Search Results for Systems and Data Security. SirsiDynix Enterprise https://tarama.pau.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dSystems$002band$002bData$002bSecurity.$0026ps$003d300? 2026-04-02T03:33:01Z Trustworthy Computing and Services International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85007 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Yuan, Yuyu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43908-1">http://dx.doi.org/10.1007/978-3-662-43908-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80853 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23318-5">http://dx.doi.org/10.1007/978-3-319-23318-5</a><br/>Format:&#160;Electronic Resources<br/> ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference ent://SD_ILS/0/SD_ILS:84888 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Reimer, Helmut. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-658-10934-9">http://dx.doi.org/10.1007/978-3-658-10934-9</a><br/>Format:&#160;Electronic Resources<br/> ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conference ent://SD_ILS/0/SD_ILS:84742 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Reimer, Helmut. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-658-06708-3">http://dx.doi.org/10.1007/978-3-658-06708-3</a><br/>Format:&#160;Electronic Resources<br/> International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:80903 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Tian, Jing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23802-9">http://dx.doi.org/10.1007/978-3-319-23802-9</a><br/>Format:&#160;Electronic Resources<br/> International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:80907 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Tian, Jing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23829-6">http://dx.doi.org/10.1007/978-3-319-23829-6</a><br/>Format:&#160;Electronic Resources<br/> Aspect-Oriented Security Hardening of UML Design Models ent://SD_ILS/0/SD_ILS:79292 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Mouheb, Djedjiga. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16106-8">http://dx.doi.org/10.1007/978-3-319-16106-8</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Sketch-Based Passwords A General Framework ent://SD_ILS/0/SD_ILS:78567 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Riggan, Benjamin S. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13629-5">http://dx.doi.org/10.1007/978-3-319-13629-5</a><br/>Format:&#160;Electronic Resources<br/> ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conference ent://SD_ILS/0/SD_ILS:84620 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Reimer, Helmut. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-658-03371-2">http://dx.doi.org/10.1007/978-3-658-03371-2</a><br/>Format:&#160;Electronic Resources<br/> Wireless Networks and Security Issues, Challenges and Research Trends ent://SD_ILS/0/SD_ILS:82548 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Khan, Shafiullah. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36169-2">http://dx.doi.org/10.1007/978-3-642-36169-2</a><br/>Format:&#160;Electronic Resources<br/> Iris Biometrics From Segmentation to Template Security ent://SD_ILS/0/SD_ILS:71824 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Rathgeb, Christian. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-5571-4">http://dx.doi.org/10.1007/978-1-4614-5571-4</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80144 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Doss, Robin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19210-9">http://dx.doi.org/10.1007/978-3-319-19210-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks and Distributed Systems International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:77722 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Jahangir, Amir Hossein. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10903-9">http://dx.doi.org/10.1007/978-3-319-10903-9</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85218 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Kotulski, Zbigniew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44893-9">http://dx.doi.org/10.1007/978-3-662-44893-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75896 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Kim, Yongdae. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05149-9">http://dx.doi.org/10.1007/978-3-319-05149-9</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85362 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Batten, Lynn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45670-5">http://dx.doi.org/10.1007/978-3-662-45670-5</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:75383 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Paul, Goutam. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03515-4">http://dx.doi.org/10.1007/978-3-319-03515-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:80579 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Ors, Berna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21356-9">http://dx.doi.org/10.1007/978-3-319-21356-9</a><br/>Format:&#160;Electronic Resources<br/> Security for Cloud Storage Systems ent://SD_ILS/0/SD_ILS:72498 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Yang, Kan. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7873-7">http://dx.doi.org/10.1007/978-1-4614-7873-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77381 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Yoshida, Maki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09843-2">http://dx.doi.org/10.1007/978-3-319-09843-2</a><br/>Format:&#160;Electronic Resources<br/> Building the Infrastructure for Cloud Security A Solutions view ent://SD_ILS/0/SD_ILS:70236 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Yeluri, Raghu. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6146-9">http://dx.doi.org/10.1007/978-1-4302-6146-9</a><br/>Format:&#160;Electronic Resources<br/> Continued Rise of the Cloud Advances and Trends in Cloud Computing ent://SD_ILS/0/SD_ILS:71076 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6452-4">http://dx.doi.org/10.1007/978-1-4471-6452-4</a><br/>Format:&#160;Electronic Resources<br/> Cyber Operations Building, Defending, and Attacking Modern Computer Networks ent://SD_ILS/0/SD_ILS:73127 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;O'Leary, Mike. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4842-0457-3">http://dx.doi.org/10.1007/978-1-4842-0457-3</a><br/>Format:&#160;Electronic Resources<br/> Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations ent://SD_ILS/0/SD_ILS:84948 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Hassanien, Aboul Ella. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43616-5">http://dx.doi.org/10.1007/978-3-662-43616-5</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence in Digital Forensics: Forensic Investigation and Applications ent://SD_ILS/0/SD_ILS:76122 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Muda, Azah Kamilah. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05885-6">http://dx.doi.org/10.1007/978-3-319-05885-6</a><br/>Format:&#160;Electronic Resources<br/> Mobility Data Management and Exploration ent://SD_ILS/0/SD_ILS:73464 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Pelekis, Nikos. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0392-4">http://dx.doi.org/10.1007/978-1-4939-0392-4</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76649 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Boureanu, Ioana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07536-5">http://dx.doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 19th Nordic Conference, NordSec 2014, Troms&oslash;, Norway, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:77943 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Bernsmed, Karin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11599-3">http://dx.doi.org/10.1007/978-3-319-11599-3</a><br/>Format:&#160;Electronic Resources<br/> Primer on Client-Side Web Security ent://SD_ILS/0/SD_ILS:78142 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;De Ryck, Philippe. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12226-7">http://dx.doi.org/10.1007/978-3-319-12226-7</a><br/>Format:&#160;Electronic Resources<br/> Trusted Systems 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings ent://SD_ILS/0/SD_ILS:75375 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Bloem, Roderick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03491-1">http://dx.doi.org/10.1007/978-3-319-03491-1</a><br/>Format:&#160;Electronic Resources<br/> Security for Wireless Implantable Medical Devices ent://SD_ILS/0/SD_ILS:72289 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Hei, Xiali. