978-3-319-03515-4</a><br/>Format: Electronic Resources<br/>Diffusion in Social Networksent://SD_ILS/0/SD_ILS:808182026-04-02T03:31:08Z2026-04-02T03:31:08Zby Shakarian, Paulo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23105-1">http://dx.doi.org/10.1007/978-3-319-23105-1</a><br/>Format: Electronic Resources<br/>Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:805792026-04-02T03:31:08Z2026-04-02T03:31:08Zby Ors, Berna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21356-9">http://dx.doi.org/10.1007/978-3-319-21356-9</a><br/>Format: Electronic Resources<br/>Security for Cloud Storage Systemsent://SD_ILS/0/SD_ILS:724982026-04-02T03:31:08Z2026-04-02T03:31:08Zby Yang, Kan. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7873-7">http://dx.doi.org/10.1007/978-1-4614-7873-7</a><br/>Format: Electronic Resources<br/>The InfoSec Handbook An Introduction to Information Securityent://SD_ILS/0/SD_ILS:702942026-04-02T03:31:08Z2026-04-02T03:31:08Zby Rao, Umesh Hodeghatta. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6383-8">http://dx.doi.org/10.1007/978-1-4302-6383-8</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedingsent://SD_ILS/0/SD_ILS:773812026-04-02T03:31:08Z2026-04-02T03:31:08Zby Yoshida, Maki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09843-2">http://dx.doi.org/10.1007/978-3-319-09843-2</a><br/>Format: Electronic Resources<br/>Building the Infrastructure for Cloud Security A Solutions viewent://SD_ILS/0/SD_ILS:702362026-04-02T03:31:08Z2026-04-02T03:31:08Zby Yeluri, Raghu. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6146-9">http://dx.doi.org/10.1007/978-1-4302-6146-9</a><br/>Format: Electronic Resources<br/>Advances in Audio Watermarking Based on Singular Value Decompositionent://SD_ILS/0/SD_ILS:789102026-04-02T03:31:08Z2026-04-02T03:31:08Zby Dhar, Pranab Kumar. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14800-7">http://dx.doi.org/10.1007/978-3-319-14800-7</a><br/>Format: Electronic Resources<br/>Cyber Operations Building, Defending, and Attacking Modern Computer Networksent://SD_ILS/0/SD_ILS:731272026-04-02T03:31:08Z2026-04-02T03:31:08Zby O'Leary, Mike. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4842-0457-3">http://dx.doi.org/10.1007/978-1-4842-0457-3</a><br/>Format: Electronic Resources<br/>Security and Privacy for Implantable Medical Devicesent://SD_ILS/0/SD_ILS:712442026-04-02T03:31:08Z2026-04-02T03:31:08Zby Burleson, Wayne. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-1674-6">http://dx.doi.org/10.1007/978-1-4614-1674-6</a><br/>Format: Electronic Resources<br/>Managing Risk and Information Security Protect to Enableent://SD_ILS/0/SD_ILS:701482026-04-02T03:31:08Z2026-04-02T03:31:08Zby Harkins, Malcolm. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-5114-9">http://dx.doi.org/10.1007/978-1-4302-5114-9</a><br/>Format: Electronic Resources<br/>A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Securityent://SD_ILS/0/SD_ILS:703412026-04-02T03:31:08Z2026-04-02T03:31:08Zby Arthur, Will. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6584-9">http://dx.doi.org/10.1007/978-1-4302-6584-9</a><br/>Format: Electronic Resources<br/>Platform Embedded Security Technology Revealedent://SD_ILS/0/SD_ILS:703372026-04-02T03:31:08Z2026-04-02T03:31:08Zby Ruan, Xiaoyu. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6572-6">http://dx.doi.org/10.1007/978-1-4302-6572-6</a><br/>Format: Electronic Resources<br/>The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Valueent://SD_ILS/0/SD_ILS:702862026-04-02T03:31:08Z2026-04-02T03:31:08Zby Dennedy, Michelle Finneran. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6356-2">http://dx.doi.org/10.1007/978-1-4302-6356-2</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedingsent://SD_ILS/0/SD_ILS:766492026-04-02T03:31:08Z2026-04-02T03:31:08Zby Boureanu, Ioana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07536-5">http://dx.doi.org/10.1007/978-3-319-07536-5</a><br/>Format: Electronic Resources<br/>Secure IT Systems 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:779432026-04-02T03:31:08Z2026-04-02T03:31:08Zby Bernsmed, Karin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11599-3">http://dx.doi.org/10.1007/978-3-319-11599-3</a><br/>Format: Electronic Resources<br/>Secure Information Management Using Linguistic Threshold Approachent://SD_ILS/0/SD_ILS:708082026-04-02T03:31:08Z2026-04-02T03:31:08Zby Ogiela, Marek R. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-5016-9">http://dx.doi.org/10.1007/978-1-4471-5016-9</a><br/>Format: Electronic Resources<br/>Trusted Systems 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedingsent://SD_ILS/0/SD_ILS:753752026-04-02T03:31:08Z2026-04-02T03:31:08Zby Bloem, Roderick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03491-1">http://dx.doi.org/10.1007/978-3-319-03491-1</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:831312026-04-02T03:31:08Z2026-04-02T03:31:08Zby Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format: Electronic Resources<br/>Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedingsent://SD_ILS/0/SD_ILS:786362026-04-02T03:31:08Z2026-04-02T03:31:08Zby Prakash, Atul. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13841-1">http://dx.doi.org/10.1007/978-3-319-13841-1</a><br/>Format: Electronic Resources<br/>Wireless Network Security Theories and Applicationsent://SD_ILS/0/SD_ILS:826412026-04-02T03:31:08Z2026-04-02T03:31:08Zby Chen, Lei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36511-9">http://dx.doi.org/10.1007/978-3-642-36511-9</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedingsent://SD_ILS/0/SD_ILS:857052026-04-02T03:31:08Z2026-04-02T03:31:08Zby Niu, Wenjia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48683-2">http://dx.doi.org/10.1007/978-3-662-48683-2</a><br/>Format: Electronic Resources<br/>Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedingsent://SD_ILS/0/SD_ILS:839352026-04-02T03:31:08Z2026-04-02T03:31:08Zby Riis Nielson, Hanne. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41488-6">http://dx.doi.org/10.1007/978-3-642-41488-6</a><br/>Format: Electronic Resources<br/>Automated Security Managementent://SD_ILS/0/SD_ILS:748042026-04-02T03:31:08Z2026-04-02T03:31:08Zby Al-Shaer, Ehab. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-01433-3">http://dx.doi.org/10.1007/978-3-319-01433-3</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:795562026-04-02T03:31:08Z2026-04-02T03:31:08Zby Cuppens, Frédéric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17040-4">http://dx.doi.org/10.1007/978-3-319-17040-4</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedingsent://SD_ILS/0/SD_ILS:836462026-04-02T03:31:08Z2026-04-02T03:31:08Zby Bertoni, Guido. