Search Results for Computer engineering. - Narrowed by: Cryptology. SirsiDynix Enterprise http://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dComputer$002bengineering.$0026qf$003dSUBJECT$002509Konu$002509Cryptology.$002509Cryptology.$0026ps$003d300$0026isd$003dtrue?dt=list 2025-02-15T05:18:19Z Computer Applications for Security, Control and System Engineering International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings ent://SD_ILS/0/SD_ILS:143285 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Kim, Tai-hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35264-5">https://doi.org/10.1007/978-3-642-35264-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:166112 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Keromytis, Angelos D. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36883-7">https://doi.org/10.1007/978-3-642-36883-7</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:144145 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Zhi-zhong, Jun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36958-2">https://doi.org/10.1007/978-3-642-36958-2</a><br/>Format:&#160;Electronic Resources<br/> Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Confernce, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:162664 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Singh, Karan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37949-9">https://doi.org/10.1007/978-3-642-37949-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:139335 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Zia, Tanveer. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04283-1">https://doi.org/10.1007/978-3-319-04283-1</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks Third International ICST Conference, ADHOCNETS 2011, Paris, France, September 21-23, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:160483 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Simplot-Ryl, David. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29096-1">https://doi.org/10.1007/978-3-642-29096-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 7th International ICST Conference, SecureComm 2011, London, September 7-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:140493 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Rajarajan, Muttukrishnan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31909-9">https://doi.org/10.1007/978-3-642-31909-9</a><br/>Format:&#160;Electronic Resources<br/> Personal Satellite Services Second International ICST Conference, PSATS 2010, Rome, Italy, February 4-5, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:150004 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Sithamparanathan, Kandeepan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13618-4">https://doi.org/10.1007/978-3-642-13618-4</a><br/>Format:&#160;Electronic Resources<br/> Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:150903 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Gu, Qijun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11526-4">https://doi.org/10.1007/978-3-642-11526-4</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:146687 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Schmidt, Andreas U. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17502-2">https://doi.org/10.1007/978-3-642-17502-2</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks Second International Conference, ADHOCNETS 2010, Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:145615 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Zhi-zhong, Jun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17994-5">https://doi.org/10.1007/978-3-642-17994-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:157941 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Weerasinghe, Dasun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11530-1">https://doi.org/10.1007/978-3-642-11530-1</a><br/>Format:&#160;Electronic Resources<br/> Quantum Communication and Quantum Networking First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:157536 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Sergienko, Alexander. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11731-2">https://doi.org/10.1007/978-3-642-11731-2</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings ent://SD_ILS/0/SD_ILS:139530 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16161-2">https://doi.org/10.1007/978-3-642-16161-2</a><br/>Format:&#160;Electronic Resources<br/> Personal Satellite Services International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:149702 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Sithamparanathan, Kandeepan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04260-7">https://doi.org/10.1007/978-3-642-04260-7</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:168066 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Chen, Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-05284-2">https://doi.org/10.1007/978-3-642-05284-2</a><br/>Format:&#160;Electronic Resources<br/> Forensics in Telecommunications, Information and Multimedia Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:139394 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Sorell, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02312-5">https://doi.org/10.1007/978-3-642-02312-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:143804 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Lian, Shiguo. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04434-2">https://doi.org/10.1007/978-3-642-04434-2</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security and Trust within the Context of Pervasive Computing ent://SD_ILS/0/SD_ILS:152069 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Robinson, Philip. editor.<br/><a href="https://doi.org/10.1007/b101573">https://doi.org/10.1007/b101573</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Future Internet Services and Systems Current Research ent://SD_ILS/0/SD_ILS:169856 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Heisel, Maritta. editor.