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format:&#160;Electronic Resources<br/> Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems ent://SD_ILS/0/SD_ILS:89212 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Hong, Y.-W. Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-981-4560-14-6">http://dx.doi.org/10.1007/978-981-4560-14-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83131 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format:&#160;Electronic Resources<br/> Physical Layer Approaches for Securing Wireless Communication Systems ent://SD_ILS/0/SD_ILS:72088 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Wen, Hong. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-6510-2">http://dx.doi.org/10.1007/978-1-4614-6510-2</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Social Networks ent://SD_ILS/0/SD_ILS:71424 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Altshuler, Yaniv. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-4139-7">http://dx.doi.org/10.1007/978-1-4614-4139-7</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings ent://SD_ILS/0/SD_ILS:78636 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Prakash, Atul. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13841-1">http://dx.doi.org/10.1007/978-3-319-13841-1</a><br/>Format:&#160;Electronic Resources<br/> Risk Assessment and Risk-Driven Testing First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:76504 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Bauer, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07076-6">http://dx.doi.org/10.1007/978-3-319-07076-6</a><br/>Format:&#160;Electronic Resources<br/> Cyber-Development, Cyber-Democracy and Cyber-Defense Challenges, Opportunities and Implications for Theory, Policy and Practice ent://SD_ILS/0/SD_ILS:73631 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Carayannis, Elias G. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-1028-1">http://dx.doi.org/10.1007/978-1-4939-1028-1</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80799 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Abawajy, Jemal H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22915-7">http://dx.doi.org/10.1007/978-3-319-22915-7</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings ent://SD_ILS/0/SD_ILS:85705 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Niu, Wenjia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48683-2">http://dx.doi.org/10.1007/978-3-662-48683-2</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83520 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Rogers, Marcus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39891-9">http://dx.doi.org/10.1007/978-3-642-39891-9</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83934 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;H&auml;mmerli, Bernhard M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41485-5">http://dx.doi.org/10.1007/978-3-642-41485-5</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings ent://SD_ILS/0/SD_ILS:83935 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Riis Nielson, Hanne. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41488-6">http://dx.doi.org/10.1007/978-3-642-41488-6</a><br/>Format:&#160;Electronic Resources<br/> Automated Security Management ent://SD_ILS/0/SD_ILS:74804 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Al-Shaer, Ehab. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-01433-3">http://dx.doi.org/10.1007/978-3-319-01433-3</a><br/>Format:&#160;Electronic Resources<br/> Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications ent://SD_ILS/0/SD_ILS:80849 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Lu, Zhou. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23288-1">http://dx.doi.org/10.1007/978-3-319-23288-1</a><br/>Format:&#160;Electronic Resources<br/> QC-LDPC Code-Based Cryptography ent://SD_ILS/0/SD_ILS:75138 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Baldi, Marco. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02556-8">http://dx.doi.org/10.1007/978-3-319-02556-8</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:79556 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17040-4">http://dx.doi.org/10.1007/978-3-319-17040-4</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85234 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Mauri, Jaime Lloret. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44966-0">http://dx.doi.org/10.1007/978-3-662-44966-0</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83646 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Bertoni, Guido. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40349-1">http://dx.doi.org/10.1007/978-3-642-40349-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy for Mobile Healthcare Networks ent://SD_ILS/0/SD_ILS:80998 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Zhang, Kuan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24717-5">http://dx.doi.org/10.1007/978-3-319-24717-5</a><br/>Format:&#160;Electronic Resources<br/> Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense ent://SD_ILS/0/SD_ILS:81040 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Heckman, Kristin E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25133-2">http://dx.doi.org/10.1007/978-3-319-25133-2</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security: Analytics, Technology and Automation ent://SD_ILS/0/SD_ILS:79900 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Lehto, Martti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18302-2">http://dx.doi.org/10.1007/978-3-319-18302-2</a><br/>Format:&#160;Electronic Resources<br/> SmartData Privacy Meets Evolutionary Robotics ent://SD_ILS/0/SD_ILS:72065 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Harvey, Inman. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-6409-9">http://dx.doi.org/10.1007/978-1-4614-6409-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84485 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55220-5">http://dx.doi.org/10.1007/978-3-642-55220-5</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings ent://SD_ILS/0/SD_ILS:75188 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format:&#160;Electronic Resources<br/> Encrypted Email The History and Technology of Message Privacy ent://SD_ILS/0/SD_ILS:80575 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Orman, Hilarie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21344-6">http://dx.doi.org/10.1007/978-3-319-21344-6</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings ent://SD_ILS/0/SD_ILS:84331 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Mart&iacute;nez P&eacute;rez, Gregorio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54525-2">http://dx.doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83706 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Thampi, Sabu M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40576-1">http://dx.doi.org/10.1007/978-3-642-40576-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:83151 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Nepal, Surya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38586-5">http://dx.doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/> PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:71242 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83713 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Awad, Ali Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings ent://SD_ILS/0/SD_ILS:79678 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Lehmann, Anja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17470-9">http://dx.doi.org/10.1007/978-3-319-17470-9</a><br/>Format:&#160;Electronic Resources<br/> Touchless Palmprint Recognition Systems ent://SD_ILS/0/SD_ILS:77549 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Genovese, Angelo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10365-5">http://dx.doi.org/10.1007/978-3-319-10365-5</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83896 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Hutter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41332-2">http://dx.doi.org/10.1007/978-3-642-41332-2</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83659 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Avoine, Gildas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format:&#160;Electronic Resources<br/> Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security ent://SD_ILS/0/SD_ILS:71796 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Korzun, Dmitry. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-5483-0">http://dx.doi.org/10.1007/978-1-4614-5483-0</a><br/>Format:&#160;Electronic Resources<br/> Digital Defense A Cybersecurity Primer ent://SD_ILS/0/SD_ILS:80314 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Pelton, Joseph. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19953-5">http://dx.doi.org/10.1007/978-3-319-19953-5</a><br/>Format:&#160;Electronic Resources<br/> Security Planning An Applied Approach ent://SD_ILS/0/SD_ILS:79266 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Lincke, Susan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16027-6">http://dx.doi.org/10.1007/978-3-319-16027-6</a><br/>Format:&#160;Electronic Resources<br/> Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84983 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43813-8">http://dx.doi.org/10.1007/978-3-662-43813-8</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75522 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Luiijf, Eric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2014 The Cryptographer&rsquo;s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:75799 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Benaloh, Josh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04852-9">http://dx.doi.org/10.1007/978-3-319-04852-9</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013 ent://SD_ILS/0/SD_ILS:85411 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45947-8">http://dx.doi.org/10.1007/978-3-662-45947-8</a><br/>Format:&#160;Electronic Resources<br/> Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:79951 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Damsgaard Jensen, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18491-3">http://dx.doi.org/10.1007/978-3-319-18491-3</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75944 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Danger, Jean Luc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05302-8">http://dx.doi.org/10.1007/978-3-319-05302-8</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings ent://SD_ILS/0/SD_ILS:84090 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format:&#160;Electronic Resources<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:80866 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23473-1">http://dx.doi.org/10.1007/978-3-319-23473-1</a><br/>Format:&#160;Electronic Resources<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:77317 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09644-5">http://dx.doi.org/10.1007/978-3-319-09644-5</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid Security ent://SD_ILS/0/SD_ILS:71143 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Goel, Sanjay. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6663-4">http://dx.doi.org/10.1007/978-1-4471-6663-4</a><br/>Format:&#160;Electronic Resources<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77744 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Teufel, Stephanie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10975-6">http://dx.doi.org/10.1007/978-3-319-10975-6</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80444 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Almgren, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20550-2">http://dx.doi.org/10.1007/978-3-319-20550-2</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:79482 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Joye, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16763-3">http://dx.doi.org/10.1007/978-3-319-16763-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings ent://SD_ILS/0/SD_ILS:79698 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17533-1">http://dx.doi.org/10.1007/978-3-319-17533-1</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:80171 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76907 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08344-5">http://dx.doi.org/10.1007/978-3-319-08344-5</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions and Defenses 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77874 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Stavrou, Angelos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11379-1">http://dx.doi.org/10.1007/978-3-319-11379-1</a><br/>Format:&#160;Electronic Resources<br/> Detecting Peripheral-based Attacks on the Host Memory ent://SD_ILS/0/SD_ILS:78536 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Stewin, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13515-1">http://dx.doi.org/10.1007/978-3-319-13515-1</a><br/>Format:&#160;Electronic Resources<br/> Virtualization Techniques for Mobile Systems ent://SD_ILS/0/SD_ILS:76080 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Jaramillo, David. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05741-5">http://dx.doi.org/10.1007/978-3-319-05741-5</a><br/>Format:&#160;Electronic Resources<br/> Evolution of Cyber Technologies and Operations to 2035 ent://SD_ILS/0/SD_ILS:80880 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Blowers, Misty. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23585-1">http://dx.doi.org/10.1007/978-3-319-23585-1</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:75821 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Faloutsos, Michalis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04918-2">http://dx.doi.org/10.1007/978-3-319-04918-2</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings ent://SD_ILS/0/SD_ILS:81035 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Mitton, Nathalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25067-0">http://dx.doi.org/10.1007/978-3-319-25067-0</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77359 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Eckert, Claudia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09770-1">http://dx.doi.org/10.1007/978-3-319-09770-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:76895 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Francillon, Aur&eacute;lien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08302-5">http://dx.doi.org/10.1007/978-3-319-08302-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77715 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10879-7">http://dx.doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/> Trusted Cloud Computing ent://SD_ILS/0/SD_ILS:78287 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Krcmar, Helmut. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12718-7">http://dx.doi.org/10.1007/978-3-319-12718-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 &ndash; July 2, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84985 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Naccache, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43826-8">http://dx.doi.org/10.1007/978-3-662-43826-8</a><br/>Format:&#160;Electronic Resources<br/> Security Issues in Mobile NFC Devices ent://SD_ILS/0/SD_ILS:79101 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Roland, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15488-6">http://dx.doi.org/10.1007/978-3-319-15488-6</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography &ndash; Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75806 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:77820 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11212-1">http://dx.doi.org/10.1007/978-3-319-11212-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78123 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Lee, Hyang-Sook. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12160-4">http://dx.doi.org/10.1007/978-3-319-12160-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:77817 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11203-9">http://dx.doi.org/10.1007/978-3-319-11203-9</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85194 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44791-8">http://dx.doi.org/10.1007/978-3-662-44791-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82939 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Kwon, Taekyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing for Embedded Systems ent://SD_ILS/0/SD_ILS:77246 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Candaele, Bernard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09420-5">http://dx.doi.org/10.1007/978-3-319-09420-5</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84342 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54568-9">http://dx.doi.org/10.1007/978-3-642-54568-9</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85193 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44788-8">http://dx.doi.org/10.1007/978-3-662-44788-8</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communication 11th International Conference, WWIC 2013, St. Petersburg, Russia, June 5-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83099 