Search Results for Communications Engineering, Networks. - Narrowed by: Data protection. SirsiDynix Enterprise http://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dCommunications$002bEngineering$00252C$002bNetworks.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2025-02-15T05:20:26Z Future Business Software Current Trends in Business Software Development ent://SD_ILS/0/SD_ILS:174728 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Brunetti, Gino. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04144-5">https://doi.org/10.1007/978-3-319-04144-5</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014, Proceedings ent://SD_ILS/0/SD_ILS:148212 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Chatterjee, Mainak. editor.<br/><a href="https://doi.org/10.1007/978-3-642-45249-9">https://doi.org/10.1007/978-3-642-45249-9</a><br/>Format:&#160;Electronic Resources<br/> Querying over Encrypted Data in Smart Grids ent://SD_ILS/0/SD_ILS:151328 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Wen, Mi. author.<br/><a href="https://doi.org/10.1007/978-3-319-06355-3">https://doi.org/10.1007/978-3-319-06355-3</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:165964 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Proudler, Graeme. author.<br/><a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/> Primer on Client-Side Web Security ent://SD_ILS/0/SD_ILS:143500 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;De Ryck, Philippe. author.<br/><a href="https://doi.org/10.1007/978-3-319-12226-7">https://doi.org/10.1007/978-3-319-12226-7</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 -- October 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:143913 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Felber, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11764-5">https://doi.org/10.1007/978-3-319-11764-5</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 7th International Conference, IDCS 2014, Calabria, Italy, September 22-24, 2014, Proceedings ent://SD_ILS/0/SD_ILS:146268 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Fortino, Giancarlo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11692-1">https://doi.org/10.1007/978-3-319-11692-1</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Execution on Mobile Devices ent://SD_ILS/0/SD_ILS:147010 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Vasudevan, Amit. author.<br/><a href="https://doi.org/10.1007/978-1-4614-8190-4">https://doi.org/10.1007/978-1-4614-8190-4</a><br/>Format:&#160;Electronic Resources<br/> QC-LDPC Code-Based Cryptography ent://SD_ILS/0/SD_ILS:163209 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Baldi, Marco. author.<br/><a href="https://doi.org/10.1007/978-3-319-02556-8">https://doi.org/10.1007/978-3-319-02556-8</a><br/>Format:&#160;Electronic Resources<br/> Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Framework ent://SD_ILS/0/SD_ILS:163977 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Ben Ayed, Ghazi. author.<br/><a href="https://doi.org/10.1007/978-3-319-08231-8">https://doi.org/10.1007/978-3-319-08231-8</a><br/>Format:&#160;Electronic Resources<br/> Trusted Cloud Computing ent://SD_ILS/0/SD_ILS:163893 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Krcmar, Helmut. editor.<br/><a href="https://doi.org/10.1007/978-3-319-12718-7">https://doi.org/10.1007/978-3-319-12718-7</a><br/>Format:&#160;Electronic Resources<br/> Real-time Security Extensions for EPCglobal Networks Case Study for the Pharmaceutical Industry ent://SD_ILS/0/SD_ILS:159527 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Schapranow, Matthieu-P. author.<br/><a href="https://doi.org/10.1007/978-3-642-36343-6">https://doi.org/10.1007/978-3-642-36343-6</a><br/>Format:&#160;Electronic Resources<br/> Dynamic Secrets in Communication Security ent://SD_ILS/0/SD_ILS:161250 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Xiao, Sheng. author.<br/><a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format:&#160;Electronic Resources<br/> Virtualization Techniques for Mobile Systems ent://SD_ILS/0/SD_ILS:157877 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Jaramillo, David. author.<br/><a href="https://doi.org/10.1007/978-3-319-05741-5">https://doi.org/10.1007/978-3-319-05741-5</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:157732 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Nepal, Surya. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/> Secure and Trustworthy Service Composition The Aniketos Approach ent://SD_ILS/0/SD_ILS:138037 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Brucker, Achim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-13518-2">https://doi.org/10.1007/978-3-319-13518-2</a><br/>Format:&#160;Electronic Resources<br/> Network Science and Cybersecurity ent://SD_ILS/0/SD_ILS:139306 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Pino, Robinson E. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format:&#160;Electronic Resources<br/> Secure Smart Embedded Devices, Platforms and Applications ent://SD_ILS/0/SD_ILS:139323 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Markantonakis, Konstantinos. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-7915-4">https://doi.org/10.1007/978-1-4614-7915-4</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:141293 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Mitton, Natalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-13329-4">https://doi.org/10.1007/978-3-319-13329-4</a><br/>Format:&#160;Electronic Resources<br/> e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:141297 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Bissyand&eacute;, Tegawend&eacute; F. editor.<br/><a href="https://doi.org/10.1007/978-3-319-08368-1">https://doi.org/10.1007/978-3-319-08368-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:143314 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:143378 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Sherif, Mostafa Hashem. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04105-6">https://doi.org/10.1007/978-3-319-04105-6</a><br/>Format:&#160;Electronic Resources<br/> Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems ent://SD_ILS/0/SD_ILS:177528 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Hong, Y.-W. Peter. author.<br/><a href="https://doi.org/10.1007/978-981-4560-14-6">https://doi.org/10.1007/978-981-4560-14-6</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:170428 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Frey, Davide. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35668-1">https://doi.org/10.1007/978-3-642-35668-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings ent://SD_ILS/0/SD_ILS:171651 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Gierlichs, Benedikt. editor. (orcid)0000-0002-5866-1990<br/><a href="https://doi.org/10.1007/978-3-642-41224-0">https://doi.org/10.1007/978-3-642-41224-0</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 6th International Conference, IDCS 2013, Hangzhou, China, October 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:172293 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Pathan, Mukaddim. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41428-2">https://doi.org/10.1007/978-3-642-41428-2</a><br/>Format:&#160;Electronic Resources<br/> Botnets ent://SD_ILS/0/SD_ILS:150982 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Tiirmaa-Klaar, Heli. author.<br/><a href="https://doi.org/10.1007/978-1-4471-5216-3">https://doi.org/10.1007/978-1-4471-5216-3</a><br/>Format:&#160;Electronic Resources<br/> Sensor Systems and Software 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:174296 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Zuniga, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04166-7">https://doi.org/10.1007/978-3-319-04166-7</a><br/>Format:&#160;Electronic Resources<br/> Security Assessment in Vehicular Networks ent://SD_ILS/0/SD_ILS:147062 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Du, Suguo. author.<br/><a href="https://doi.org/10.1007/978-1-4614-9357-0">https://doi.org/10.1007/978-1-4614-9357-0</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:148065 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Tang, Jin. author.<br/><a href="https://doi.org/10.1007/978-1-4614-8996-2">https://doi.org/10.1007/978-1-4614-8996-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 14-27, 2013, Proceedings ent://SD_ILS/0/SD_ILS:148721 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121<br/><a href="https://doi.org/10.1007/978-3-642-40793-2">https://doi.org/10.1007/978-3-642-40793-2</a><br/>Format:&#160;Electronic Resources<br/> Wireless Networks and Security Issues, Challenges and Research Trends ent://SD_ILS/0/SD_ILS:150622 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Khan, Shafiullah. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36169-2">https://doi.org/10.1007/978-3-642-36169-2</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:166112 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Keromytis, Angelos D. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36883-7">https://doi.org/10.1007/978-3-642-36883-7</a><br/>Format:&#160;Electronic Resources<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:166824 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-5416-8">https://doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/> Economics of Information Security and Privacy III ent://SD_ILS/0/SD_ILS:168844 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Schneier, Bruce. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-1981-5">https://doi.org/10.1007/978-1-4614-1981-5</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:169576 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Mangard, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37288-9">https://doi.org/10.1007/978-3-642-37288-9</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 15th International Symposium, SSS 2013, Osaka, Japan, November 13-16, 2013. Proceedings ent://SD_ILS/0/SD_ILS:144008 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Higashino, Teruo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-03089-0">https://doi.org/10.1007/978-3-319-03089-0</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:144191 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Yuan, Yuyu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35795-4">https://doi.org/10.1007/978-3-642-35795-4</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:144145 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Zhi-zhong, Jun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36958-2">https://doi.org/10.1007/978-3-642-36958-2</a><br/>Format:&#160;Electronic Resources<br/> Personal Satellite Services 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:144166 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Pillai, Prashant. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36787-8">https://doi.org/10.1007/978-3-642-36787-8</a><br/>Format:&#160;Electronic Resources<br/> PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:145970 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Androulidakis, I.I. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1656-2">https://doi.org/10.1007/978-1-4614-1656-2</a><br/>Format:&#160;Electronic Resources<br/> Physical Layer Approaches for Securing Wireless Communication Systems ent://SD_ILS/0/SD_ILS:163591 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Wen, Hong. author.<br/><a href="https://doi.org/10.1007/978-1-4614-6510-2">https://doi.org/10.1007/978-1-4614-6510-2</a><br/>Format:&#160;Electronic Resources<br/> Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Confernce, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:162664 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Singh, Karan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37949-9">https://doi.org/10.1007/978-3-642-37949-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Mobile Social Networks ent://SD_ILS/0/SD_ILS:164334 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Liang, Xiaohui. author.<br/><a href="https://doi.org/10.1007/978-1-4614-8857-6">https://doi.org/10.1007/978-1-4614-8857-6</a><br/>Format:&#160;Electronic Resources<br/> Secure IP Mobility Management for VANET ent://SD_ILS/0/SD_ILS:165785 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Taha, Sanaa. author.<br/><a href="https://doi.org/10.1007/978-3-319-01351-0">https://doi.org/10.1007/978-3-319-01351-0</a><br/>Format:&#160;Electronic Resources<br/> Security for Wireless Implantable Medical Devices ent://SD_ILS/0/SD_ILS:161634 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Hei, Xiali. author.<br/><a href="https://doi.org/10.1007/978-1-4614-7153-0">https://doi.org/10.1007/978-1-4614-7153-0</a><br/>Format:&#160;Electronic Resources<br/> Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security ent://SD_ILS/0/SD_ILS:161736 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Korzun, Dmitry. author.<br/><a href="https://doi.org/10.1007/978-1-4614-5483-0">https://doi.org/10.1007/978-1-4614-5483-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:139335 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Zia, Tanveer. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04283-1">https://doi.org/10.1007/978-3-319-04283-1</a><br/>Format:&#160;Electronic Resources<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:139912 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Liu, Xinxin. author.<br/><a href="https://doi.org/10.1007/978-1-4614-9074-6">https://doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:143054 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Rieck, Konrad. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39235-1">https://doi.org/10.1007/978-3-642-39235-1</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012, Proceedings ent://SD_ILS/0/SD_ILS:169636 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Richa, Andr&eacute;a W. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33536-5">https://doi.org/10.1007/978-3-642-33536-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Intelligent Information Systems International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:169927 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Bouvry, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25261-7">https://doi.org/10.1007/978-3-642-25261-7</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012, Proceedings ent://SD_ILS/0/SD_ILS:170901 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Bogdanov, Andrey. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34416-9">https://doi.org/10.1007/978-3-642-34416-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012, Proceedings ent://SD_ILS/0/SD_ILS:171982 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142<br/><a href="https://doi.org/10.1007/978-3-642-33678-2">https://doi.org/10.1007/978-3-642-33678-2</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing, Networking and Security International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:172617 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Thilagam, P. Santhi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29280-4">https://doi.org/10.1007/978-3-642-29280-4</a><br/>Format:&#160;Electronic Resources<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:151009 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Androulidakis, I.I. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1650-0">https://doi.org/10.1007/978-1-4614-1650-0</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012, Proceedings ent://SD_ILS/0/SD_ILS:175260 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Bononi, Luciano. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25959-3">https://doi.org/10.1007/978-3-642-25959-3</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:148038 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Kwiecien, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31217-5">https://doi.org/10.1007/978-3-642-31217-5</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedings ent://SD_ILS/0/SD_ILS:149478 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Xiang, Yang. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34883-9">https://doi.org/10.1007/978-3-642-34883-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012, Proceedings ent://SD_ILS/0/SD_ILS:169497 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142<br/><a href="https://doi.org/10.1007/978-3-642-33675-1">https://doi.org/10.1007/978-3-642-33675-1</a><br/>Format:&#160;Electronic Resources<br/> Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 &amp; STA 2012 ent://SD_ILS/0/SD_ILS:143653 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Park, Jong Hyuk (James). editor.<br/><a href="https://doi.org/10.1007/978-94-007-5083-8">https://doi.org/10.1007/978-94-007-5083-8</a><br/>Format:&#160;Electronic Resources<br/> Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings ent://SD_ILS/0/SD_ILS:143723 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Lee, Geuk. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32645-5">https://doi.org/10.1007/978-3-642-32645-5</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Ubiquitous Computing ent://SD_ILS/0/SD_ILS:159720 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Khalil, Ismail. editor.<br/><a href="https://doi.org/10.2991/978-94-91216-71-8">https://doi.org/10.2991/978-94-91216-71-8</a><br/>Format:&#160;Electronic Resources<br/> Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings ent://SD_ILS/0/SD_ILS:162176 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Lee, Geuk. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32692-9">https://doi.org/10.1007/978-3-642-32692-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Pevised Selected Papers ent://SD_ILS/0/SD_ILS:135267 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Schmidt, Andreas U. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33392-7">https://doi.org/10.1007/978-3-642-33392-7</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 7th International ICST Conference, SecureComm 2011, London, September 7-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:140493 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Rajarajan, Muttukrishnan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31909-9">https://doi.org/10.1007/978-3-642-31909-9</a><br/>Format:&#160;Electronic Resources<br/> Wired / Wireless Internet Communication 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012, Proceedings ent://SD_ILS/0/SD_ILS:142908 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Koucheryavy, Yevgeni. editor. (orcid)0000-0003-3976-297X<br/><a href="https://doi.org/10.1007/978-3-642-30630-3">https://doi.org/10.1007/978-3-642-30630-3</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on IT Convergence and Security 2011 ent://SD_ILS/0/SD_ILS:135088 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-94-007-2911-7">https://doi.org/10.1007/978-94-007-2911-7</a><br/>Format:&#160;Electronic Resources<br/> Network Hacks - Intensivkurs Angriff und Verteidigung mit Python ent://SD_ILS/0/SD_ILS:191655 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Ballmann, Bastian. author.<br/><a href="https://doi.org/10.1007/978-3-642-24305-9">https://doi.org/10.1007/978-3-642-24305-9</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety, and Sustainability 7th International and 4th e-Democracy Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:177205 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33448-1">https://doi.org/10.1007/978-3-642-33448-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170409 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Prouff, Emmanuel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-27257-8">https://doi.org/10.1007/978-3-642-27257-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 30th International Conference, SAFECOMP 2011, Naples, Italy, September 19-22, 2011, Proceedings ent://SD_ILS/0/SD_ILS:170542 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Flammini, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24270-0">https://doi.org/10.1007/978-3-642-24270-0</a><br/>Format:&#160;Electronic Resources<br/> Spyware and Adware ent://SD_ILS/0/SD_ILS:153987 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Aycock, John. author.<br/><a href="https://doi.org/10.1007/978-0-387-77741-2">https://doi.org/10.1007/978-0-387-77741-2</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 9th IFIP TC 6 International Conference, WWIC 2011, Vilanova i la Geltr&uacute;, Spain, June 15-17, 2011, Proceedings ent://SD_ILS/0/SD_ILS:174796 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Masip-Bruin, Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-642-21560-5">https://doi.org/10.1007/978-3-642-21560-5</a><br/>Format:&#160;Electronic Resources<br/> Secure and Trust Computing, Data Management, and Applications 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings, Part I ent://SD_ILS/0/SD_ILS:174700 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-22339-6">https://doi.org/10.1007/978-3-642-22339-6</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 12th International Conference, ICDCN 2011, Bangalore, India, January 2-5, 2011, Proceedings ent://SD_ILS/0/SD_ILS:148381 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Aguilera, Marcos K. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17679-1">https://doi.org/10.1007/978-3-642-17679-1</a><br/>Format:&#160;Electronic Resources<br/> Parallel and Distributed Computing and Networks International Conference, PDCN 2010, Chongqing, China, December 13-14, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:140486 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Qi, Luo. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22706-6">https://doi.org/10.1007/978-3-642-22706-6</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings ent://SD_ILS/0/SD_ILS:135005 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Alcaraz Calero, Jose M. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23496-5">https://doi.org/10.1007/978-3-642-23496-5</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Internet ent://SD_ILS/0/SD_ILS:135192 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Blefari-Melazzi, Nicola. editor.<br/><a href="https://doi.org/10.1007/978-88-470-1818-1">https://doi.org/10.1007/978-88-470-1818-1</a><br/>Format:&#160;Electronic Resources<br/> Kryptographie und IT-Sicherheit Grundlagen und Anwendungen ent://SD_ILS/0/SD_ILS:186546 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Spitz, Stephan. author.<br/><a href="https://doi.org/10.1007/978-3-8348-8120-5">https://doi.org/10.1007/978-3-8348-8120-5</a><br/>Format:&#160;Electronic Resources<br/> Understanding Cryptography A Textbook for Students and Practitioners ent://SD_ILS/0/SD_ILS:172745 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Paar, Christof. author.<br/><a href="https://doi.org/10.1007/978-3-642-04101-3">https://doi.org/10.1007/978-3-642-04101-3</a><br/>Format:&#160;Electronic Resources<br/> Network Intrusion Detection and Prevention Concepts and Techniques ent://SD_ILS/0/SD_ILS:154248 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Ghorbani, Ali A. author.<br/><a href="https://doi.org/10.1007/978-0-387-88771-5">https://doi.org/10.1007/978-0-387-88771-5</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedings ent://SD_ILS/0/SD_ILS:172346 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Kant, Krishna. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11322-2">https://doi.org/10.1007/978-3-642-11322-2</a><br/>Format:&#160;Electronic Resources<br/> IT Security Management IT Securiteers - Setting up an IT Security Function ent://SD_ILS/0/SD_ILS:147979 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Partida, Alberto. author.<br/><a href="https://doi.org/10.1007/978-90-481-8882-6">https://doi.org/10.1007/978-90-481-8882-6</a><br/>Format:&#160;Electronic Resources<br/> Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:150903 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Gu, Qijun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11526-4">https://doi.org/10.1007/978-3-642-11526-4</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Information and Communication Security ent://SD_ILS/0/SD_ILS:167824 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Stavroulakis, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04117-4">https://doi.org/10.1007/978-3-642-04117-4</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 8th International Conference, WWIC 2010, Lulea, Sweden, June 1-3, 2010. Proceedings ent://SD_ILS/0/SD_ILS:169754 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Osipov, Evgeny. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13315-2">https://doi.org/10.1007/978-3-642-13315-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedings ent://SD_ILS/0/SD_ILS:145193 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443<br/><a href="https://doi.org/10.1007/978-3-642-15651-9">https://doi.org/10.1007/978-3-642-15651-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:157941 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Weerasinghe, Dasun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11530-1">https://doi.org/10.1007/978-3-642-11530-1</a><br/>Format:&#160;Electronic Resources<br/> Economics of Information Security and Privacy ent://SD_ILS/0/SD_ILS:138377 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Moore, Tyler. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-6967-5">https://doi.org/10.1007/978-1-4419-6967-5</a><br/>Format:&#160;Electronic Resources<br/> Security in Embedded Devices ent://SD_ILS/0/SD_ILS:137997 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Gebotys, Catherine H. author.<br/><a href="https://doi.org/10.1007/978-1-4419-1530-6">https://doi.org/10.1007/978-1-4419-1530-6</a><br/>Format:&#160;Electronic Resources<br/> Insider Threats in Cyber Security ent://SD_ILS/0/SD_ILS:138404 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Probst, Christian W. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-7133-3">https://doi.org/10.1007/978-1-4419-7133-3</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedings ent://SD_ILS/0/SD_ILS:140545 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Xie, Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16576-4">https://doi.org/10.1007/978-3-642-16576-4</a><br/>Format:&#160;Electronic Resources<br/> sicher &amp; mobil Sicherheit in der drahtlosen Kommunikation ent://SD_ILS/0/SD_ILS:179262 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Osterhage, Wolfgang W. author.<br/><a href="https://doi.org/10.1007/978-3-642-03083-3">https://doi.org/10.1007/978-3-642-03083-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:172486 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Park, James (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-02617-1">https://doi.org/10.1007/978-3-642-02617-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings ent://SD_ILS/0/SD_ILS:170115 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Buth, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04468-7">https://doi.org/10.1007/978-3-642-04468-7</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings ent://SD_ILS/0/SD_ILS:170143 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Gonz&aacute;lez Nieto, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02704-8">https://doi.org/10.1007/978-3-642-02704-8</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 7th International Conference, WWIC 2009, Enschede, The Netherlands, May 27-29 2009, Proceedings ent://SD_ILS/0/SD_ILS:170245 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;van den Berg, Hans. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02118-3">https://doi.org/10.1007/978-3-642-02118-3</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ent://SD_ILS/0/SD_ILS:171359 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Setola, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03552-4">https://doi.org/10.1007/978-3-642-03552-4</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings ent://SD_ILS/0/SD_ILS:172698 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00587-9">https://doi.org/10.1007/978-3-642-00587-9</a><br/>Format:&#160;Electronic Resources<br/> Future Generation Information Technology First International Conference, FGIT 2009, Jeju Island, Korea, December 10-12,2009, Proceedings ent://SD_ILS/0/SD_ILS:172124 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Lee, Young Hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10509-8">https://doi.org/10.1007/978-3-642-10509-8</a><br/>Format:&#160;Electronic Resources<br/> Secure Multi-Party Non-Repudiation Protocols and Applications ent://SD_ILS/0/SD_ILS:153820 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Onieva, Jos&eacute; A. author.<br/><a href="https://doi.org/10.1007/978-0-387-75630-1">https://doi.org/10.1007/978-0-387-75630-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Dependability for Ambient Intelligence ent://SD_ILS/0/SD_ILS:154249 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Spanoudakis, George. editor.<br/><a href="https://doi.org/10.1007/978-0-387-88775-3">https://doi.org/10.1007/978-0-387-88775-3</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 10th International Conference, ICDCN 2009, Hyderabad, India, January 3-6, 2009, Proceedings ent://SD_ILS/0/SD_ILS:172941 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Garg, Vijay. editor.<br/><a href="https://doi.org/10.1007/978-3-540-92295-7">https://doi.org/10.1007/978-3-540-92295-7</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 4th International Symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:173886 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Kaklamanis, Christos. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00945-7">https://doi.org/10.1007/978-3-642-00945-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:150619 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Park, James (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-02633-1">https://doi.org/10.1007/978-3-642-02633-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:168066 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Chen, Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-05284-2">https://doi.org/10.1007/978-3-642-05284-2</a><br/>Format:&#160;Electronic Resources<br/> Active and Programmable Networks IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005, Revised Papers ent://SD_ILS/0/SD_ILS:169792 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Hutchison, David. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00972-3">https://doi.org/10.1007/978-3-642-00972-3</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 3rd European Conference on Computer Network Defense ent://SD_ILS/0/SD_ILS:143662 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Siris, Vasilios. editor.<br/><a href="https://doi.org/10.1007/978-0-387-85555-4">https://doi.org/10.1007/978-0-387-85555-4</a><br/>Format:&#160;Electronic Resources<br/> Identifying Malicious Code Through Reverse Engineering ent://SD_ILS/0/SD_ILS:136676 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Singh, Abhishek. editor.<br/><a href="https://doi.org/10.1007/978-0-387-89468-3">https://doi.org/10.1007/978-0-387-89468-3</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Computing 7th International Conference, Pervasive 2009, Nara, Japan, May 11-14, 2009, Proceedings ent://SD_ILS/0/SD_ILS:142656 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Tokuda, Hideyuki. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01516-8">https://doi.org/10.1007/978-3-642-01516-8</a><br/>Format:&#160;Electronic Resources<br/> Global Initiatives to Secure Cyberspace An Emerging Landscape ent://SD_ILS/0/SD_ILS:136094 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Portnoy, Michael. editor.<br/><a href="https://doi.org/10.1007/978-0-387-09764-0">https://doi.org/10.1007/978-0-387-09764-0</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170188 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-540-78663-4">https://doi.org/10.1007/978-3-540-78663-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:172489 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Harrison, Michael Douglas. editor.<br/><a href="https://doi.org/10.1007/978-3-540-87698-4">https://doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 9th International Conference, ICDCN 2008, Kolkata, India, January 5-8, 2008, Proceedings ent://SD_ILS/0/SD_ILS:169873 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Rao, Shrisha. editor.<br/><a href="https://doi.org/10.1007/978-3-540-77444-0">https://doi.org/10.1007/978-3-540-77444-0</a><br/>Format:&#160;Electronic Resources<br/> Network-Based Information Systems 2nd Internatonal Conference, NBiS 2008, Turin, Italy, September 1-5, 2008, Proceedings ent://SD_ILS/0/SD_ILS:171111 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Takizawa, Makoto. editor.<br/><a href="https://doi.org/10.1007/978-3-540-85693-1">https://doi.org/10.1007/978-3-540-85693-1</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedings ent://SD_ILS/0/SD_ILS:171361 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Lipp, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-540-68979-9">https://doi.org/10.1007/978-3-540-68979-9</a><br/>Format:&#160;Electronic Resources<br/> Vulnerability Analysis and Defense for the Internet ent://SD_ILS/0/SD_ILS:153740 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Singh, Abhishek. editor.<br/><a href="https://doi.org/10.1007/978-0-387-74390-5">https://doi.org/10.1007/978-0-387-74390-5</a><br/>Format:&#160;Electronic Resources<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:153346 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Lee, Wenke. editor.<br/><a href="https://doi.org/10.1007/978-0-387-68768-1">https://doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:153572 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Mayes, Keith. editor.<br/><a href="https://doi.org/10.1007/978-0-387-72198-9">https://doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/> Insider Attack and Cyber Security Beyond the Hacker ent://SD_ILS/0/SD_ILS:153943 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Stolfo, Salvatore J. editor.<br/><a href="https://doi.org/10.1007/978-0-387-77322-3">https://doi.org/10.1007/978-0-387-77322-3</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Computing 6th International Conference, PERVASIVE 2008, Sydney, Australia, May 19-22, 2008 ent://SD_ILS/0/SD_ILS:147843 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Indulska, Jadwiga. editor.<br/><a href="https://doi.org/10.1007/978-3-540-79576-6">https://doi.org/10.1007/978-3-540-79576-6</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings ent://SD_ILS/0/SD_ILS:149298 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Rong, Chunming. editor.<br/><a href="https://doi.org/10.1007/978-3-540-69295-9">https://doi.org/10.1007/978-3-540-69295-9</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 6th International Conference, WWIC 2008 Tampere, Finland, May 28-30, 2008 Proceedings ent://SD_ILS/0/SD_ILS:171017 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Harju, Jarmo. editor.<br/><a href="https://doi.org/10.1007/978-3-540-68807-5">https://doi.org/10.1007/978-3-540-68807-5</a><br/>Format:&#160;Electronic Resources<br/> Information Networking. Towards Ubiquitous Networking and Services International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:147643 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Vaz&atilde;o, Teresa. editor.<br/><a href="https://doi.org/10.1007/978-3-540-89524-4">https://doi.org/10.1007/978-3-540-89524-4</a><br/>Format:&#160;Electronic Resources<br/> Security for Telecommunications Networks ent://SD_ILS/0/SD_ILS:146561 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Traynor, Patrick. author.<br/><a href="https://doi.org/10.1007/978-0-387-72442-3">https://doi.org/10.1007/978-0-387-72442-3</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Set&uacute;bal, Portugal, August 7-10, 2006, Selected Papers ent://SD_ILS/0/SD_ILS:157020 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Filipe, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-540-70760-8">https://doi.org/10.1007/978-3-540-70760-8</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:141368 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Di Pietro, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-0-387-77265-3">https://doi.org/10.1007/978-0-387-77265-3</a><br/>Format:&#160;Electronic Resources<br/> Kryptographie und IT-Sicherheit Grundlagen und Anwendungen ent://SD_ILS/0/SD_ILS:180253 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Swoboda, Jochim. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9473-1">https://doi.org/10.1007/978-3-8348-9473-1</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:171088 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Montanari, Ugo. editor.<br/><a href="https://doi.org/10.1007/978-3-540-75336-0">https://doi.org/10.1007/978-3-540-75336-0</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007, Proceedings ent://SD_ILS/0/SD_ILS:171494 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Boavida, Fernando. editor.<br/><a href="https://doi.org/10.1007/978-3-540-72697-5">https://doi.org/10.1007/978-3-540-72697-5</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings ent://SD_ILS/0/SD_ILS:170941 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Zhang, Hongke. editor.<br/><a href="https://doi.org/10.1007/978-3-540-77024-4">https://doi.org/10.1007/978-3-540-77024-4</a><br/>Format:&#160;Electronic Resources<br/> Power Analysis Attacks Revealing the Secrets of Smart Cards ent://SD_ILS/0/SD_ILS:153043 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Mangard, Stefan. author.<br/><a href="https://doi.org/10.1007/978-0-387-38162-6">https://doi.org/10.1007/978-0-387-38162-6</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:153291 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Flegel, Ulrich. author.<br/><a href="https://doi.org/10.1007/978-0-387-68254-9">https://doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Electronic Resources<br/> E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers ent://SD_ILS/0/SD_ILS:150489 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Filipe, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-540-75993-5">https://doi.org/10.1007/978-3-540-75993-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedings ent://SD_ILS/0/SD_ILS:166313 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Gorodetsky, Vladimir. editor.<br/><a href="https://doi.org/10.1007/978-3-540-73986-9">https://doi.org/10.1007/978-3-540-73986-9</a><br/>Format:&#160;Electronic Resources<br/> Anti-Spam Measures Analysis and Design ent://SD_ILS/0/SD_ILS:167986 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Schryen, Guido. author.<br/><a href="https://doi.org/10.1007/978-3-540-71750-8">https://doi.org/10.1007/978-3-540-71750-8</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Computing 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 13-16, 2007, Proceedings ent://SD_ILS/0/SD_ILS:170990 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;LaMarca, Anthony. editor.<br/><a href="https://doi.org/10.1007/978-3-540-72037-9">https://doi.org/10.1007/978-3-540-72037-9</a><br/>Format:&#160;Electronic Resources<br/> Network-Based Information Systems First International Conference, NBIS 2007, Regensburg, Germany, September 3-7, 2007, Proceedings ent://SD_ILS/0/SD_ILS:171012 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Enokido, Tomoya. editor.<br/><a href="https://doi.org/10.1007/978-3-540-74573-0">https://doi.org/10.1007/978-3-540-74573-0</a><br/>Format:&#160;Electronic Resources<br/> Formal Correctness of Security Protocols ent://SD_ILS/0/SD_ILS:144939 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Bella, Giampaolo. author.<br/><a href="https://doi.org/10.1007/978-3-540-68136-6">https://doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Electronic Resources<br/> Grid Computing Security ent://SD_ILS/0/SD_ILS:160515 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Chakrabarti, Anirban. author.<br/><a href="https://doi.org/10.1007/978-3-540-44493-0">https://doi.org/10.1007/978-3-540-44493-0</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings ent://SD_ILS/0/SD_ILS:140048 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Xiao, Bin. editor.<br/><a href="https://doi.org/10.1007/978-3-540-73547-2">https://doi.org/10.1007/978-3-540-73547-2</a><br/>Format:&#160;Electronic Resources<br/> Network Security Policies and Procedures ent://SD_ILS/0/SD_ILS:143869 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Frye, Douglas W. author.<br/><a href="https://doi.org/10.1007/978-0-387-47955-2">https://doi.org/10.1007/978-0-387-47955-2</a><br/>Format:&#160;Electronic Resources<br/> UbiComp 2007: Ubiquitous Computing 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007, Proceedings ent://SD_ILS/0/SD_ILS:176171 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Krumm, John. editor.<br/><a href="https://doi.org/10.1007/978-3-540-74853-3">https://doi.org/10.1007/978-3-540-74853-3</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 8th International Conference, ICDCN 2006, Guwahati, India, December 27-30, 2006, Proceedings ent://SD_ILS/0/SD_ILS:172284 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Chaudhuri, Soma. editor.<br/><a href="https://doi.org/10.1007/11947950">https://doi.org/10.1007/11947950</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005 ent://SD_ILS/0/SD_ILS:152716 2025-02-15T05:20:26Z 2025-02-15T05:20:26Z by&#160;Pollitt, Mark. editor.<br/><a href="https://doi.org/10.1007/0-387-31163-7">https://doi.org/10.1007/0-387-31163-7</a><br/>Format:&#160;Electronic Resources<br/>