<br/><a href="https://doi.org/10.1007/978-3-319-07452-8">https://doi.org/10.1007/978-3-319-07452-8</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:172343 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-12778-1">https://doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:176954 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Naccache, David. editor.<br/><a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format:&#160;Electronic Resources<br/> Communication Networks for Smart Grids Making Smart Grid Real ent://SD_ILS/0/SD_ILS:175163 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Budka, Kenneth C. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6302-2">https://doi.org/10.1007/978-1-4471-6302-2</a><br/>Format:&#160;Electronic Resources<br/> Querying over Encrypted Data in Smart Grids ent://SD_ILS/0/SD_ILS:151328 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Wen, Mi. author.<br/><a href="https://doi.org/10.1007/978-3-319-06355-3">https://doi.org/10.1007/978-3-319-06355-3</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:165964 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Proudler, Graeme. author.<br/><a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Execution on Mobile Devices ent://SD_ILS/0/SD_ILS:147010 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Vasudevan, Amit. author.<br/><a href="https://doi.org/10.1007/978-1-4614-8190-4">https://doi.org/10.1007/978-1-4614-8190-4</a><br/>Format:&#160;Electronic Resources<br/> Dynamic Secrets in Communication Security ent://SD_ILS/0/SD_ILS:161250 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Xiao, Sheng. author.<br/><a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:157732 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Nepal, Surya. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/> The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value ent://SD_ILS/0/SD_ILS:137858 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Dennedy, Michelle. author.<br/><a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy for Implantable Medical Devices ent://SD_ILS/0/SD_ILS:138438 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Burleson, Wayne. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-1674-6">https://doi.org/10.1007/978-1-4614-1674-6</a><br/>Format:&#160;Electronic Resources<br/> Network Science and Cybersecurity ent://SD_ILS/0/SD_ILS:139306 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Pino, Robinson E. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:143314 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:135581 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;J&uuml;rjens, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04897-0">https://doi.org/10.1007/978-3-319-04897-0</a><br/>Format:&#160;Electronic Resources<br/> Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:137841 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Ruan, Xiaoyu. author.<br/><a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013, Proceedings ent://SD_ILS/0/SD_ILS:170480 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Accorsi, Rafael. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41098-7">https://doi.org/10.1007/978-3-642-41098-7</a><br/>Format:&#160;Electronic Resources<br/> Advanced Infocomm Technology 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected papers ent://SD_ILS/0/SD_ILS:170353 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Guyot, Vincent. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38227-7">https://doi.org/10.1007/978-3-642-38227-7</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:171925 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Palamidessi, Catuscia. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41157-1">https://doi.org/10.1007/978-3-642-41157-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings ent://SD_ILS/0/SD_ILS:171651 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Gierlichs, Benedikt. editor. (orcid)0000-0002-5866-1990<br/><a href="https://doi.org/10.1007/978-3-642-41224-0">https://doi.org/10.1007/978-3-642-41224-0</a><br/>Format:&#160;Electronic Resources<br/> Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013, Proceedings ent://SD_ILS/0/SD_ILS:172710 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Doyen, Guillaume. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38998-6">https://doi.org/10.1007/978-3-642-38998-6</a><br/>Format:&#160;Electronic Resources<br/> Wireless Network Security Theories and Applications ent://SD_ILS/0/SD_ILS:175538 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Chen, Lei. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36511-9">https://doi.org/10.1007/978-3-642-36511-9</a><br/>Format:&#160;Electronic Resources<br/> Security Assessment in Vehicular Networks ent://SD_ILS/0/SD_ILS:147062 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Du, Suguo. author.<br/><a href="https://doi.org/10.1007/978-1-4614-9357-0">https://doi.org/10.1007/978-1-4614-9357-0</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:148065 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Tang, Jin. author.