Search Results for Communications Engineering, Networks. - Narrowed by: Data protection.SirsiDynix Enterprisehttp://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dCommunications$002bEngineering$00252C$002bNetworks.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list2025-02-15T05:20:26ZFuture Business Software Current Trends in Business Software Developmentent://SD_ILS/0/SD_ILS:1747282025-02-15T05:20:26Z2025-02-15T05:20:26Zby Brunetti, Gino. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04144-5">https://doi.org/10.1007/978-3-319-04144-5</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1482122025-02-15T05:20:26Z2025-02-15T05:20:26Zby Chatterjee, Mainak. editor.<br/><a href="https://doi.org/10.1007/978-3-642-45249-9">https://doi.org/10.1007/978-3-642-45249-9</a><br/>Format: Electronic Resources<br/>Querying over Encrypted Data in Smart Gridsent://SD_ILS/0/SD_ILS:1513282025-02-15T05:20:26Z2025-02-15T05:20:26Zby Wen, Mi. author.<br/><a href="https://doi.org/10.1007/978-3-319-06355-3">https://doi.org/10.1007/978-3-319-06355-3</a><br/>Format: Electronic Resources<br/>Trusted Computing Platforms TPM2.0 in Contextent://SD_ILS/0/SD_ILS:1659642025-02-15T05:20:26Z2025-02-15T05:20:26Zby Proudler, Graeme. author.<br/><a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format: Electronic Resources<br/>Primer on Client-Side Web Securityent://SD_ILS/0/SD_ILS:1435002025-02-15T05:20:26Z2025-02-15T05:20:26Zby De Ryck, Philippe. author.<br/><a href="https://doi.org/10.1007/978-3-319-12226-7">https://doi.org/10.1007/978-3-319-12226-7</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 -- October 1, 2014. Proceedingsent://SD_ILS/0/SD_ILS:1439132025-02-15T05:20:26Z2025-02-15T05:20:26Zby Felber, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11764-5">https://doi.org/10.1007/978-3-319-11764-5</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 7th International Conference, IDCS 2014, Calabria, Italy, September 22-24, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1462682025-02-15T05:20:26Z2025-02-15T05:20:26Zby Fortino, Giancarlo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11692-1">https://doi.org/10.1007/978-3-319-11692-1</a><br/>Format: Electronic Resources<br/>Trustworthy Execution on Mobile Devicesent://SD_ILS/0/SD_ILS:1470102025-02-15T05:20:26Z2025-02-15T05:20:26Zby Vasudevan, Amit. author.<br/><a href="https://doi.org/10.1007/978-1-4614-8190-4">https://doi.org/10.1007/978-1-4614-8190-4</a><br/>Format: Electronic Resources<br/>QC-LDPC Code-Based Cryptographyent://SD_ILS/0/SD_ILS:1632092025-02-15T05:20:26Z2025-02-15T05:20:26Zby Baldi, Marco. author.<br/><a href="https://doi.org/10.1007/978-3-319-02556-8">https://doi.org/10.1007/978-3-319-02556-8</a><br/>Format: Electronic Resources<br/>Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Frameworkent://SD_ILS/0/SD_ILS:1639772025-02-15T05:20:26Z2025-02-15T05:20:26Zby Ben Ayed, Ghazi. author.<br/><a href="https://doi.org/10.1007/978-3-319-08231-8">https://doi.org/10.1007/978-3-319-08231-8</a><br/>Format: Electronic Resources<br/>Trusted Cloud Computingent://SD_ILS/0/SD_ILS:1638932025-02-15T05:20:26Z2025-02-15T05:20:26Zby Krcmar, Helmut. editor.<br/><a href="https://doi.org/10.1007/978-3-319-12718-7">https://doi.org/10.1007/978-3-319-12718-7</a><br/>Format: Electronic Resources<br/>Real-time Security Extensions for EPCglobal Networks Case Study for the Pharmaceutical Industryent://SD_ILS/0/SD_ILS:1595272025-02-15T05:20:26Z2025-02-15T05:20:26Zby Schapranow, Matthieu-P. author.<br/><a href="https://doi.org/10.1007/978-3-642-36343-6">https://doi.org/10.1007/978-3-642-36343-6</a><br/>Format: Electronic Resources<br/>Dynamic Secrets in Communication Securityent://SD_ILS/0/SD_ILS:1612502025-02-15T05:20:26Z2025-02-15T05:20:26Zby Xiao, Sheng. author.<br/><a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format: Electronic Resources<br/>Virtualization Techniques for Mobile Systemsent://SD_ILS/0/SD_ILS:1578772025-02-15T05:20:26Z2025-02-15T05:20:26Zby Jaramillo, David. author.<br/><a href="https://doi.org/10.1007/978-3-319-05741-5">https://doi.org/10.1007/978-3-319-05741-5</a><br/>Format: Electronic Resources<br/>Security, Privacy and Trust in Cloud Systemsent://SD_ILS/0/SD_ILS:1577322025-02-15T05:20:26Z2025-02-15T05:20:26Zby Nepal, Surya. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format: Electronic Resources<br/>Secure and Trustworthy Service Composition The Aniketos Approachent://SD_ILS/0/SD_ILS:1380372025-02-15T05:20:26Z2025-02-15T05:20:26Zby Brucker, Achim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-13518-2">https://doi.org/10.1007/978-3-319-13518-2</a><br/>Format: Electronic Resources<br/>Network Science and Cybersecurityent://SD_ILS/0/SD_ILS:1393062025-02-15T05:20:26Z2025-02-15T05:20:26Zby Pino, Robinson E. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format: Electronic Resources<br/>Secure Smart Embedded Devices, Platforms and Applicationsent://SD_ILS/0/SD_ILS:1393232025-02-15T05:20:26Z2025-02-15T05:20:26Zby Markantonakis, Konstantinos. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-7915-4">https://doi.org/10.1007/978-1-4614-7915-4</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:1412932025-02-15T05:20:26Z2025-02-15T05:20:26Zby Mitton, Natalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-13329-4">https://doi.org/10.1007/978-3-319-13329-4</a><br/>Format: Electronic Resources<br/>e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1412972025-02-15T05:20:26Z2025-02-15T05:20:26Zby Bissyandé, Tegawendé F. editor.<br/><a href="https://doi.org/10.1007/978-3-319-08368-1">https://doi.org/10.1007/978-3-319-08368-1</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedingsent://SD_ILS/0/SD_ILS:1433142025-02-15T05:20:26Z2025-02-15T05:20:26Zby Chakraborty, Rajat Subhra. editor.<br/><a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1433782025-02-15T05:20:26Z2025-02-15T05:20:26Zby Sherif, Mostafa Hashem. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04105-6">https://doi.org/10.1007/978-3-319-04105-6</a><br/>Format: Electronic Resources<br/>Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systemsent://SD_ILS/0/SD_ILS:1775282025-02-15T05:20:26Z2025-02-15T05:20:26Zby Hong, Y.-W. Peter. author.<br/><a href="https://doi.org/10.1007/978-981-4560-14-6">https://doi.org/10.1007/978-981-4560-14-6</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1704282025-02-15T05:20:26Z2025-02-15T05:20:26Zby Frey, Davide. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35668-1">https://doi.org/10.1007/978-3-642-35668-1</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1716512025-02-15T05:20:26Z2025-02-15T05:20:26Zby Gierlichs, Benedikt. editor. (orcid)0000-0002-5866-1990<br/><a href="https://doi.org/10.1007/978-3-642-41224-0">https://doi.org/10.1007/978-3-642-41224-0</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 6th International Conference, IDCS 2013, Hangzhou, China, October 28-30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1722932025-02-15T05:20:26Z2025-02-15T05:20:26Zby Pathan, Mukaddim. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41428-2">https://doi.org/10.1007/978-3-642-41428-2</a><br/>Format: Electronic Resources<br/>Botnetsent://SD_ILS/0/SD_ILS:1509822025-02-15T05:20:26Z2025-02-15T05:20:26Zby Tiirmaa-Klaar, Heli. author.<br/><a href="https://doi.org/10.1007/978-1-4471-5216-3">https://doi.org/10.1007/978-1-4471-5216-3</a><br/>Format: Electronic Resources<br/>Sensor Systems and Software 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1742962025-02-15T05:20:26Z2025-02-15T05:20:26Zby Zuniga, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04166-7">https://doi.org/10.1007/978-3-319-04166-7</a><br/>Format: Electronic Resources<br/>Security Assessment in Vehicular Networksent://SD_ILS/0/SD_ILS:1470622025-02-15T05:20:26Z2025-02-15T05:20:26Zby Du, Suguo. author.<br/><a href="https://doi.org/10.1007/978-1-4614-9357-0">https://doi.org/10.1007/978-1-4614-9357-0</a><br/>Format: Electronic Resources<br/>Intrusion Detection for IP-Based Multimedia Communications over Wireless Networksent://SD_ILS/0/SD_ILS:1480652025-02-15T05:20:26Z2025-02-15T05:20:26Zby Tang, Jin. author.<br/><a href="https://doi.org/10.1007/978-1-4614-8996-2">https://doi.org/10.1007/978-1-4614-8996-2</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 14-27, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1487212025-02-15T05:20:26Z2025-02-15T05:20:26Zby Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121<br/><a href="https://doi.org/10.1007/978-3-642-40793-2">https://doi.org/10.1007/978-3-642-40793-2</a><br/>Format: Electronic Resources<br/>Wireless Networks and Security Issues, Challenges and Research Trendsent://SD_ILS/0/SD_ILS:1506222025-02-15T05:20:26Z2025-02-15T05:20:26Zby Khan, Shafiullah. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36169-2">https://doi.org/10.1007/978-3-642-36169-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papersent://SD_ILS/0/SD_ILS:1661122025-02-15T05:20:26Z2025-02-15T05:20:26Zby Keromytis, Angelos D. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36883-7">https://doi.org/10.1007/978-3-642-36883-7</a><br/>Format: Electronic Resources<br/>Moving Target Defense II Application of Game Theory and Adversarial Modelingent://SD_ILS/0/SD_ILS:1668242025-02-15T05:20:26Z2025-02-15T05:20:26Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-5416-8">https://doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Electronic Resources<br/>Economics of Information Security and Privacy IIIent://SD_ILS/0/SD_ILS:1688442025-02-15T05:20:26Z2025-02-15T05:20:26Zby Schneier, Bruce. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-1981-5">https://doi.org/10.1007/978-1-4614-1981-5</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1695762025-02-15T05:20:26Z2025-02-15T05:20:26Zby Mangard, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37288-9">https://doi.org/10.1007/978-3-642-37288-9</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 15th International Symposium, SSS 2013, Osaka, Japan, November 13-16, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1440082025-02-15T05:20:26Z2025-02-15T05:20:26Zby Higashino, Teruo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-03089-0">https://doi.org/10.1007/978-3-319-03089-0</a><br/>Format: Electronic Resources<br/>Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1441912025-02-15T05:20:26Z2025-02-15T05:20:26Zby Yuan, Yuyu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35795-4">https://doi.org/10.1007/978-3-642-35795-4</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1441452025-02-15T05:20:26Z2025-02-15T05:20:26Zby Zhi-zhong, Jun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36958-2">https://doi.org/10.1007/978-3-642-36958-2</a><br/>Format: Electronic Resources<br/>Personal Satellite Services 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papersent://SD_ILS/0/SD_ILS:1441662025-02-15T05:20:26Z2025-02-15T05:20:26Zby Pillai, Prashant. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36787-8">https://doi.org/10.1007/978-3-642-36787-8</a><br/>Format: Electronic Resources<br/>PBX Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:1459702025-02-15T05:20:26Z2025-02-15T05:20:26Zby Androulidakis, I.I. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1656-2">https://doi.org/10.1007/978-1-4614-1656-2</a><br/>Format: Electronic Resources<br/>Physical Layer Approaches for Securing Wireless Communication Systemsent://SD_ILS/0/SD_ILS:1635912025-02-15T05:20:26Z2025-02-15T05:20:26Zby Wen, Hong. author.<br/><a href="https://doi.org/10.1007/978-1-4614-6510-2">https://doi.org/10.1007/978-1-4614-6510-2</a><br/>Format: Electronic Resources<br/>Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Confernce, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1626642025-02-15T05:20:26Z2025-02-15T05:20:26Zby Singh, Karan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37949-9">https://doi.org/10.1007/978-3-642-37949-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Mobile Social Networksent://SD_ILS/0/SD_ILS:1643342025-02-15T05:20:26Z2025-02-15T05:20:26Zby Liang, Xiaohui. author.<br/><a href="https://doi.org/10.1007/978-1-4614-8857-6">https://doi.org/10.1007/978-1-4614-8857-6</a><br/>Format: Electronic Resources<br/>Secure IP Mobility Management for VANETent://SD_ILS/0/SD_ILS:1657852025-02-15T05:20:26Z2025-02-15T05:20:26Zby Taha, Sanaa. author.<br/><a href="https://doi.org/10.1007/978-3-319-01351-0">https://doi.org/10.1007/978-3-319-01351-0</a><br/>Format: Electronic Resources<br/>Security for Wireless Implantable Medical Devicesent://SD_ILS/0/SD_ILS:1616342025-02-15T05:20:26Z2025-02-15T05:20:26Zby Hei, Xiali. author.<br/><a href="https://doi.org/10.1007/978-1-4614-7153-0">https://doi.org/10.1007/978-1-4614-7153-0</a><br/>Format: Electronic Resources<br/>Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Securityent://SD_ILS/0/SD_ILS:1617362025-02-15T05:20:26Z2025-02-15T05:20:26Zby Korzun, Dmitry. author.<br/><a href="https://doi.org/10.1007/978-1-4614-5483-0">https://doi.org/10.1007/978-1-4614-5483-0</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1393352025-02-15T05:20:26Z2025-02-15T05:20:26Zby Zia, Tanveer. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04283-1">https://doi.org/10.1007/978-3-319-04283-1</a><br/>Format: Electronic Resources<br/>Location Privacy Protection in Mobile Networksent://SD_ILS/0/SD_ILS:1399122025-02-15T05:20:26Z2025-02-15T05:20:26Zby Liu, Xinxin. author.<br/><a href="https://doi.org/10.1007/978-1-4614-9074-6">https://doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1430542025-02-15T05:20:26Z2025-02-15T05:20:26Zby Rieck, Konrad. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39235-1">https://doi.org/10.1007/978-3-642-39235-1</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1696362025-02-15T05:20:26Z2025-02-15T05:20:26Zby Richa, Andréa W. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33536-5">https://doi.org/10.1007/978-3-642-33536-5</a><br/>Format: Electronic Resources<br/>Security and Intelligent Information Systems International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1699272025-02-15T05:20:26Z2025-02-15T05:20:26Zby Bouvry, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25261-7">https://doi.org/10.1007/978-3-642-25261-7</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1709012025-02-15T05:20:26Z2025-02-15T05:20:26Zby Bogdanov, Andrey. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34416-9">https://doi.org/10.1007/978-3-642-34416-9</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1719822025-02-15T05:20:26Z2025-02-15T05:20:26Zby Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142<br/><a href="https://doi.org/10.1007/978-3-642-33678-2">https://doi.org/10.1007/978-3-642-33678-2</a><br/>Format: Electronic Resources<br/>Advanced Computing, Networking and Security International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1726172025-02-15T05:20:26Z2025-02-15T05:20:26Zby Thilagam, P. Santhi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29280-4">https://doi.org/10.1007/978-3-642-29280-4</a><br/>Format: Electronic Resources<br/>Mobile Phone Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:1510092025-02-15T05:20:26Z2025-02-15T05:20:26Zby Androulidakis, I.I. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1650-0">https://doi.org/10.1007/978-1-4614-1650-0</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1752602025-02-15T05:20:26Z2025-02-15T05:20:26Zby Bononi, Luciano. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25959-3">https://doi.org/10.1007/978-3-642-25959-3</a><br/>Format: Electronic Resources<br/>Computer Networks 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1480382025-02-15T05:20:26Z2025-02-15T05:20:26Zby Kwiecien, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31217-5">https://doi.org/10.1007/978-3-642-31217-5</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1494782025-02-15T05:20:26Z2025-02-15T05:20:26Zby Xiang, Yang. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34883-9">https://doi.org/10.1007/978-3-642-34883-9</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1694972025-02-15T05:20:26Z2025-02-15T05:20:26Zby Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142<br/><a href="https://doi.org/10.1007/978-3-642-33675-1">https://doi.org/10.1007/978-3-642-33675-1</a><br/>Format: Electronic Resources<br/>Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012ent://SD_ILS/0/SD_ILS:1436532025-02-15T05:20:26Z2025-02-15T05:20:26Zby Park, Jong Hyuk (James). editor.<br/><a href="https://doi.org/10.1007/978-94-007-5083-8">https://doi.org/10.1007/978-94-007-5083-8</a><br/>Format: Electronic Resources<br/>Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1437232025-02-15T05:20:26Z2025-02-15T05:20:26Zby Lee, Geuk. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32645-5">https://doi.org/10.1007/978-3-642-32645-5</a><br/>Format: Electronic Resources<br/>Trustworthy Ubiquitous Computingent://SD_ILS/0/SD_ILS:1597202025-02-15T05:20:26Z2025-02-15T05:20:26Zby Khalil, Ismail. editor.<br/><a href="https://doi.org/10.2991/978-94-91216-71-8">https://doi.org/10.2991/978-94-91216-71-8</a><br/>Format: Electronic Resources<br/>Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1621762025-02-15T05:20:26Z2025-02-15T05:20:26Zby Lee, Geuk. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32692-9">https://doi.org/10.1007/978-3-642-32692-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Pevised Selected Papersent://SD_ILS/0/SD_ILS:1352672025-02-15T05:20:26Z2025-02-15T05:20:26Zby Schmidt, Andreas U. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33392-7">https://doi.org/10.1007/978-3-642-33392-7</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 7th International ICST Conference, SecureComm 2011, London, September 7-9, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1404932025-02-15T05:20:26Z2025-02-15T05:20:26Zby Rajarajan, Muttukrishnan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31909-9">https://doi.org/10.1007/978-3-642-31909-9</a><br/>Format: Electronic Resources<br/>Wired / Wireless Internet Communication 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1429082025-02-15T05:20:26Z2025-02-15T05:20:26Zby Koucheryavy, Yevgeni. editor. (orcid)0000-0003-3976-297X<br/><a href="https://doi.org/10.1007/978-3-642-30630-3">https://doi.org/10.1007/978-3-642-30630-3</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on IT Convergence and Security 2011ent://SD_ILS/0/SD_ILS:1350882025-02-15T05:20:26Z2025-02-15T05:20:26Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-94-007-2911-7">https://doi.org/10.1007/978-94-007-2911-7</a><br/>Format: Electronic Resources<br/>Network Hacks - Intensivkurs Angriff und Verteidigung mit Pythonent://SD_ILS/0/SD_ILS:1916552025-02-15T05:20:26Z2025-02-15T05:20:26Zby Ballmann, Bastian. author.<br/><a href="https://doi.org/10.1007/978-3-642-24305-9">https://doi.org/10.1007/978-3-642-24305-9</a><br/>Format: Electronic Resources<br/>Global Security, Safety, and Sustainability 7th International and 4th e-Democracy Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1772052025-02-15T05:20:26Z2025-02-15T05:20:26Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33448-1">https://doi.org/10.1007/978-3-642-33448-1</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1704092025-02-15T05:20:26Z2025-02-15T05:20:26Zby Prouff, Emmanuel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-27257-8">https://doi.org/10.1007/978-3-642-27257-8</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 30th International Conference, SAFECOMP 2011, Naples, Italy, September 19-22, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1705422025-02-15T05:20:26Z2025-02-15T05:20:26Zby Flammini, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24270-0">https://doi.org/10.1007/978-3-642-24270-0</a><br/>Format: Electronic Resources<br/>Spyware and Adwareent://SD_ILS/0/SD_ILS:1539872025-02-15T05:20:26Z2025-02-15T05:20:26Zby Aycock, John. author.