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40349-1">http://dx.doi.org/10.1007/978-3-642-40349-1</a><br/>Format: Electronic Resources<br/>Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defenseent://SD_ILS/0/SD_ILS:810402026-04-02T03:31:08Z2026-04-02T03:31:08Zby Heckman, Kristin E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25133-2">http://dx.doi.org/10.1007/978-3-319-25133-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedingsent://SD_ILS/0/SD_ILS:844852026-04-02T03:31:08Z2026-04-02T03:31:08Zby Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55220-5">http://dx.doi.org/10.1007/978-3-642-55220-5</a><br/>Format: Electronic Resources<br/>Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedingsent://SD_ILS/0/SD_ILS:751882026-04-02T03:31:08Z2026-04-02T03:31:08Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format: Electronic Resources<br/>Encrypted Email The History and Technology of Message Privacyent://SD_ILS/0/SD_ILS:805752026-04-02T03:31:08Z2026-04-02T03:31:08Zby Orman, Hilarie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21344-6">http://dx.doi.org/10.1007/978-3-319-21344-6</a><br/>Format: Electronic Resources<br/>Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedingsent://SD_ILS/0/SD_ILS:843312026-04-02T03:31:08Z2026-04-02T03:31:08Zby Martínez Pérez, Gregorio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54525-2">http://dx.doi.org/10.1007/978-3-642-54525-2</a><br/>Format: Electronic Resources<br/>Security, Privacy and Trust in Cloud Systemsent://SD_ILS/0/SD_ILS:831512026-04-02T03:31:08Z2026-04-02T03:31:08Zby Nepal, Surya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38586-5">http://dx.doi.org/10.1007/978-3-642-38586-5</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedingsent://SD_ILS/0/SD_ILS:796782026-04-02T03:31:08Z2026-04-02T03:31:08Zby Lehmann, Anja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17470-9">http://dx.doi.org/10.1007/978-3-319-17470-9</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:838962026-04-02T03:31:08Z2026-04-02T03:31:08Zby Hutter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41332-2">http://dx.doi.org/10.1007/978-3-642-41332-2</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:836592026-04-02T03:31:08Z2026-04-02T03:31:08Zby Avoine, Gildas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2014 The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:757992026-04-02T03:31:08Z2026-04-02T03:31:08Zby Benaloh, Josh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04852-9">http://dx.doi.org/10.1007/978-3-319-04852-9</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:759442026-04-02T03:31:08Z2026-04-02T03:31:08Zby Danger, Jean Luc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05302-8">http://dx.doi.org/10.1007/978-3-319-05302-8</a><br/>Format: Electronic Resources<br/>Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedingsent://SD_ILS/0/SD_ILS:840902026-04-02T03:31:08Z2026-04-02T03:31:08Zby Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:794822026-04-02T03:31:08Z2026-04-02T03:31:08Zby Joye, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16763-3">http://dx.doi.org/10.1007/978-3-319-16763-3</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedingsent://SD_ILS/0/SD_ILS:796982026-04-02T03:31:08Z2026-04-02T03:31:08Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17533-1">http://dx.doi.org/10.1007/978-3-319-17533-1</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:801712026-04-02T03:31:08Z2026-04-02T03:31:08Zby Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedingsent://SD_ILS/0/SD_ILS:769072026-04-02T03:31:08Z2026-04-02T03:31:08Zby Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08344-5">http://dx.doi.org/10.1007/978-3-319-08344-5</a><br/>Format: Electronic Resources<br/>Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:773592026-04-02T03:31:08Z2026-04-02T03:31:08Zby Eckert, Claudia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09770-1">http://dx.doi.org/10.1007/978-3-319-09770-1</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:768952026-04-02T03:31:08Z2026-04-02T03:31:08Zby Francillon, Aurélien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08302-5">http://dx.doi.org/10.1007/978-3-319-08302-5</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedingsent://SD_ILS/0/SD_ILS:777152026-04-02T03:31:08Z2026-04-02T03:31:08Zby Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10879-7">http://dx.doi.org/10.1007/978-3-319-10879-7</a><br/>Format: Electronic Resources<br/>Construction and Analysis of Cryptographic Functionsent://SD_ILS/0/SD_ILS:783742026-04-02T03:31:08Z2026-04-02T03:31:08Zby Budaghyan, Lilya. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12991-4">http://dx.doi.org/10.1007/978-3-319-12991-4</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 – July 2, 2014. Proceedingsent://SD_ILS/0/SD_ILS:849852026-04-02T03:31:08Z2026-04-02T03:31:08Zby Naccache, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43826-8">http://dx.doi.org/10.1007/978-3-662-43826-8</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:758062026-04-02T03:31:08Z2026-04-02T03:31:08Zby Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part IIent://SD_ILS/0/SD_ILS:778202026-04-02T03:31:08Z2026-04-02T03:31:08Zby Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11212-1">http://dx.doi.org/10.1007/978-3-319-11212-1</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:781232026-04-02T03:31:08Z2026-04-02T03:31:08Zby Lee, Hyang-Sook. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12160-4">http://dx.doi.org/10.1007/978-3-319-12160-4</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part Ient://SD_ILS/0/SD_ILS:778172026-04-02T03:31:08Z2026-04-02T03:31:08Zby Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11203-9">http://dx.doi.org/10.1007/978-3-319-11203-9</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:829392026-04-02T03:31:08Z2026-04-02T03:31:08Zby Kwon, Taekyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:843422026-04-02T03:31:08Z2026-04-02T03:31:08Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54568-9">http://dx.doi.org/10.1007/978-3-642-54568-9</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:795492026-04-02T03:31:08Z2026-04-02T03:31:08Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17016-9">http://dx.doi.org/10.1007/978-3-319-17016-9</a><br/>Format: Electronic Resources<br/>Communication Networks for Smart Grids Making Smart Grid Realent://SD_ILS/0/SD_ILS:710282026-04-02T03:31:08Z2026-04-02T03:31:08Zby Budka, Kenneth C. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6302-2">http://dx.doi.org/10.1007/978-1-4471-6302-2</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedingsent://SD_ILS/0/SD_ILS:830042026-04-02T03:31:08Z2026-04-02T03:31:08Zby Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format: Electronic Resources<br/>Quantum Computational Number Theoryent://SD_ILS/0/SD_ILS:811222026-04-02T03:31:08Z2026-04-02T03:31:08Zby Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format: Electronic Resources<br/>Trustworthy Execution on Mobile Devicesent://SD_ILS/0/SD_ILS:725962026-04-02T03:31:08Z2026-04-02T03:31:08Zby Vasudevan, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8190-4">http://dx.doi.org/10.1007/978-1-4614-8190-4</a><br/>Format: Electronic Resources<br/>Trusted Computing Platforms TPM2.0 in Contextent://SD_ILS/0/SD_ILS:770342026-04-02T03:31:08Z2026-04-02T03:31:08Zby Proudler, Graeme. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08744-3">http://dx.doi.org/10.1007/978-3-319-08744-3</a><br/>Format: Electronic Resources<br/>What Is Computer Science? An Information Security Perspectiveent://SD_ILS/0/SD_ILS:755442026-04-02T03:31:08Z2026-04-02T03:31:08Zby Page, Daniel. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04042-4">http://dx.doi.org/10.1007/978-3-319-04042-4</a><br/>Format: Electronic Resources<br/>Security Protocols XXI 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:839772026-04-02T03:31:08Z2026-04-02T03:31:08Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41717-7">http://dx.doi.org/10.1007/978-3-642-41717-7</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:792412026-04-02T03:31:08Z2026-04-02T03:31:08Zby Lee, Jooyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15943-0">http://dx.doi.org/10.1007/978-3-319-15943-0</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:810102026-04-02T03:31:08Z2026-04-02T03:31:08Zby Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24837-0">http://dx.doi.org/10.1007/978-3-319-24837-0</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:851752026-04-02T03:31:08Z2026-04-02T03:31:08Zby Batina, Lejla. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44709-3">http://dx.doi.org/10.1007/978-3-662-44709-3</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:825892026-04-02T03:31:08Z2026-04-02T03:31:08Zby Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedingsent://SD_ILS/0/SD_ILS:752492026-04-02T03:31:08Z2026-04-02T03:31:08Zby Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:826632026-04-02T03:31:08Z2026-04-02T03:31:08Zby Sahai, Amit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format: Electronic Resources<br/>Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:764182026-04-02T03:31:08Z2026-04-02T03:31:08Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06811-4">http://dx.doi.org/10.1007/978-3-319-06811-4</a><br/>Format: Electronic Resources<br/>Secure Wireless Sensor Networks Threats and Solutionsent://SD_ILS/0/SD_ILS:740512026-04-02T03:31:08Z2026-04-02T03:31:08Zby Conti, Mauro. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3460-7">http://dx.doi.org/10.1007/978-1-4939-3460-7</a><br/>Format: Electronic Resources<br/>Security Assessment in Vehicular Networksent://SD_ILS/0/SD_ILS:729512026-04-02T03:31:08Z2026-04-02T03:31:08Zby Du, Suguo. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format: Electronic Resources<br/>Intrusion Detection for IP-Based Multimedia Communications over Wireless Networksent://SD_ILS/0/SD_ILS:728472026-04-02T03:31:08Z2026-04-02T03:31:08Zby Tang, Jin. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:843502026-04-02T03:31:08Z2026-04-02T03:31:08Zby Krawczyk, Hugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54631-0">http://dx.doi.org/10.1007/978-3-642-54631-0</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 11th EAI International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Proceedingsent://SD_ILS/0/SD_ILS:812742026-04-02T03:31:08Z2026-04-02T03:31:08Zby Thuraisingham, Bhavani. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28865-9">http://dx.doi.org/10.1007/978-3-319-28865-9</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:781002026-04-02T03:31:08Z2026-04-02T03:31:08Zby Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12087-4">http://dx.doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Electronic Resources<br/>Querying over Encrypted Data in Smart Gridsent://SD_ILS/0/SD_ILS:762722026-04-02T03:31:08Z2026-04-02T03:31:08Zby Wen, Mi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06355-3">http://dx.doi.org/10.1007/978-3-319-06355-3</a><br/>Format: Electronic Resources<br/>Cyber Defense and Situational Awarenessent://SD_ILS/0/SD_ILS:778782026-04-02T03:31:08Z2026-04-02T03:31:08Zby Kott, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11391-3">http://dx.doi.org/10.1007/978-3-319-11391-3</a><br/>Format: Electronic Resources<br/>Cyber Warfare Building the Scientific Foundationent://SD_ILS/0/SD_ILS:786912026-04-02T03:31:08Z2026-04-02T03:31:08Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:793692026-04-02T03:31:08Z2026-04-02T03:31:08Zby Eisenbarth, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16363-5">http://dx.doi.org/10.1007/978-3-319-16363-5</a><br/>Format: Electronic Resources<br/>Automated Firewall Analytics Design, Configuration and Optimizationent://SD_ILS/0/SD_ILS:775512026-04-02T03:31:08Z2026-04-02T03:31:08Zby Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10371-6">http://dx.doi.org/10.1007/978-3-319-10371-6</a><br/>Format: Electronic Resources<br/>Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:829862026-04-02T03:31:08Z2026-04-02T03:31:08Zby Singh, Karan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37949-9">http://dx.doi.org/10.1007/978-3-642-37949-9</a><br/>Format: Electronic Resources<br/>Leakage Resilient Password Systemsent://SD_ILS/0/SD_ILS:796882026-04-02T03:31:08Z2026-04-02T03:31:08Zby Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- INDOCRYPT 2015 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:811802026-04-02T03:31:08Z2026-04-02T03:31:08Zby Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26617-6">http://dx.doi.org/10.1007/978-3-319-26617-6</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:783982026-04-02T03:31:08Z2026-04-02T03:31:08Zby Saxena, Nitesh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13066-8">http://dx.doi.org/10.1007/978-3-319-13066-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:783892026-04-02T03:31:08Z2026-04-02T03:31:08Zby Meier, Willi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13039-2">http://dx.doi.org/10.1007/978-3-319-13039-2</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:839312026-04-02T03:31:08Z2026-04-02T03:31:08Zby Bologna, Sandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format: Electronic Resources<br/>Security and Trust Management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:829972026-04-02T03:31:08Z2026-04-02T03:31:08Zby Jøsang, Audun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38004-4">http://dx.doi.org/10.1007/978-3-642-38004-4</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security Xent://SD_ILS/0/SD_ILS:855362026-04-02T03:31:08Z2026-04-02T03:31:08Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format: Electronic Resources<br/>Secure IT Systems 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19–21, 2015, Proceedingsent://SD_ILS/0/SD_ILS:811682026-04-02T03:31:08Z2026-04-02T03:31:08Zby Buchegger, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26502-5">http://dx.doi.org/10.1007/978-3-319-26502-5</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:855322026-04-02T03:31:08Z2026-04-02T03:31:08Zby Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format: Electronic Resources<br/>Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:811412026-04-02T03:31:08Z2026-04-02T03:31:08Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedingsent://SD_ILS/0/SD_ILS:811882026-04-02T03:31:08Z2026-04-02T03:31:08Zby Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedingsent://SD_ILS/0/SD_ILS:838722026-04-02T03:31:08Z2026-04-02T03:31:08Zby Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:853192026-04-02T03:31:08Z2026-04-02T03:31:08Zby Christin, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45472-5">http://dx.doi.org/10.1007/978-3-662-45472-5</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:851902026-04-02T03:31:08Z2026-04-02T03:31:08Zby Böhme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44774-1">http://dx.doi.org/10.1007/978-3-662-44774-1</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 4th International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:827662026-04-02T03:31:08Z2026-04-02T03:31:08Zby Zheng, Jun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36958-2">http://dx.doi.org/10.1007/978-3-642-36958-2</a><br/>Format: Electronic Resources<br/>Trust Management VII 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedingsent://SD_ILS/0/SD_ILS:830792026-04-02T03:31:08Z2026-04-02T03:31:08Zby Fernández-Gago, Carmen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38323-6">http://dx.doi.org/10.1007/978-3-642-38323-6</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptographyent://SD_ILS/0/SD_ILS:844492026-04-02T03:31:08Z2026-04-02T03:31:08Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55046-1">http://dx.doi.org/10.1007/978-3-642-55046-1</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VII FOSAD 2012/2013 Tutorial Lecturesent://SD_ILS/0/SD_ILS:774602026-04-02T03:31:08Z2026-04-02T03:31:08Zby Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10082-1">http://dx.doi.org/10.1007/978-3-319-10082-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part Ient://SD_ILS/0/SD_ILS:850972026-04-02T03:31:08Z2026-04-02T03:31:08Zby Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44371-2">http://dx.doi.org/10.1007/978-3-662-44371-2</a><br/>Format: Electronic Resources<br/>Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:789882026-04-02T03:31:08Z2026-04-02T03:31:08Zby Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedingsent://SD_ILS/0/SD_ILS:780912026-04-02T03:31:08Z2026-04-02T03:31:08Zby Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12060-7">http://dx.doi.org/10.1007/978-3-319-12060-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedingsent://SD_ILS/0/SD_ILS:831402026-04-02T03:31:08Z2026-04-02T03:31:08Zby Youssef, Amr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format: Electronic Resources<br/>The Hash Function BLAKEent://SD_ILS/0/SD_ILS:851882026-04-02T03:31:08Z2026-04-02T03:31:08Zby Aumasson, Jean-Philippe. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44757-4">http://dx.doi.org/10.1007/978-3-662-44757-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:856592026-04-02T03:31:08Z2026-04-02T03:31:08Zby Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47989-6">http://dx.doi.org/10.1007/978-3-662-47989-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:856622026-04-02T03:31:08Z2026-04-02T03:31:08Zby Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48000-7">http://dx.doi.org/10.1007/978-3-662-48000-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:850992026-04-02T03:31:08Z2026-04-02T03:31:08Zby Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44381-1">http://dx.doi.org/10.1007/978-3-662-44381-1</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:803172026-04-02T03:31:08Z2026-04-02T03:31:08Zby Foo, Ernest. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19962-7">http://dx.doi.org/10.1007/978-3-319-19962-7</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:856702026-04-02T03:31:08Z2026-04-02T03:31:08Zby Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:850142026-04-02T03:31:08Z2026-04-02T03:31:08Zby Moriai, Shiho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43933-3">http://dx.doi.org/10.1007/978-3-662-43933-3</a><br/>Format: Electronic Resources<br/>Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:794692026-04-02T03:31:08Z2026-04-02T03:31:08Zby Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:849152026-04-02T03:31:08Z2026-04-02T03:31:08Zby Lange, Tanja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43414-7">http://dx.doi.org/10.1007/978-3-662-43414-7</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedingsent://SD_ILS/0/SD_ILS:754042026-04-02T03:31:08Z2026-04-02T03:31:08Zby Wang, Guojun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03584-0">http://dx.doi.org/10.1007/978-3-319-03584-0</a><br/>Format: Electronic Resources<br/>Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedingsent://SD_ILS/0/SD_ILS:780232026-04-02T03:31:08Z2026-04-02T03:31:08Zby Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11851-2">http://dx.doi.org/10.1007/978-3-319-11851-2</a><br/>Format: Electronic Resources<br/>Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May 28 – June 2, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:824432026-04-02T03:31:08Z2026-04-02T03:31:08Zby Yuan, Yuyu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35795-4">http://dx.doi.org/10.1007/978-3-642-35795-4</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:838932026-04-02T03:31:08Z2026-04-02T03:31:08Zby Adams, Andrew A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2013 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedingsent://SD_ILS/0/SD_ILS:830862026-04-02T03:31:08Z2026-04-02T03:31:08Zby Johansson, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38348-9">http://dx.doi.org/10.1007/978-3-642-38348-9</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:835192026-04-02T03:31:08Z2026-04-02T03:31:08Zby Sadeghi, Ahmad-Reza. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part Ient://SD_ILS/0/SD_ILS:835582026-04-02T03:31:08Z2026-04-02T03:31:08Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40041-4">http://dx.doi.org/10.1007/978-3-642-40041-4</a><br/>Format: Electronic Resources<br/>Security and the Networked Societyent://SD_ILS/0/SD_ILS:750852026-04-02T03:31:08Z2026-04-02T03:31:08Zby Gregory, Mark A. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part IIent://SD_ILS/0/SD_ILS:835712026-04-02T03:31:08Z2026-04-02T03:31:08Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40084-1">http://dx.doi.org/10.1007/978-3-642-40084-1</a><br/>Format: Electronic Resources<br/>Embedded Multimedia Security Systems Algorithms and Architecturesent://SD_ILS/0/SD_ILS:706412026-04-02T03:31:08Z2026-04-02T03:31:08Zby Pande, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-4459-5">http://dx.doi.org/10.1007/978-1-4471-4459-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:855462026-04-02T03:31:08Z2026-04-02T03:31:08Zby Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46803-6">http://dx.doi.org/10.1007/978-3-662-46803-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:855452026-04-02T03:31:08Z2026-04-02T03:31:08Zby Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46800-5">http://dx.doi.org/10.1007/978-3-662-46800-5</a><br/>Format: Electronic Resources<br/>Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:781902026-04-02T03:31:08Z2026-04-02T03:31:08Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12400-1">http://dx.doi.org/10.1007/978-3-319-12400-1</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:756202026-04-02T03:31:08Z2026-04-02T03:31:08Zby Zia, Tanveer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:854942026-04-02T03:31:08Z2026-04-02T03:31:08Zby Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46497-7">http://dx.doi.org/10.1007/978-3-662-46497-7</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:779632026-04-02T03:31:08Z2026-04-02T03:31:08Zby Mosca, Michele. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11659-4">http://dx.doi.org/10.1007/978-3-319-11659-4</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:799432026-04-02T03:31:08Z2026-04-02T03:31:08Zby Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedingsent://SD_ILS/0/SD_ILS:762612026-04-02T03:31:08Z2026-04-02T03:31:08Zby Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Electronic Resources<br/>Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedingsent://SD_ILS/0/SD_ILS:838402026-04-02T03:31:08Z2026-04-02T03:31:08Zby Accorsi, Rafael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41098-7">http://dx.doi.org/10.1007/978-3-642-41098-7</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:854932026-04-02T03:31:08Z2026-04-02T03:31:08Zby Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46494-6">http://dx.doi.org/10.1007/978-3-662-46494-6</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papersent://SD_ILS/0/SD_ILS:793482026-04-02T03:31:08Z2026-04-02T03:31:08Zby Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:807312026-04-02T03:31:08Z2026-04-02T03:31:08Zby Tanaka, Keisuke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22425-1">http://dx.doi.org/10.1007/978-3-319-22425-1</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:812202026-04-02T03:31:08Z2026-04-02T03:31:08Zby Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedingsent://SD_ILS/0/SD_ILS:778342026-04-02T03:31:08Z2026-04-02T03:31:08Zby Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11257-2">http://dx.doi.org/10.1007/978-3-319-11257-2</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedingsent://SD_ILS/0/SD_ILS:769582026-04-02T03:31:08Z2026-04-02T03:31:08Zby Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08506-7">http://dx.doi.org/10.1007/978-3-319-08506-7</a><br/>Format: Electronic Resources<br/>Homomorphic Encryption and Applicationsent://SD_ILS/0/SD_ILS:781432026-04-02T03:31:08Z2026-04-02T03:31:08Zby Yi, Xun. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12229-8">http://dx.doi.org/10.1007/978-3-319-12229-8</a><br/>Format: Electronic Resources<br/>Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedingsent://SD_ILS/0/SD_ILS:786962026-04-02T03:31:08Z2026-04-02T03:31:08Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14054-4">http://dx.doi.org/10.1007/978-3-319-14054-4</a><br/>Format: Electronic Resources<br/>Guide to Cloud Computing Principles and Practiceent://SD_ILS/0/SD_ILS:706862026-04-02T03:31:08Z2026-04-02T03:31:08Zby Hill, Richard. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:856492026-04-02T03:31:08Z2026-04-02T03:31:08Zby Böhme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47854-7">http://dx.doi.org/10.1007/978-3-662-47854-7</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:783932026-04-02T03:31:08Z2026-04-02T03:31:08Zby Joux, Antoine. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13051-4">http://dx.doi.org/10.1007/978-3-319-13051-4</a><br/>Format: Electronic Resources<br/>Algebraic Informatics 6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015. Proceedingsent://SD_ILS/0/SD_ILS:808112026-04-02T03:31:08Z2026-04-02T03:31:08Zby Maletti, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23021-4">http://dx.doi.org/10.1007/978-3-319-23021-4</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:824992026-04-02T03:31:08Z2026-04-02T03:31:08Zby Knudsen, Lars R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:809352026-04-02T03:31:08Z2026-04-02T03:31:08Zby Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format: Electronic Resources<br/>Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedingsent://SD_ILS/0/SD_ILS:810132026-04-02T03:31:08Z2026-04-02T03:31:08Zby Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24858-5">http://dx.doi.org/10.1007/978-3-319-24858-5</a><br/>Format: Electronic Resources<br/>Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Bergerent://SD_ILS/0/SD_ILS:800012026-04-02T03:31:08Z2026-04-02T03:31:08Zby El Hajji, Said. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18681-8">http://dx.doi.org/10.1007/978-3-319-18681-8</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedingsent://SD_ILS/0/SD_ILS:812102026-04-02T03:31:08Z2026-04-02T03:31:08Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27152-1">http://dx.doi.org/10.1007/978-3-319-27152-1</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:807852026-04-02T03:31:08Z2026-04-02T03:31:08Zby Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format: Electronic Resources<br/>Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedingsent://SD_ILS/0/SD_ILS:811962026-04-02T03:31:08Z2026-04-02T03:31:08Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:809412026-04-02T03:31:08Z2026-04-02T03:31:08Zby Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:809422026-04-02T03:31:08Z2026-04-02T03:31:08Zby Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:781582026-04-02T03:31:08Z2026-04-02T03:31:08Zby Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 – July 2, 2014. Proceedingsent://SD_ILS/0/SD_ILS:769852026-04-02T03:31:08Z2026-04-02T03:31:08Zby Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:850022026-04-02T03:31:08Z2026-04-02T03:31:08Zby Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43886-2">http://dx.doi.org/10.1007/978-3-662-43886-2</a><br/>Format: Electronic Resources<br/>Mobile Authentication Problems and Solutionsent://SD_ILS/0/SD_ILS:716132026-04-02T03:31:08Z2026-04-02T03:31:08Zby Jakobsson, Markus. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format: Electronic Resources<br/>Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedingsent://SD_ILS/0/SD_ILS:811012026-04-02T03:31:08Z2026-04-02T03:31:08Zby Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedingsent://SD_ILS/0/SD_ILS:811442026-04-02T03:31:08Z2026-04-02T03:31:08Zby Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26135-5">http://dx.doi.org/10.1007/978-3-319-26135-5</a><br/>Format: Electronic Resources<br/>Automatic Malware Analysis An Emulator Based Approachent://SD_ILS/0/SD_ILS:718082026-04-02T03:31:08Z2026-04-02T03:31:08Zby Yin, Heng. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Electronic Resources<br/>The International Workshop on Digital Forensics and Watermarking 2012 11th International Workshop, IWDW 2012, Shanghai, China, October 31 – November 3, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:835762026-04-02T03:31:08Z2026-04-02T03:31:08Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40099-5">http://dx.doi.org/10.1007/978-3-642-40099-5</a><br/>Format: Electronic Resources<br/>Android Malwareent://SD_ILS/0/SD_ILS:723652026-04-02T03:31:08Z2026-04-02T03:31:08Zby Jiang, Xuxian. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedingsent://SD_ILS/0/SD_ILS:831612026-04-02T03:31:08Z2026-04-02T03:31:08Zby Gaborit, Philippe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:795792026-04-02T03:31:08Z2026-04-02T03:31:08Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17127-2">http://dx.doi.org/10.1007/978-3-319-17127-2</a><br/>Format: Electronic Resources<br/>Location Privacy Protection in Mobile Networksent://SD_ILS/0/SD_ILS:728722026-04-02T03:31:08Z2026-04-02T03:31:08Zby Liu, Xinxin. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedingsent://SD_ILS/0/SD_ILS:836052026-04-02T03:31:08Z2026-04-02T03:31:08Zby Crampton, Jason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format: Electronic Resources<br/>Provable Security 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:811392026-04-02T03:31:08Z2026-04-02T03:31:08Zby Au, Man-Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26059-4">http://dx.doi.org/10.1007/978-3-319-26059-4</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:842632026-04-02T03:31:08Z2026-04-02T03:31:08Zby Lindell, Yehuda. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54242-8">http://dx.doi.org/10.1007/978-3-642-54242-8</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems -- CHES 2015 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedingsent://SD_ILS/0/SD_ILS:856842026-04-02T03:31:08Z2026-04-02T03:31:08Zby Güneysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48324-4">http://dx.doi.org/10.1007/978-3-662-48324-4</a><br/>Format: Electronic Resources<br/>Dynamic Secrets in Communication Securityent://SD_ILS/0/SD_ILS:724872026-04-02T03:31:08Z2026-04-02T03:31:08Zby Xiao, Sheng. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7831-7">http://dx.doi.org/10.1007/978-1-4614-7831-7</a><br/>Format: Electronic Resources<br/>Security Engineering and Intelligence Informatics CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:837102026-04-02T03:31:08Z2026-04-02T03:31:08Zby Cuzzocrea, Alfredo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40588-4">http://dx.doi.org/10.1007/978-3-642-40588-4</a><br/>Format: Electronic Resources<br/>Cyber Security Deterrence and IT Protection for Critical Infrastructuresent://SD_ILS/0/SD_ILS:750562026-04-02T03:31:08Z2026-04-02T03:31:08Zby Martellini, Maurizio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format: Electronic Resources<br/>Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedingsent://SD_ILS/0/SD_ILS:832722026-04-02T03:31:08Z2026-04-02T03:31:08Zby Doyen, Guillaume. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38998-6">http://dx.doi.org/10.1007/978-3-642-38998-6</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:856652026-04-02T03:31:08Z2026-04-02T03:31:08Zby Brenner, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48051-9">http://dx.doi.org/10.1007/978-3-662-48051-9</a><br/>Format: Electronic Resources<br/>Accountability and Security in the Cloud First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lecturesent://SD_ILS/0/SD_ILS:796002026-04-02T03:31:08Z2026-04-02T03:31:08Zby Felici, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17199-9">http://dx.doi.org/10.1007/978-3-319-17199-9</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedingsent://SD_ILS/0/SD_ILS:839092026-04-02T03:31:08Z2026-04-02T03:31:08Zby Sakiyama, Kazuo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedingsent://SD_ILS/0/SD_ILS:827352026-04-02T03:31:08Z2026-04-02T03:31:08Zby Basin, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format: Electronic Resources<br/>Information Hiding 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:826002026-04-02T03:31:08Z2026-04-02T03:31:08Zby Kirchner, Matthias. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36373-3">http://dx.doi.org/10.1007/978-3-642-36373-3</a><br/>Format: Electronic Resources<br/>Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedingsent://SD_ILS/0/SD_ILS:828482026-04-02T03:31:08Z2026-04-02T03:31:08Zby Fischer-Hübner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:852162026-04-02T03:31:08Z2026-04-02T03:31:08Zby Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44885-4">http://dx.doi.org/10.1007/978-3-662-44885-4</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XI 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:809342026-04-02T03:31:08Z2026-04-02T03:31:08Zby Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24123-4">http://dx.doi.org/10.1007/978-3-319-24123-4</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:812142026-04-02T03:31:08Z2026-04-02T03:31:08Zby Bica, Ion. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27179-8">http://dx.doi.org/10.1007/978-3-319-27179-8</a><br/>Format: Electronic Resources<br/>Network Science and Cybersecurityent://SD_ILS/0/SD_ILS:724172026-04-02T03:31:08Z2026-04-02T03:31:08Zby Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7597-2">http://dx.doi.org/10.1007/978-1-4614-7597-2</a><br/>Format: Electronic Resources<br/>Moving Target Defense II Application of Game Theory and Adversarial Modelingent://SD_ILS/0/SD_ILS:717772026-04-02T03:31:08Z2026-04-02T03:31:08Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:794792026-04-02T03:31:08Z2026-04-02T03:31:08Zby Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16745-9">http://dx.doi.org/10.1007/978-3-319-16745-9</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedingsent://SD_ILS/0/SD_ILS:837572026-04-02T03:31:08Z2026-04-02T03:31:08Zby Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format: Electronic Resources<br/>Security and Privacy Preserving in Social Networksent://SD_ILS/0/SD_ILS:857272026-04-02T03:31:08Z2026-04-02T03:31:08Zby Chbeir, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7091-0894-9">http://dx.doi.org/10.1007/978-3-7091-0894-9</a><br/>Format: Electronic Resources<br/>An Introduction to Mathematical Cryptographyent://SD_ILS/0/SD_ILS:737952026-04-02T03:31:08Z2026-04-02T03:31:08Zby Hoffstein, Jeffrey. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-1711-2">http://dx.doi.org/10.1007/978-1-4939-1711-2</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics X 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:852312026-04-02T03:31:08Z2026-04-02T03:31:08Zby Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44952-3">http://dx.doi.org/10.1007/978-3-662-44952-3</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedingsent://SD_ILS/0/SD_ILS:783072026-04-02T03:31:08Z2026-04-02T03:31:08Zby Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12778-1">http://dx.doi.org/10.1007/978-3-319-12778-1</a><br/>Format: Electronic Resources<br/>Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:854042026-04-02T03:31:08Z2026-04-02T03:31:08Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45921-8">http://dx.doi.org/10.1007/978-3-662-45921-8</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedingsent://SD_ILS/0/SD_ILS:791432026-04-02T03:31:08Z2026-04-02T03:31:08Zby Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15618-7">http://dx.doi.org/10.1007/978-3-319-15618-7</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:812012026-04-02T03:31:08Z2026-04-02T03:31:08Zby Huang, Zhiqiu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27051-7">http://dx.doi.org/10.1007/978-3-319-27051-7</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedingsent://SD_ILS/0/SD_ILS:831342026-04-02T03:31:08Z2026-04-02T03:31:08Zby Cavallaro, Lorenzo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Electronic Resources<br/>Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:836882026-04-02T03:31:08Z2026-04-02T03:31:08Zby Cuzzocrea, Alfredo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format: Electronic Resources<br/>SOFSEM 2015: Theory and Practice of Computer Science 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sněžkou, Czech Republic, January 24-29, 2015. Proceedingsent://SD_ILS/0/SD_ILS:854262026-04-02T03:31:08Z2026-04-02T03:31:08Zby Italiano, Giuseppe F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46078-8">http://dx.doi.org/10.1007/978-3-662-46078-8</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:838502026-04-02T03:31:08Z2026-04-02T03:31:08Zby Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:809432026-04-02T03:31:08Z2026-04-02T03:31:08Zby Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedingsent://SD_ILS/0/SD_ILS:832932026-04-02T03:31:08Z2026-04-02T03:31:08Zby Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedingsent://SD_ILS/0/SD_ILS:809222026-04-02T03:31:08Z2026-04-02T03:31:08Zby Akram, Raja Naeem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24018-3">http://dx.doi.org/10.1007/978-3-319-24018-3</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedingsent://SD_ILS/0/SD_ILS:825972026-04-02T03:31:08Z2026-04-02T03:31:08Zby Kurosawa, Kaoru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:857072026-04-02T03:31:08Z2026-04-02T03:31:08Zby Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:857082026-04-02T03:31:08Z2026-04-02T03:31:08Zby Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Electronic Resources<br/>Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedingsent://SD_ILS/0/SD_ILS:838732026-04-02T03:31:08Z2026-04-02T03:31:08Zby Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:838532026-04-02T03:31:08Z2026-04-02T03:31:08Zby Palamidessi, Catuscia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41157-1">http://dx.doi.org/10.1007/978-3-642-41157-1</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:828502026-04-02T03:31:08Z2026-04-02T03:31:08Zby Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:854822026-04-02T03:31:08Z2026-04-02T03:31:08Zby Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papersent://SD_ILS/0/SD_ILS:827502026-04-02T03:31:08Z2026-04-02T03:31:08Zby Keromytis, Angelos D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format: Electronic Resources<br/>Engineering Secure Future Internet Services and Systems Current Researchent://SD_ILS/0/SD_ILS:766212026-04-02T03:31:08Z2026-04-02T03:31:08Zby Heisel, Maritta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07452-8">http://dx.doi.org/10.1007/978-3-319-07452-8</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:812622026-04-02T03:31:08Z2026-04-02T03:31:08Zby Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:853452026-04-02T03:31:08Z2026-04-02T03:31:08Zby Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part Ient://SD_ILS/0/SD_ILS:853462026-04-02T03:31:08Z2026-04-02T03:31:08Zby Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:806652026-04-02T03:31:08Z2026-04-02T03:31:08Zby Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedingsent://SD_ILS/0/SD_ILS:833482026-04-02T03:31:08Z2026-04-02T03:31:08Zby Wang, Lingyu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format: Electronic Resources<br/>Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedingsent://SD_ILS/0/SD_ILS:833362026-04-02T03:31:08Z2026-04-02T03:31:08Zby Janczewski, Lech J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:793432026-04-02T03:31:08Z2026-04-02T03:31:08Zby Koç, Çetin Kaya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16277-5">http://dx.doi.org/10.1007/978-3-319-16277-5</a><br/>Format: Electronic Resources<br/>Network and System Security 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:779752026-04-02T03:31:08Z2026-04-02T03:31:08Zby Au, Man Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11698-3">http://dx.doi.org/10.1007/978-3-319-11698-3</a><br/>Format: Electronic Resources<br/>Internet of Vehicles - Safe and Intelligent Mobility Second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015, Proceedingsent://SD_ILS/0/SD_ILS:812242026-04-02T03:31:08Z2026-04-02T03:31:08Zby Hsu, Ching-Hsien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27293-1">http://dx.doi.org/10.1007/978-3-319-27293-1</a><br/>Format: Electronic Resources<br/>Advanced Infocomm Technology 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012. Revised Papersent://SD_ILS/0/SD_ILS:830542026-04-02T03:31:08Z2026-04-02T03:31:08Zby Guyot, Vincent. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38227-7">http://dx.doi.org/10.1007/978-3-642-38227-7</a><br/>Format: Electronic Resources<br/>E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedingsent://SD_ILS/0/SD_ILS:807102026-04-02T03:31:08Z2026-04-02T03:31:08Zby Haenni, Rolf. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22270-7">http://dx.doi.org/10.1007/978-3-319-22270-7</a><br/>Format: Electronic Resources<br/>Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthdayent://SD_ILS/0/SD_ILS:840082026-04-02T03:31:08Z2026-04-02T03:31:08Zby Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format: Electronic Resources<br/>Quantum Attacks on Public-Key Cryptosystemsent://SD_ILS/0/SD_ILS:704432026-04-02T03:31:08Z2026-04-02T03:31:08Zby Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format: Electronic Resources<br/>Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedingsent://SD_ILS/0/SD_ILS:782122026-04-02T03:31:08Z2026-04-02T03:31:08Zby Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12475-9">http://dx.doi.org/10.1007/978-3-319-12475-9</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2013 The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedingsent://SD_ILS/0/SD_ILS:825282026-04-02T03:31:08Z2026-04-02T03:31:08Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format: Electronic Resources<br/>Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedingsent://SD_ILS/0/SD_ILS:811312026-04-02T03:31:08Z2026-04-02T03:31:08Zby Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedingsent://SD_ILS/0/SD_ILS:832682026-04-02T03:31:08Z2026-04-02T03:31:08Zby Jacobson, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format: Electronic Resources<br/>Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:835522026-04-02T03:31:08Z2026-04-02T03:31:08Zby Capitani di Vimercati, Sabrina De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format: Electronic Resources<br/>Ethical and Social Issues in the Information Ageent://SD_ILS/0/SD_ILS:708002026-04-02T03:31:08Z2026-04-02T03:31:08Zby Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-4990-3">http://dx.doi.org/10.1007/978-1-4471-4990-3</a><br/>Format: Electronic Resources<br/>Security and Privacy in Biometricsent://SD_ILS/0/SD_ILS:708772026-04-02T03:31:08Z2026-04-02T03:31:08Zby Campisi, Patrizio. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-5230-9">http://dx.doi.org/10.1007/978-1-4471-5230-9</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papersent://SD_ILS/0/SD_ILS:824742026-04-02T03:31:08Z2026-04-02T03:31:08Zby Pietro, Roberto Di. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35890-6">http://dx.doi.org/10.1007/978-3-642-35890-6</a><br/>Format: Electronic Resources<br/>Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedingsent://SD_ILS/0/SD_ILS:831652026-04-02T03:31:08Z2026-04-02T03:31:08Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:835552026-04-02T03:31:08Z2026-04-02T03:31:08Zby Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format: Electronic Resources<br/>Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedingsent://SD_ILS/0/SD_ILS:784562026-04-02T03:31:08Z2026-04-02T03:31:08Zby Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13257-0">http://dx.doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedingsent://SD_ILS/0/SD_ILS:763932026-04-02T03:31:08Z2026-04-02T03:31:08Zby Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06734-6">http://dx.doi.org/10.1007/978-3-319-06734-6</a><br/>Format: Electronic Resources<br/>Soliton Coding for Secured Optical Communication Linkent://SD_ILS/0/SD_ILS:890372026-04-02T03:31:08Z2026-04-02T03:31:08Zby Sadegh Amiri, Iraj. author.<br/><a href="http://dx.doi.org/10.1007/978-981-287-161-9">http://dx.doi.org/10.1007/978-981-287-161-9</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:774872026-04-02T03:31:08Z2026-04-02T03:31:08Zby Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format: Electronic Resources<br/>Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:842062026-04-02T03:31:08Z2026-04-02T03:31:08Zby Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:756152026-04-02T03:31:08Z2026-04-02T03:31:08Zby Padró, Carles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04268-8">http://dx.doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:806972026-04-02T03:31:08Z2026-04-02T03:31:08Zby Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:832482026-04-02T03:31:08Z2026-04-02T03:31:08Zby Huth, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38908-5">http://dx.doi.org/10.1007/978-3-642-38908-5</a><br/>Format: Electronic Resources<br/>Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedingsent://SD_ILS/0/SD_ILS:827312026-04-02T03:31:08Z2026-04-02T03:31:08Zby Mustofa, Khabib. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36818-9">http://dx.doi.org/10.1007/978-3-642-36818-9</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedingsent://SD_ILS/0/SD_ILS:843872026-04-02T03:31:08Z2026-04-02T03:31:08Zby Abadi, Martín. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54792-8">http://dx.doi.org/10.1007/978-3-642-54792-8</a><br/>Format: Electronic Resources<br/>E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:833252026-04-02T03:31:08Z2026-04-02T03:31:08Zby Heather, James. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedingsent://SD_ILS/0/SD_ILS:855212026-04-02T03:31:08Z2026-04-02T03:31:08Zby Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part Ient://SD_ILS/0/SD_ILS:840152026-04-02T03:31:08Z2026-04-02T03:31:08Zby Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part IIent://SD_ILS/0/SD_ILS:840192026-04-02T03:31:08Z2026-04-02T03:31:08Zby Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papersent://SD_ILS/0/SD_ILS:825542026-04-02T03:31:08Z2026-04-02T03:31:08Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedingsent://SD_ILS/0/SD_ILS:832872026-04-02T03:31:08Z2026-04-02T03:31:08Zby Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Electronic Resources<br/>Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:812572026-04-02T03:31:08Z2026-04-02T03:31:08Zby Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:805992026-04-02T03:31:08Z2026-04-02T03:31:08Zby Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21476-4">http://dx.doi.org/10.1007/978-3-319-21476-4</a><br/>Format: Electronic Resources<br/>Code Breaking in the Pacificent://SD_ILS/0/SD_ILS:768882026-04-02T03:31:08Z2026-04-02T03:31:08Zby Donovan, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08278-3">http://dx.doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:825402026-04-02T03:31:08Z2026-04-02T03:31:08Zby Hoepman, Jaap-Henk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedingsent://SD_ILS/0/SD_ILS:826552026-04-02T03:31:08Z2026-04-02T03:31:08Zby Jürjens, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36563-8">http://dx.doi.org/10.1007/978-3-642-36563-8</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedingsent://SD_ILS/0/SD_ILS:758142026-04-02T03:31:08Z2026-04-02T03:31:08Zby Jürjens, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04897-0">http://dx.doi.org/10.1007/978-3-319-04897-0</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedingsent://SD_ILS/0/SD_ILS:781722026-04-02T03:31:08Z2026-04-02T03:31:08Zby Schmidt, Kai-Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12325-7">http://dx.doi.org/10.1007/978-3-319-12325-7</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:841002026-04-02T03:31:08Z2026-04-02T03:31:08Zby Stam, Martijn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Attribute-based Credentials for Trust Identity in the Information Societyent://SD_ILS/0/SD_ILS:788032026-04-02T03:31:08Z2026-04-02T03:31:08Zby Rannenberg, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14439-9">http://dx.doi.org/10.1007/978-3-319-14439-9</a><br/>Format: Electronic Resources<br/>Transactions on Computational Collective Intelligence XIXent://SD_ILS/0/SD_ILS:857152026-04-02T03:31:08Z2026-04-02T03:31:08Zby Nguyen, Ngoc Thanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49017-4">http://dx.doi.org/10.1007/978-3-662-49017-4</a><br/>Format: Electronic Resources<br/>