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Tsaoussidis, Vassilis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38401-1">http://dx.doi.org/10.1007/978-3-642-38401-1</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:79549 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17016-9">http://dx.doi.org/10.1007/978-3-319-17016-9</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81132 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25915-4">http://dx.doi.org/10.1007/978-3-319-25915-4</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76959 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08509-8">http://dx.doi.org/10.1007/978-3-319-08509-8</a><br/>Format:&#160;Electronic Resources<br/> Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 &ndash; July 3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84994 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Sperotto, Anna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43862-6">http://dx.doi.org/10.1007/978-3-662-43862-6</a><br/>Format:&#160;Electronic Resources<br/> Medical Data Privacy Handbook ent://SD_ILS/0/SD_ILS:80883 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Gkoulalas-Divanis, Aris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23633-9">http://dx.doi.org/10.1007/978-3-319-23633-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83004 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80798 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Fischer-H&uuml;bner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22906-5">http://dx.doi.org/10.1007/978-3-319-22906-5</a><br/>Format:&#160;Electronic Resources<br/> Guide to Security Assurance for Cloud Computing ent://SD_ILS/0/SD_ILS:81137 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Zhu, Shao Ying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25988-8">http://dx.doi.org/10.1007/978-3-319-25988-8</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity in Switzerland ent://SD_ILS/0/SD_ILS:77631 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Dunn Cavelty, Myriam. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10620-5">http://dx.doi.org/10.1007/978-3-319-10620-5</a><br/>Format:&#160;Electronic Resources<br/> Quantum Computational Number Theory ent://SD_ILS/0/SD_ILS:81122 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Execution on Mobile Devices ent://SD_ILS/0/SD_ILS:72596 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Vasudevan, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8190-4">http://dx.doi.org/10.1007/978-1-4614-8190-4</a><br/>Format:&#160;Electronic Resources<br/> Protecting Privacy in Data Release ent://SD_ILS/0/SD_ILS:79293 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Livraga, Giovanni. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16109-9">http://dx.doi.org/10.1007/978-3-319-16109-9</a><br/>Format:&#160;Electronic Resources<br/> Secure IP Mobility Management for VANET ent://SD_ILS/0/SD_ILS:74779 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Taha, Sanaa. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-01351-0">http://dx.doi.org/10.1007/978-3-319-01351-0</a><br/>Format:&#160;Electronic Resources<br/> Handbook on Data Centers ent://SD_ILS/0/SD_ILS:73886 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Khan, Samee U. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-2092-1">http://dx.doi.org/10.1007/978-1-4939-2092-1</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:77034 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Proudler, Graeme. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08744-3">http://dx.doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management for the Future Internet in the Age of Globalisation 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79988 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18621-4">http://dx.doi.org/10.1007/978-3-319-18621-4</a><br/>Format:&#160;Electronic Resources<br/> The Economics of Information Security and Privacy ent://SD_ILS/0/SD_ILS:83417 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;B&ouml;hme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXI 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83977 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41717-7">http://dx.doi.org/10.1007/978-3-642-41717-7</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity in Israel ent://SD_ILS/0/SD_ILS:80081 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Tabansky, Lior. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18986-4">http://dx.doi.org/10.1007/978-3-319-18986-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80948 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Koornneef, Floor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24249-1">http://dx.doi.org/10.1007/978-3-319-24249-1</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84519 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Cuppens-Boulahia, Nora. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55415-5">http://dx.doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/> Distributed Denial of Service Attack and Defense ent://SD_ILS/0/SD_ILS:72988 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Yu, Shui. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9491-1">http://dx.doi.org/10.1007/978-1-4614-9491-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79241 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Lee, Jooyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15943-0">http://dx.doi.org/10.1007/978-3-319-15943-0</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81010 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24837-0">http://dx.doi.org/10.1007/978-3-319-24837-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84471 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Hansen, Marit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55137-6">http://dx.doi.org/10.1007/978-3-642-55137-6</a><br/>Format:&#160;Electronic Resources<br/> Cyberpatterns Unifying Design Patterns with Security and Attack Patterns ent://SD_ILS/0/SD_ILS:75672 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Blackwell, Clive. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04447-7">http://dx.doi.org/10.1007/978-3-319-04447-7</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85175 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Batina, Lejla. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44709-3">http://dx.doi.org/10.1007/978-3-662-44709-3</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography &ndash; Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82589 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings ent://SD_ILS/0/SD_ILS:75249 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82663 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Sahai, Amit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:76418 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06811-4">http://dx.doi.org/10.1007/978-3-319-06811-4</a><br/>Format:&#160;Electronic Resources<br/> Secure Wireless Sensor Networks Threats and Solutions ent://SD_ILS/0/SD_ILS:74051 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Conti, Mauro. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3460-7">http://dx.doi.org/10.1007/978-1-4939-3460-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84223 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54069-1">http://dx.doi.org/10.1007/978-3-642-54069-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76398 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06749-0">http://dx.doi.org/10.1007/978-3-319-06749-0</a><br/>Format:&#160;Electronic Resources<br/> Security Assessment in Vehicular Networks ent://SD_ILS/0/SD_ILS:72951 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Du, Suguo. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:72847 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Tang, Jin. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82852 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Flegel, Ulrich. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37300-8">http://dx.doi.org/10.1007/978-3-642-37300-8</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84350 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Krawczyk, Hugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54631-0">http://dx.doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82642 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Roughan, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36516-4">http://dx.doi.org/10.1007/978-3-642-36516-4</a><br/>Format:&#160;Electronic Resources<br/> Secure and Trustworthy Service Composition The Aniketos Approach ent://SD_ILS/0/SD_ILS:78537 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Brucker, Achim D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13518-2">http://dx.doi.org/10.1007/978-3-319-13518-2</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 11th EAI International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81274 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Thuraisingham, Bhavani. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28865-9">http://dx.doi.org/10.1007/978-3-319-28865-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78100 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12087-4">http://dx.doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77611 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Bondavalli, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10557-4">http://dx.doi.org/10.1007/978-3-319-10557-4</a><br/>Format:&#160;Electronic Resources<br/> Querying over Encrypted Data in Smart Grids ent://SD_ILS/0/SD_ILS:76272 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Wen, Mi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06355-3">http://dx.doi.org/10.1007/978-3-319-06355-3</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Wireless Environments: Detecting and Localizing User Spoofing ent://SD_ILS/0/SD_ILS:76589 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Yang, Jie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07356-9">http://dx.doi.org/10.1007/978-3-319-07356-9</a><br/>Format:&#160;Electronic Resources<br/> Network Hardening An Automated Approach to Improving Network Security ent://SD_ILS/0/SD_ILS:75724 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04612-9">http://dx.doi.org/10.1007/978-3-319-04612-9</a><br/>Format:&#160;Electronic Resources<br/> Cyber Defense and Situational Awareness ent://SD_ILS/0/SD_ILS:77878 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Kott, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11391-3">http://dx.doi.org/10.1007/978-3-319-11391-3</a><br/>Format:&#160;Electronic Resources<br/> Physical Unclonable Functions in Theory and Practice ent://SD_ILS/0/SD_ILS:71664 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;B&ouml;hm, Christoph. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-5040-5">http://dx.doi.org/10.1007/978-1-4614-5040-5</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace and International Relations Theory, Prospects and Challenges ent://SD_ILS/0/SD_ILS:82896 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Kremer, Jan-Frederik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37481-4">http://dx.doi.org/10.1007/978-3-642-37481-4</a><br/>Format:&#160;Electronic Resources<br/> Building Secure Defenses Against Code-Reuse Attacks ent://SD_ILS/0/SD_ILS:81092 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Davi, Lucas. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25546-0">http://dx.doi.org/10.1007/978-3-319-25546-0</a><br/>Format:&#160;Electronic Resources<br/> Cyber Warfare Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:78691 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format:&#160;Electronic Resources<br/> Counterterrorism and Cybersecurity Total Information Awareness ent://SD_ILS/0/SD_ILS:79612 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Lee, Newton. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17244-6">http://dx.doi.org/10.1007/978-3-319-17244-6</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 12th International Conference, WWIC 2014, Paris, France, May 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78430 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Mellouk, Abdelhamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13174-0">http://dx.doi.org/10.1007/978-3-319-13174-0</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79369 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Eisenbarth, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16363-5">http://dx.doi.org/10.1007/978-3-319-16363-5</a><br/>Format:&#160;Electronic Resources<br/> Automated Firewall Analytics Design, Configuration and Optimization ent://SD_ILS/0/SD_ILS:77551 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10371-6">http://dx.doi.org/10.1007/978-3-319-10371-6</a><br/>Format:&#160;Electronic Resources<br/> Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82986 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Singh, Karan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37949-9">http://dx.doi.org/10.1007/978-3-642-37949-9</a><br/>Format:&#160;Electronic Resources<br/> Leakage Resilient Password Systems ent://SD_ILS/0/SD_ILS:79688 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- INDOCRYPT 2015 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81180 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26617-6">http://dx.doi.org/10.1007/978-3-319-26617-6</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Computing and Services International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers ent://SD_ILS/0/SD_ILS:85622 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Yueming, Lu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47401-3">http://dx.doi.org/10.1007/978-3-662-47401-3</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78398 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Saxena, Nitesh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13066-8">http://dx.doi.org/10.1007/978-3-319-13066-8</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Challenges, Limitations and R&amp;D Solutions ent://SD_ILS/0/SD_ILS:77602 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10530-7">http://dx.doi.org/10.1007/978-3-319-10530-7</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81239 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27668-7">http://dx.doi.org/10.1007/978-3-319-27668-7</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:78389 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Meier, Willi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13039-2">http://dx.doi.org/10.1007/978-3-319-13039-2</a><br/>Format:&#160;Electronic Resources<br/> E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:77979 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Sideridis, Alexander B. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11710-2">http://dx.doi.org/10.1007/978-3-319-11710-2</a><br/>Format:&#160;Electronic Resources<br/> A Mathematical Approach to Research Problems of Science and Technology Theoretical Basis and Developments in Mathematical Modeling ent://SD_ILS/0/SD_ILS:86110 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Nishii, Ryuei. editor.<br/><a href="http://dx.doi.org/10.1007/978-4-431-55060-0">http://dx.doi.org/10.1007/978-4-431-55060-0</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:85657 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47974-2">http://dx.doi.org/10.1007/978-3-662-47974-2</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83931 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Bologna, Sandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82997 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;J&oslash;sang, Audun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38004-4">http://dx.doi.org/10.1007/978-3-642-38004-4</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security X ent://SD_ILS/0/SD_ILS:85536 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format:&#160;Electronic Resources<br/> Sensor Systems and Software 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75585 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Zuniga, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04166-7">http://dx.doi.org/10.1007/978-3-319-04166-7</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19&ndash;21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81168 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Buchegger, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26502-5">http://dx.doi.org/10.1007/978-3-319-26502-5</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:85532 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81141 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81188 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83872 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format:&#160;Electronic Resources<br/> E-Democracy &ndash; Citizen Rights in the World of the New Computing Paradigms 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81212 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27164-4">http://dx.doi.org/10.1007/978-3-319-27164-4</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85319 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Christin, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45472-5">http://dx.doi.org/10.1007/978-3-662-45472-5</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85190 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;B&ouml;hme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44774-1">http://dx.doi.org/10.1007/978-3-662-44774-1</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings ent://SD_ILS/0/SD_ILS:79107 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Mirkovic, Jelena. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15509-8">http://dx.doi.org/10.1007/978-3-319-15509-8</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 4th International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82766 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Zheng, Jun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36958-2">http://dx.doi.org/10.1007/978-3-642-36958-2</a><br/>Format:&#160;Electronic Resources<br/> Trust Management VII 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83079 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Fern&aacute;ndez-Gago, Carmen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38323-6">http://dx.doi.org/10.1007/978-3-642-38323-6</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Systems for Human Cognition Augmentation ent://SD_ILS/0/SD_ILS:77552 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10374-7">http://dx.doi.org/10.1007/978-3-319-10374-7</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:84449 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55046-1">http://dx.doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VII FOSAD 2012/2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:77460 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10082-1">http://dx.doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78479 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Mitton, Natalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13329-4">http://dx.doi.org/10.1007/978-3-319-13329-4</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Mechanisms for Network Configuration and Security 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80334 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Latr&eacute;, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20034-7">http://dx.doi.org/10.1007/978-3-319-20034-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:85097 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44371-2">http://dx.doi.org/10.1007/978-3-662-44371-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:78988 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78091 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12060-7">http://dx.doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83140 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Youssef, Amr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format:&#160;Electronic Resources<br/> The Hash Function BLAKE ent://SD_ILS/0/SD_ILS:85188 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Aumasson, Jean-Philippe. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44757-4">http://dx.doi.org/10.1007/978-3-662-44757-4</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75565 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Sherif, Mostafa Hashem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04105-6">http://dx.doi.org/10.1007/978-3-319-04105-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:85659 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47989-6">http://dx.doi.org/10.1007/978-3-662-47989-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85662 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48000-7">http://dx.doi.org/10.1007/978-3-662-48000-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85099 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44381-1">http://dx.doi.org/10.1007/978-3-662-44381-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80317 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Foo, Ernest. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19962-7">http://dx.doi.org/10.1007/978-3-319-19962-7</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85670 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80848 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:85014 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Moriai, Shiho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43933-3">http://dx.doi.org/10.1007/978-3-662-43933-3</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash;- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:79469 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84915 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Lange, Tanja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43414-7">http://dx.doi.org/10.1007/978-3-662-43414-7</a><br/>Format:&#160;Electronic Resources<br/> Secure Cloud Computing ent://SD_ILS/0/SD_ILS:72927 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9278-8">http://dx.doi.org/10.1007/978-1-4614-9278-8</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:85403 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Maffei, Matteo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45917-1">http://dx.doi.org/10.1007/978-3-662-45917-1</a><br/>Format:&#160;Electronic Resources<br/> Mobile, Secure, and Programmable Networking First International Conference, MSPN 2015, Paris, France, June 15-17, 2015, Selected Papers ent://SD_ILS/0/SD_ILS:81108 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Boumerdassi, Selma. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25744-0">http://dx.doi.org/10.1007/978-3-319-25744-0</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78242 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12574-9">http://dx.doi.org/10.1007/978-3-319-12574-9</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Safety and Security 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings ent://SD_ILS/0/SD_ILS:75404 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Wang, Guojun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03584-0">http://dx.doi.org/10.1007/978-3-319-03584-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77594 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Bondavalli, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10506-2">http://dx.doi.org/10.1007/978-3-319-10506-2</a><br/>Format:&#160;Electronic Resources<br/> Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits ent://SD_ILS/0/SD_ILS:72170 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Peeters, Eric. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83887 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Stolfo, Salvatore J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41284-4">http://dx.doi.org/10.1007/978-3-642-41284-4</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75887 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Abadi, Mart&iacute;n. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05119-2">http://dx.doi.org/10.1007/978-3-319-05119-2</a><br/>Format:&#160;Electronic Resources<br/> Risk Assessment and Risk-Driven Testing Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:81161 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Seehusen, Fredrik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26416-5">http://dx.doi.org/10.1007/978-3-319-26416-5</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Biometrics ent://SD_ILS/0/SD_ILS:73362 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Li, Stan Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4899-7488-4">http://dx.doi.org/10.1007/978-1-4899-7488-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science and Ubiquitous Computing CSA &amp; CUTE ent://SD_ILS/0/SD_ILS:88998 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Park, Doo-Soon. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0281-6">http://dx.doi.org/10.1007/978-981-10-0281-6</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:77537 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10329-7">http://dx.doi.org/10.1007/978-3-319-10329-7</a><br/>Format:&#160;Electronic Resources<br/> Botnets ent://SD_ILS/0/SD_ILS:70873 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Tiirmaa-Klaar, Heli. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-5216-3">http://dx.doi.org/10.1007/978-1-4471-5216-3</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid Security First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83003 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38030-3">http://dx.doi.org/10.1007/978-3-642-38030-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and Privacy 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81065 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25360-2">http://dx.doi.org/10.1007/978-3-319-25360-2</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 9th International Conference, ICDCIT 2013, Bhubaneswar, India, February 5-8, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82520 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Hota, Chittaranjan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36071-8">http://dx.doi.org/10.1007/978-3-642-36071-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78023 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11851-2">http://dx.doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May 28 &ndash; June 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82443 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Yuan, Yuyu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35795-4">http://dx.doi.org/10.1007/978-3-642-35795-4</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83893 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Adams, Andrew A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format:&#160;Electronic Resources<br/> Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures ent://SD_ILS/0/SD_ILS:83723 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Haataja, Keijo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 7th International Conference, IDCS 2014, Calabria, Italy, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77973 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Fortino, Giancarlo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11692-1">http://dx.doi.org/10.1007/978-3-319-11692-1</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83471 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Wang, G. Alan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39693-9">http://dx.doi.org/10.1007/978-3-642-39693-9</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings ent://SD_ILS/0/SD_ILS:78954 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Natarajan, Raja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14977-6">http://dx.doi.org/10.1007/978-3-319-14977-6</a><br/>Format:&#160;Electronic Resources<br/> Understanding Network Hacks Attack and Defense with Python ent://SD_ILS/0/SD_ILS:85109 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Ballmann, Bastian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44437-5">http://dx.doi.org/10.1007/978-3-662-44437-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2013 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83086 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Johansson, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38348-9">http://dx.doi.org/10.1007/978-3-642-38348-9</a><br/>Format:&#160;Electronic Resources<br/> Self- and Co-regulation in Cybercrime, Cybersecurity and National Security ent://SD_ILS/0/SD_ILS:79390 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Tropina, Tatiana. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16447-2">http://dx.doi.org/10.1007/978-3-319-16447-2</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83519 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Sadeghi, Ahmad-Reza. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented and Cloud Computing Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85214 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Villari, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44879-3">http://dx.doi.org/10.1007/978-3-662-44879-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I ent://SD_ILS/0/SD_ILS:83558 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40041-4">http://dx.doi.org/10.1007/978-3-642-40041-4</a><br/>Format:&#160;Electronic Resources<br/> Security and the Networked Society ent://SD_ILS/0/SD_ILS:75085 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Gregory, Mark A. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II ent://SD_ILS/0/SD_ILS:83571 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40084-1">http://dx.doi.org/10.1007/978-3-642-40084-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Mobile Social Networks ent://SD_ILS/0/SD_ILS:72802 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Liang, Xiaohui. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8857-6">http://dx.doi.org/10.1007/978-1-4614-8857-6</a><br/>Format:&#160;Electronic Resources<br/> Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Framework ent://SD_ILS/0/SD_ILS:76874 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Ben Ayed, Ghazi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08231-8">http://dx.doi.org/10.1007/978-3-319-08231-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85546 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46803-6">http://dx.doi.org/10.1007/978-3-662-46803-6</a><br/>Format:&#160;Electronic Resources<br/> Service Oriented and Cloud Computing 4th European Conference, ESOCC 2015, Taormina, Italy, September 15-17, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80929 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Dustdar, Schahram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24072-5">http://dx.doi.org/10.1007/978-3-319-24072-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:85545 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46800-5">http://dx.doi.org/10.1007/978-3-662-46800-5</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78190 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12400-1">http://dx.doi.org/10.1007/978-3-319-12400-1</a><br/>Format:&#160;Electronic Resources<br/> Game Theoretic Analysis of Congestion, Safety and Security Traffic and Transportation Theory ent://SD_ILS/0/SD_ILS:77968 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Hausken, Kjell. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11674-7">http://dx.doi.org/10.1007/978-3-319-11674-7</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:75683 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Natarajan, Raja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04483-5">http://dx.doi.org/10.1007/978-3-319-04483-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75620 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Zia, Tanveer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXIX 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80487 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Samarati, Pierangela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20810-7">http://dx.doi.org/10.1007/978-3-319-20810-7</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85015 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43936-4">http://dx.doi.org/10.1007/978-3-662-43936-4</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Public Key Infrastructures ent://SD_ILS/0/SD_ILS:83726 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Buchmann, Johannes A. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85494 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46497-7">http://dx.doi.org/10.1007/978-3-662-46497-7</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77963 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Mosca, Michele. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11659-4">http://dx.doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:79943 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76261 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Electronic Resources<br/> e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:76914 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Bissyand&eacute;, Tegawend&eacute; F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08368-1">http://dx.doi.org/10.1007/978-3-319-08368-1</a><br/>Format:&#160;Electronic Resources<br/> Cyberterrorism Understanding, Assessment, and Response ent://SD_ILS/0/SD_ILS:73611 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Chen, Thomas M. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0962-9">http://dx.doi.org/10.1007/978-1-4939-0962-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83840 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Accorsi, Rafael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41098-7">http://dx.doi.org/10.1007/978-3-642-41098-7</a><br/>Format:&#160;Electronic Resources<br/> Web-Age Information Management 14th International Conference, WAIM 2013, Beidaihe, China, June 14-16, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83143 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Wang, Jianyong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38562-9">http://dx.doi.org/10.1007/978-3-642-38562-9</a><br/>Format:&#160;Electronic Resources<br/> On the Move to Meaningful Internet Systems: OTM 2015 Conferences Confederated International Conferences: CoopIS, ODBASE, and C&amp;TC 2015, Rhodes, Greece, October 26-30, 2015. Proceedings ent://SD_ILS/0/SD_ILS:81147 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Debruyne, Christophe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26148-5">http://dx.doi.org/10.1007/978-3-319-26148-5</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:85493 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46494-6">http://dx.doi.org/10.1007/978-3-662-46494-6</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florian&oacute;polis, Brazil, September 17&ndash;19, 2014 Revised Selected Papers ent://SD_ILS/0/SD_ILS:79348 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80731 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Tanaka, Keisuke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22425-1">http://dx.doi.org/10.1007/978-3-319-22425-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:81220 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77834 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11257-2">http://dx.doi.org/10.1007/978-3-319-11257-2</a><br/>Format:&#160;Electronic Resources<br/> Game Theoretic Analysis of Congestion, Safety and Security Networks, Air Traffic and Emergency Departments ent://SD_ILS/0/SD_ILS:78380 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Hausken, Kjell. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13009-5">http://dx.doi.org/10.1007/978-3-319-13009-5</a><br/>Format:&#160;Electronic Resources<br/> Large-Scale Data Analytics ent://SD_ILS/0/SD_ILS:72918 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Gkoulalas-Divanis, Aris. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9242-9">http://dx.doi.org/10.1007/978-1-4614-9242-9</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Communications, Services and Security 8th International Conference, MCSS 2015, Krak&oacute;w, Poland, November 24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:81159 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Dziech, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26404-2">http://dx.doi.org/10.1007/978-3-319-26404-2</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76958 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08506-7">http://dx.doi.org/10.1007/978-3-319-08506-7</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Internet Technologies Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85551 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Zhang, Shiyong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46826-5">http://dx.doi.org/10.1007/978-3-662-46826-5</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78696 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14054-4">http://dx.doi.org/10.1007/978-3-319-14054-4</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection IX 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81178 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Rice, Mason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26567-4">http://dx.doi.org/10.1007/978-3-319-26567-4</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82417 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Frey, Davide. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35668-1">http://dx.doi.org/10.1007/978-3-642-35668-1</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85649 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;B&ouml;hme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47854-7">http://dx.doi.org/10.1007/978-3-662-47854-7</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78393 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Joux, Antoine. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13051-4">http://dx.doi.org/10.1007/978-3-319-13051-4</a><br/>Format:&#160;Electronic Resources<br/> Personal Satellite Services 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:82721 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Pillai, Prashant. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36787-8">http://dx.doi.org/10.1007/978-3-642-36787-8</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Internet Technologies Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84195 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Su, Jinshu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53959-6">http://dx.doi.org/10.1007/978-3-642-53959-6</a><br/>Format:&#160;Electronic Resources<br/> Modern Cryptography Primer Theoretical Foundations and Practical Applications ent://SD_ILS/0/SD_ILS:83910 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Kościelny, Czesław. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82499 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Knudsen, Lars R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format:&#160;Electronic Resources<br/> On the Move to Meaningful Internet Systems: OTM 2013 Conferences Confederated International Conferences: CoopIS, DOA-Trusted Cloud, and ODBASE 2013, Graz, Austria, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83824 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Meersman, Robert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41030-7">http://dx.doi.org/10.1007/978-3-642-41030-7</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80935 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81013 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24858-5">http://dx.doi.org/10.1007/978-3-319-24858-5</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 8th International Conference, IDCS 2015, Windsor, UK, September 2-4, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80843 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Di Fatta, Giuseppe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23237-9">http://dx.doi.org/10.1007/978-3-319-23237-9</a><br/>Format:&#160;Electronic Resources<br/> Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger ent://SD_ILS/0/SD_ILS:80001 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;El Hajji, Said. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18681-8">http://dx.doi.org/10.1007/978-3-319-18681-8</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 &ndash; October 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77997 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Felber, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11764-5">http://dx.doi.org/10.1007/978-3-319-11764-5</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 15th International Symposium, SSS 2013, Osaka, Japan, November 13-16, 2013. Proceedings ent://SD_ILS/0/SD_ILS:75291 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Higashino, Teruo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03089-0">http://dx.doi.org/10.1007/978-3-319-03089-0</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81210 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27152-1">http://dx.doi.org/10.1007/978-3-319-27152-1</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80785 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings ent://SD_ILS/0/SD_ILS:81196 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:80941 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:80942 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78158 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 &ndash; July 2, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76985 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:85002 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43886-2">http://dx.doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/> Mobile Authentication Problems and Solutions ent://SD_ILS/0/SD_ILS:71613 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Jakobsson, Markus. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format:&#160;Electronic Resources<br/> Socio-technical Design of Ubiquitous Computing Systems ent://SD_ILS/0/SD_ILS:75863 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;David, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05044-7">http://dx.doi.org/10.1007/978-3-319-05044-7</a><br/>Format:&#160;Electronic Resources<br/> Advanced Information Systems Engineering Workshops CAiSE 2014 International Workshops, Thessaloniki, Greece, June 16-20, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76756 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Iliadis, Lazaros. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07869-4">http://dx.doi.org/10.1007/978-3-319-07869-4</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85301 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45355-1">http://dx.doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 6th International Conference, IDCS 2013, Hangzhou, China, October 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:83920 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Pathan, Mukaddim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41428-2">http://dx.doi.org/10.1007/978-3-642-41428-2</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84125 2026-04-02T03:33:01Z 2026-04-02T03:33:01Z by&#160;Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45330-4">http://dx.doi.org/10.1007/978-3-642-45330-4</a><br/>Format:&#160;Electronic Resources<br/>