<br/><a href="https://doi.org/10.1007/978-0-387-77741-2">https://doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 9th IFIP TC 6 International Conference, WWIC 2011, Vilanova i la Geltrú, Spain, June 15-17, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1747962025-02-15T05:20:26Z2025-02-15T05:20:26Zby Masip-Bruin, Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-642-21560-5">https://doi.org/10.1007/978-3-642-21560-5</a><br/>Format: Electronic Resources<br/>Secure and Trust Computing, Data Management, and Applications 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings, Part Ient://SD_ILS/0/SD_ILS:1747002025-02-15T05:20:26Z2025-02-15T05:20:26Zby Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-22339-6">https://doi.org/10.1007/978-3-642-22339-6</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 12th International Conference, ICDCN 2011, Bangalore, India, January 2-5, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1483812025-02-15T05:20:26Z2025-02-15T05:20:26Zby Aguilera, Marcos K. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17679-1">https://doi.org/10.1007/978-3-642-17679-1</a><br/>Format: Electronic Resources<br/>Parallel and Distributed Computing and Networks International Conference, PDCN 2010, Chongqing, China, December 13-14, 2010. Revised Selected Papersent://SD_ILS/0/SD_ILS:1404862025-02-15T05:20:26Z2025-02-15T05:20:26Zby Qi, Luo. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22706-6">https://doi.org/10.1007/978-3-642-22706-6</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1350052025-02-15T05:20:26Z2025-02-15T05:20:26Zby Alcaraz Calero, Jose M. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23496-5">https://doi.org/10.1007/978-3-642-23496-5</a><br/>Format: Electronic Resources<br/>Trustworthy Internetent://SD_ILS/0/SD_ILS:1351922025-02-15T05:20:26Z2025-02-15T05:20:26Zby Blefari-Melazzi, Nicola. editor.<br/><a href="https://doi.org/10.1007/978-88-470-1818-1">https://doi.org/10.1007/978-88-470-1818-1</a><br/>Format: Electronic Resources<br/>Kryptographie und IT-Sicherheit Grundlagen und Anwendungenent://SD_ILS/0/SD_ILS:1865462025-02-15T05:20:26Z2025-02-15T05:20:26Zby Spitz, Stephan. author.<br/><a href="https://doi.org/10.1007/978-3-8348-8120-5">https://doi.org/10.1007/978-3-8348-8120-5</a><br/>Format: Electronic Resources<br/>Understanding Cryptography A Textbook for Students and Practitionersent://SD_ILS/0/SD_ILS:1727452025-02-15T05:20:26Z2025-02-15T05:20:26Zby Paar, Christof. author.<br/><a href="https://doi.org/10.1007/978-3-642-04101-3">https://doi.org/10.1007/978-3-642-04101-3</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection and Prevention Concepts and Techniquesent://SD_ILS/0/SD_ILS:1542482025-02-15T05:20:26Z2025-02-15T05:20:26Zby Ghorbani, Ali A. author.<br/><a href="https://doi.org/10.1007/978-0-387-88771-5">https://doi.org/10.1007/978-0-387-88771-5</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1723462025-02-15T05:20:26Z2025-02-15T05:20:26Zby Kant, Krishna. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11322-2">https://doi.org/10.1007/978-3-642-11322-2</a><br/>Format: Electronic Resources<br/>IT Security Management IT Securiteers - Setting up an IT Security Functionent://SD_ILS/0/SD_ILS:1479792025-02-15T05:20:26Z2025-02-15T05:20:26Zby Partida, Alberto. author.<br/><a href="https://doi.org/10.1007/978-90-481-8882-6">https://doi.org/10.1007/978-90-481-8882-6</a><br/>Format: Electronic Resources<br/>Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1509032025-02-15T05:20:26Z2025-02-15T05:20:26Zby Gu, Qijun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11526-4">https://doi.org/10.1007/978-3-642-11526-4</a><br/>Format: Electronic Resources<br/>Handbook of Information and Communication Securityent://SD_ILS/0/SD_ILS:1678242025-02-15T05:20:26Z2025-02-15T05:20:26Zby Stavroulakis, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04117-4">https://doi.org/10.1007/978-3-642-04117-4</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 8th International Conference, WWIC 2010, Lulea, Sweden, June 1-3, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1697542025-02-15T05:20:26Z2025-02-15T05:20:26Zby Osipov, Evgeny. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13315-2">https://doi.org/10.1007/978-3-642-13315-2</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1451932025-02-15T05:20:26Z2025-02-15T05:20:26Zby Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443<br/><a href="https://doi.org/10.1007/978-3-642-15651-9">https://doi.org/10.1007/978-3-642-15651-9</a><br/>Format: Electronic Resources<br/>Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1579412025-02-15T05:20:26Z2025-02-15T05:20:26Zby Weerasinghe, Dasun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11530-1">https://doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Electronic Resources<br/>Economics of Information Security and Privacyent://SD_ILS/0/SD_ILS:1383772025-02-15T05:20:26Z2025-02-15T05:20:26Zby Moore, Tyler. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-6967-5">https://doi.org/10.1007/978-1-4419-6967-5</a><br/>Format: Electronic Resources<br/>Security in Embedded Devicesent://SD_ILS/0/SD_ILS:1379972025-02-15T05:20:26Z2025-02-15T05:20:26Zby Gebotys, Catherine H. author.<br/><a href="https://doi.org/10.1007/978-1-4419-1530-6">https://doi.org/10.1007/978-1-4419-1530-6</a><br/>Format: Electronic Resources<br/>Insider Threats in Cyber Securityent://SD_ILS/0/SD_ILS:1384042025-02-15T05:20:26Z2025-02-15T05:20:26Zby Probst, Christian W. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-7133-3">https://doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1405452025-02-15T05:20:26Z2025-02-15T05:20:26Zby Xie, Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16576-4">https://doi.org/10.1007/978-3-642-16576-4</a><br/>Format: Electronic Resources<br/>sicher & mobil Sicherheit in der drahtlosen Kommunikationent://SD_ILS/0/SD_ILS:1792622025-02-15T05:20:26Z2025-02-15T05:20:26Zby Osterhage, Wolfgang W. author.<br/><a href="https://doi.org/10.1007/978-3-642-03083-3">https://doi.org/10.1007/978-3-642-03083-3</a><br/>Format: Electronic Resources<br/>Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1724862025-02-15T05:20:26Z2025-02-15T05:20:26Zby Park, James (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-02617-1">https://doi.org/10.1007/978-3-642-02617-1</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1701152025-02-15T05:20:26Z2025-02-15T05:20:26Zby Buth, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04468-7">https://doi.org/10.1007/978-3-642-04468-7</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1701432025-02-15T05:20:26Z2025-02-15T05:20:26Zby González Nieto, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02704-8">https://doi.org/10.1007/978-3-642-02704-8</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 7th International Conference, WWIC 2009, Enschede, The Netherlands, May 27-29 2009, Proceedingsent://SD_ILS/0/SD_ILS:1702452025-02-15T05:20:26Z2025-02-15T05:20:26Zby van den Berg, Hans. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02118-3">https://doi.org/10.1007/978-3-642-02118-3</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008ent://SD_ILS/0/SD_ILS:1713592025-02-15T05:20:26Z2025-02-15T05:20:26Zby Setola, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03552-4">https://doi.org/10.1007/978-3-642-03552-4</a><br/>Format: Electronic Resources<br/>Trusted Computing Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1726982025-02-15T05:20:26Z2025-02-15T05:20:26Zby Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00587-9">https://doi.org/10.1007/978-3-642-00587-9</a><br/>Format: Electronic Resources<br/>Future Generation Information Technology First International Conference, FGIT 2009, Jeju Island, Korea, December 10-12,2009, Proceedingsent://SD_ILS/0/SD_ILS:1721242025-02-15T05:20:26Z2025-02-15T05:20:26Zby Lee, Young Hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10509-8">https://doi.org/10.1007/978-3-642-10509-8</a><br/>Format: Electronic Resources<br/>Secure Multi-Party Non-Repudiation Protocols and Applicationsent://SD_ILS/0/SD_ILS:1538202025-02-15T05:20:26Z2025-02-15T05:20:26Zby Onieva, José A. author.<br/><a href="https://doi.org/10.1007/978-0-387-75630-1">https://doi.org/10.1007/978-0-387-75630-1</a><br/>Format: Electronic Resources<br/>Security and Dependability for Ambient Intelligenceent://SD_ILS/0/SD_ILS:1542492025-02-15T05:20:26Z2025-02-15T05:20:26Zby Spanoudakis, George. editor.<br/><a href="https://doi.org/10.1007/978-0-387-88775-3">https://doi.org/10.1007/978-0-387-88775-3</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 10th International Conference, ICDCN 2009, Hyderabad, India, January 3-6, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1729412025-02-15T05:20:26Z2025-02-15T05:20:26Zby Garg, Vijay. editor.<br/><a href="https://doi.org/10.1007/978-3-540-92295-7">https://doi.org/10.1007/978-3-540-92295-7</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 4th International Symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1738862025-02-15T05:20:26Z2025-02-15T05:20:26Zby Kaklamanis, Christos. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00945-7">https://doi.org/10.1007/978-3-642-00945-7</a><br/>Format: Electronic Resources<br/>Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1506192025-02-15T05:20:26Z2025-02-15T05:20:26Zby Park, James (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-02633-1">https://doi.org/10.1007/978-3-642-02633-1</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1680662025-02-15T05:20:26Z2025-02-15T05:20:26Zby Chen, Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-05284-2">https://doi.org/10.1007/978-3-642-05284-2</a><br/>Format: Electronic Resources<br/>Active and Programmable Networks IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005, Revised Papersent://SD_ILS/0/SD_ILS:1697922025-02-15T05:20:26Z2025-02-15T05:20:26Zby Hutchison, David. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00972-3">https://doi.org/10.1007/978-3-642-00972-3</a><br/>Format: Electronic Resources<br/>Proceedings of the 3rd European Conference on Computer Network Defenseent://SD_ILS/0/SD_ILS:1436622025-02-15T05:20:26Z2025-02-15T05:20:26Zby Siris, Vasilios. editor.<br/><a href="https://doi.org/10.1007/978-0-387-85555-4">https://doi.org/10.1007/978-0-387-85555-4</a><br/>Format: Electronic Resources<br/>Identifying Malicious Code Through Reverse Engineeringent://SD_ILS/0/SD_ILS:1366762025-02-15T05:20:26Z2025-02-15T05:20:26Zby Singh, Abhishek. editor.<br/><a href="https://doi.org/10.1007/978-0-387-89468-3">https://doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Electronic Resources<br/>Pervasive Computing 7th International Conference, Pervasive 2009, Nara, Japan, May 11-14, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1426562025-02-15T05:20:26Z2025-02-15T05:20:26Zby Tokuda, Hideyuki. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01516-8">https://doi.org/10.1007/978-3-642-01516-8</a><br/>Format: Electronic Resources<br/>Global Initiatives to Secure Cyberspace An Emerging Landscapeent://SD_ILS/0/SD_ILS:1360942025-02-15T05:20:26Z2025-02-15T05:20:26Zby Portnoy, Michael. editor.<br/><a href="https://doi.org/10.1007/978-0-387-09764-0">https://doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:1701882025-02-15T05:20:26Z2025-02-15T05:20:26Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-540-78663-4">https://doi.org/10.1007/978-3-540-78663-4</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:1724892025-02-15T05:20:26Z2025-02-15T05:20:26Zby Harrison, Michael Douglas. editor.<br/><a href="https://doi.org/10.1007/978-3-540-87698-4">https://doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 9th International Conference, ICDCN 2008, Kolkata, India, January 5-8, 2008, Proceedingsent://SD_ILS/0/SD_ILS:1698732025-02-15T05:20:26Z2025-02-15T05:20:26Zby Rao, Shrisha. editor.<br/><a href="https://doi.org/10.1007/978-3-540-77444-0">https://doi.org/10.1007/978-3-540-77444-0</a><br/>Format: Electronic Resources<br/>Network-Based Information Systems 2nd Internatonal Conference, NBiS 2008, Turin, Italy, September 1-5, 2008, Proceedingsent://SD_ILS/0/SD_ILS:1711112025-02-15T05:20:26Z2025-02-15T05:20:26Zby Takizawa, Makoto. editor.<br/><a href="https://doi.org/10.1007/978-3-540-85693-1">https://doi.org/10.1007/978-3-540-85693-1</a><br/>Format: Electronic Resources<br/>Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedingsent://SD_ILS/0/SD_ILS:1713612025-02-15T05:20:26Z2025-02-15T05:20:26Zby Lipp, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-540-68979-9">https://doi.org/10.1007/978-3-540-68979-9</a><br/>Format: Electronic Resources<br/>Vulnerability Analysis and Defense for the Internetent://SD_ILS/0/SD_ILS:1537402025-02-15T05:20:26Z2025-02-15T05:20:26Zby Singh, Abhishek. editor.<br/><a href="https://doi.org/10.1007/978-0-387-74390-5">https://doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Botnet Detection Countering the Largest Security Threatent://SD_ILS/0/SD_ILS:1533462025-02-15T05:20:26Z2025-02-15T05:20:26Zby Lee, Wenke. editor.<br/><a href="https://doi.org/10.1007/978-0-387-68768-1">https://doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:1535722025-02-15T05:20:26Z2025-02-15T05:20:26Zby Mayes, Keith. editor.<br/><a href="https://doi.org/10.1007/978-0-387-72198-9">https://doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Insider Attack and Cyber Security Beyond the Hackerent://SD_ILS/0/SD_ILS:1539432025-02-15T05:20:26Z2025-02-15T05:20:26Zby Stolfo, Salvatore J. editor.<br/><a href="https://doi.org/10.1007/978-0-387-77322-3">https://doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Pervasive Computing 6th International Conference, PERVASIVE 2008, Sydney, Australia, May 19-22, 2008ent://SD_ILS/0/SD_ILS:1478432025-02-15T05:20:26Z2025-02-15T05:20:26Zby Indulska, Jadwiga. editor.<br/><a href="https://doi.org/10.1007/978-3-540-79576-6">https://doi.org/10.1007/978-3-540-79576-6</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedingsent://SD_ILS/0/SD_ILS:1492982025-02-15T05:20:26Z2025-02-15T05:20:26Zby Rong, Chunming. editor.<br/><a href="https://doi.org/10.1007/978-3-540-69295-9">https://doi.org/10.1007/978-3-540-69295-9</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 6th International Conference, WWIC 2008 Tampere, Finland, May 28-30, 2008 Proceedingsent://SD_ILS/0/SD_ILS:1710172025-02-15T05:20:26Z2025-02-15T05:20:26Zby Harju, Jarmo. editor.<br/><a href="https://doi.org/10.1007/978-3-540-68807-5">https://doi.org/10.1007/978-3-540-68807-5</a><br/>Format: Electronic Resources<br/>Information Networking. Towards Ubiquitous Networking and Services International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:1476432025-02-15T05:20:26Z2025-02-15T05:20:26Zby Vazão, Teresa. editor.<br/><a href="https://doi.org/10.1007/978-3-540-89524-4">https://doi.org/10.1007/978-3-540-89524-4</a><br/>Format: Electronic Resources<br/>Security for Telecommunications Networksent://SD_ILS/0/SD_ILS:1465612025-02-15T05:20:26Z2025-02-15T05:20:26Zby Traynor, Patrick. author.<br/><a href="https://doi.org/10.1007/978-0-387-72442-3">https://doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006, Selected Papersent://SD_ILS/0/SD_ILS:1570202025-02-15T05:20:26Z2025-02-15T05:20:26Zby Filipe, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-540-70760-8">https://doi.org/10.1007/978-3-540-70760-8</a><br/>Format: Electronic Resources<br/>Intrusion Detection Systemsent://SD_ILS/0/SD_ILS:1413682025-02-15T05:20:26Z2025-02-15T05:20:26Zby Di Pietro, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-0-387-77265-3">https://doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Kryptographie und IT-Sicherheit Grundlagen und Anwendungenent://SD_ILS/0/SD_ILS:1802532025-02-15T05:20:26Z2025-02-15T05:20:26Zby Swoboda, Jochim. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9473-1">https://doi.org/10.1007/978-3-8348-9473-1</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:1710882025-02-15T05:20:26Z2025-02-15T05:20:26Zby Montanari, Ugo. editor.<br/><a href="https://doi.org/10.1007/978-3-540-75336-0">https://doi.org/10.1007/978-3-540-75336-0</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007, Proceedingsent://SD_ILS/0/SD_ILS:1714942025-02-15T05:20:26Z2025-02-15T05:20:26Zby Boavida, Fernando. editor.<br/><a href="https://doi.org/10.1007/978-3-540-72697-5">https://doi.org/10.1007/978-3-540-72697-5</a><br/>Format: Electronic Resources<br/>Mobile Ad-hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedingsent://SD_ILS/0/SD_ILS:1709412025-02-15T05:20:26Z2025-02-15T05:20:26Zby Zhang, Hongke. editor.<br/><a href="https://doi.org/10.1007/978-3-540-77024-4">https://doi.org/10.1007/978-3-540-77024-4</a><br/>Format: Electronic Resources<br/>Power Analysis Attacks Revealing the Secrets of Smart Cardsent://SD_ILS/0/SD_ILS:1530432025-02-15T05:20:26Z2025-02-15T05:20:26Zby Mangard, Stefan. author.<br/><a href="https://doi.org/10.1007/978-0-387-38162-6">https://doi.org/10.1007/978-0-387-38162-6</a><br/>Format: Electronic Resources<br/>Privacy-Respecting Intrusion Detectionent://SD_ILS/0/SD_ILS:1532912025-02-15T05:20:26Z2025-02-15T05:20:26Zby Flegel, Ulrich. author.<br/><a href="https://doi.org/10.1007/978-0-387-68254-9">https://doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papersent://SD_ILS/0/SD_ILS:1504892025-02-15T05:20:26Z2025-02-15T05:20:26Zby Filipe, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-540-75993-5">https://doi.org/10.1007/978-3-540-75993-5</a><br/>Format: Electronic Resources<br/>Computer Network Security Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedingsent://SD_ILS/0/SD_ILS:1663132025-02-15T05:20:26Z2025-02-15T05:20:26Zby Gorodetsky, Vladimir. editor.<br/><a href="https://doi.org/10.1007/978-3-540-73986-9">https://doi.org/10.1007/978-3-540-73986-9</a><br/>Format: Electronic Resources<br/>Anti-Spam Measures Analysis and Designent://SD_ILS/0/SD_ILS:1679862025-02-15T05:20:26Z2025-02-15T05:20:26Zby Schryen, Guido. author.<br/><a href="https://doi.org/10.1007/978-3-540-71750-8">https://doi.org/10.1007/978-3-540-71750-8</a><br/>Format: Electronic Resources<br/>Pervasive Computing 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 13-16, 2007, Proceedingsent://SD_ILS/0/SD_ILS:1709902025-02-15T05:20:26Z2025-02-15T05:20:26Zby LaMarca, Anthony. editor.<br/><a href="https://doi.org/10.1007/978-3-540-72037-9">https://doi.org/10.1007/978-3-540-72037-9</a><br/>Format: Electronic Resources<br/>Network-Based Information Systems First International Conference, NBIS 2007, Regensburg, Germany, September 3-7, 2007, Proceedingsent://SD_ILS/0/SD_ILS:1710122025-02-15T05:20:26Z2025-02-15T05:20:26Zby Enokido, Tomoya. editor.<br/><a href="https://doi.org/10.1007/978-3-540-74573-0">https://doi.org/10.1007/978-3-540-74573-0</a><br/>Format: Electronic Resources<br/>Formal Correctness of Security Protocolsent://SD_ILS/0/SD_ILS:1449392025-02-15T05:20:26Z2025-02-15T05:20:26Zby Bella, Giampaolo. author.<br/><a href="https://doi.org/10.1007/978-3-540-68136-6">https://doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Electronic Resources<br/>Grid Computing Securityent://SD_ILS/0/SD_ILS:1605152025-02-15T05:20:26Z2025-02-15T05:20:26Zby Chakrabarti, Anirban. author.<br/><a href="https://doi.org/10.1007/978-3-540-44493-0">https://doi.org/10.1007/978-3-540-44493-0</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedingsent://SD_ILS/0/SD_ILS:1400482025-02-15T05:20:26Z2025-02-15T05:20:26Zby Xiao, Bin. editor.<br/><a href="https://doi.org/10.1007/978-3-540-73547-2">https://doi.org/10.1007/978-3-540-73547-2</a><br/>Format: Electronic Resources<br/>Network Security Policies and Proceduresent://SD_ILS/0/SD_ILS:1438692025-02-15T05:20:26Z2025-02-15T05:20:26Zby Frye, Douglas W. author.<br/><a href="https://doi.org/10.1007/978-0-387-47955-2">https://doi.org/10.1007/978-0-387-47955-2</a><br/>Format: Electronic Resources<br/>UbiComp 2007: Ubiquitous Computing 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007, Proceedingsent://SD_ILS/0/SD_ILS:1761712025-02-15T05:20:26Z2025-02-15T05:20:26Zby Krumm, John. editor.<br/><a href="https://doi.org/10.1007/978-3-540-74853-3">https://doi.org/10.1007/978-3-540-74853-3</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 8th International Conference, ICDCN 2006, Guwahati, India, December 27-30, 2006, Proceedingsent://SD_ILS/0/SD_ILS:1722842025-02-15T05:20:26Z2025-02-15T05:20:26Zby Chaudhuri, Soma. editor.<br/><a href="https://doi.org/10.1007/11947950">https://doi.org/10.1007/11947950</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005ent://SD_ILS/0/SD_ILS:1527162025-02-15T05:20:26Z2025-02-15T05:20:26Zby Pollitt, Mark. editor.<br/><a href="https://doi.org/10.1007/0-387-31163-7">https://doi.org/10.1007/0-387-31163-7</a><br/>Format: Electronic Resources<br/>