<br/><a href="https://doi.org/10.1007/978-1-4614-8996-2">https://doi.org/10.1007/978-1-4614-8996-2</a><br/>Format:&#160;Electronic Resources<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:166824 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-5416-8">https://doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/> Security Engineering and Intelligence Informatics CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013, Proceedings ent://SD_ILS/0/SD_ILS:169482 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Cuzzocrea, Alfredo. editor. (orcid)0000-0002-7104-6415<br/><a href="https://doi.org/10.1007/978-3-642-40588-4">https://doi.org/10.1007/978-3-642-40588-4</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:169576 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Mangard, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37288-9">https://doi.org/10.1007/978-3-642-37288-9</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:144191 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Yuan, Yuyu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35795-4">https://doi.org/10.1007/978-3-642-35795-4</a><br/>Format:&#160;Electronic Resources<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:139912 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Liu, Xinxin. author.<br/><a href="https://doi.org/10.1007/978-1-4614-9074-6">https://doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:135714 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;J&uuml;rjens, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36563-8">https://doi.org/10.1007/978-3-642-36563-8</a><br/>Format:&#160;Electronic Resources<br/> Netzwerk- und Datensicherheit Eine praktische Einf&uuml;hrung ent://SD_ILS/0/SD_ILS:188770 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Kappes, Martin. author.<br/><a href="https://doi.org/10.1007/978-3-8348-8612-5">https://doi.org/10.1007/978-3-8348-8612-5</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012, Proceedings ent://SD_ILS/0/SD_ILS:170893 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-642-28166-2">https://doi.org/10.1007/978-3-642-28166-2</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:171278 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/><a href="https://doi.org/10.1007/978-3-642-27901-0">https://doi.org/10.1007/978-3-642-27901-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Intelligent Information Systems International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:169927 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Bouvry, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25261-7">https://doi.org/10.1007/978-3-642-25261-7</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012, Proceedings ent://SD_ILS/0/SD_ILS:170901 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Bogdanov, Andrey. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34416-9">https://doi.org/10.1007/978-3-642-34416-9</a><br/>Format:&#160;Electronic Resources<br/> Theory of Security and Applications Joint Workshop, TOSCA 2011, Saarbr&uuml;cken, Germany,March 31-April 1, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:172207 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Moedersheim, Sebastian. editor.<br/><a href="https://doi.org/10.1007/978-3-642-27375-9">https://doi.org/10.1007/978-3-642-27375-9</a><br/>Format:&#160;Electronic Resources<br/> NETWORKING 2012 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part II ent://SD_ILS/0/SD_ILS:171737 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Bestak, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30054-7">https://doi.org/10.1007/978-3-642-30054-7</a><br/>Format:&#160;Electronic Resources<br/> Android Apps Security ent://SD_ILS/0/SD_ILS:156401 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Gunasekera, Sheran. author.<br/><a href="https://doi.org/10.1007/978-1-4302-4063-1">https://doi.org/10.1007/978-1-4302-4063-1</a><br/>Format:&#160;Electronic Resources<br/> NETWORKING 2012 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part I ent://SD_ILS/0/SD_ILS:175691 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Bestak, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30045-5">https://doi.org/10.1007/978-3-642-30045-5</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communications 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012, Proceedings ent://SD_ILS/0/SD_ILS:175450 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Bellalta, Boris. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34976-8">https://doi.org/10.1007/978-3-642-34976-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings ent://SD_ILS/0/SD_ILS:147670 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33167-1">https://doi.org/10.1007/978-3-642-33167-1</a><br/>Format:&#160;Electronic Resources<br/> Research in Cryptology 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:148365 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Armknecht, Frederik. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34159-5">https://doi.org/10.1007/978-3-642-34159-5</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:145597 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Bruni, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30065-3">https://doi.org/10.1007/978-3-642-30065-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Technology 5th International Conference, IAIT 2012, Bangkok, Thailand, December 6-7, 2012, Proceedings ent://SD_ILS/0/SD_ILS:141209 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Papasratorn, Borworn. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35076-4">https://doi.org/10.1007/978-3-642-35076-4</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170409 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Prouff, Emmanuel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-27257-8">https://doi.org/10.1007/978-3-642-27257-8</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011, Proceedings ent://SD_ILS/0/SD_ILS:171250 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Erlingsson, &Uacute;lfar. editor.<br/><a href="https://doi.org/10.1007/978-3-642-19125-1">https://doi.org/10.1007/978-3-642-19125-1</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communications 4th International Workshop, MACOM 2011, Trento, Italy, September 12-13, 2011. Proceedings ent://SD_ILS/0/SD_ILS:171953 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Sacchi, Claudio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23795-9">https://doi.org/10.1007/978-3-642-23795-9</a><br/>Format:&#160;Electronic Resources<br/> NETWORKING 2011 Workshops International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, Valencia, Spain, May 13, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:172221 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Casares-Giner, Vicente. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23041-7">https://doi.org/10.1007/978-3-642-23041-7</a><br/>Format:&#160;Electronic Resources<br/> Spyware and Adware ent://SD_ILS/0/SD_ILS:153987 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Aycock, John. author.<br/><a href="https://doi.org/10.1007/978-0-387-77741-2">https://doi.org/10.1007/978-0-387-77741-2</a><br/>Format:&#160;Electronic Resources<br/> Secure and Trust Computing, Data Management, and Applications 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings, Part I ent://SD_ILS/0/SD_ILS:174700 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-22339-6">https://doi.org/10.1007/978-3-642-22339-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011, Proceedings ent://SD_ILS/0/SD_ILS:148507 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Kim, Tai-Hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23141-4">https://doi.org/10.1007/978-3-642-23141-4</a><br/>Format:&#160;Electronic Resources<br/> NETWORKING 2011 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part I ent://SD_ILS/0/SD_ILS:169465 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Domingo-Pascual, Jordi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-20757-0">https://doi.org/10.1007/978-3-642-20757-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Network Security and Applications 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011, Proceedings ent://SD_ILS/0/SD_ILS:163627 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Wyld, David C. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22540-6">https://doi.org/10.1007/978-3-642-22540-6</a><br/>Format:&#160;Electronic Resources<br/> Smart Spaces and Next Generation Wired/Wireless Networking 11th International Conference, NEW2AN 2011 and 4th Conference on Smart Spaces, RuSMART 2011, St. Petersburg, Russia, August 22-15, 2011, Proceedings ent://SD_ILS/0/SD_ILS:140045 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Balandin, Sergey. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22875-9">https://doi.org/10.1007/978-3-642-22875-9</a><br/>Format:&#160;Electronic Resources<br/> Identity-Based Encryption ent://SD_ILS/0/SD_ILS:142144 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Chatterjee, Sanjit. author.<br/><a href="https://doi.org/10.1007/978-1-4419-9383-0">https://doi.org/10.1007/978-1-4419-9383-0</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings ent://SD_ILS/0/SD_ILS:135005 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Alcaraz Calero, Jose M. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23496-5">https://doi.org/10.1007/978-3-642-23496-5</a><br/>Format:&#160;Electronic Resources<br/> NETWORKING 2011 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part II ent://SD_ILS/0/SD_ILS:135709 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Domingo-Pascual, Jordi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-20798-3">https://doi.org/10.1007/978-3-642-20798-3</a><br/>Format:&#160;Electronic Resources<br/> Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170118 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Armando, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16074-5">https://doi.org/10.1007/978-3-642-16074-5</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170172 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Sion, Radu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-14992-4">https://doi.org/10.1007/978-3-642-14992-4</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings ent://SD_ILS/0/SD_ILS:169962 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;MASSACCI, Fabio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11747-3">https://doi.org/10.1007/978-3-642-11747-3</a><br/>Format:&#160;Electronic Resources<br/> NETWORKING 2010 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010, Proceedings ent://SD_ILS/0/SD_ILS:172275 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Crovella, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12963-6">https://doi.org/10.1007/978-3-642-12963-6</a><br/>Format:&#160;Electronic Resources<br/> Digital Signatures ent://SD_ILS/0/SD_ILS:152433 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Katz, Jonathan. author.<br/><a href="https://doi.org/10.1007/978-0-387-27712-7">https://doi.org/10.1007/978-0-387-27712-7</a><br/>Format:&#160;Electronic Resources<br/> Network Intrusion Detection and Prevention Concepts and Techniques ent://SD_ILS/0/SD_ILS:154248 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Ghorbani, Ali A. author.<br/><a href="https://doi.org/10.1007/978-0-387-88771-5">https://doi.org/10.1007/978-0-387-88771-5</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedings ent://SD_ILS/0/SD_ILS:172346 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Kant, Krishna. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11322-2">https://doi.org/10.1007/978-3-642-11322-2</a><br/>Format:&#160;Electronic Resources<br/> Collaborative Networks for a Sustainable World 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010, Proceedings ent://SD_ILS/0/SD_ILS:150414 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Camarinha-Matos, Luis M. editor.<br/><a href="https://doi.org/10.1007/978-3-642-15961-9">https://doi.org/10.1007/978-3-642-15961-9</a><br/>Format:&#160;Electronic Resources<br/> Networked Services and Applications - Engineering, Control and Management 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010, Proceedings ent://SD_ILS/0/SD_ILS:150693 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Aagesen, Finn Arve. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13971-0">https://doi.org/10.1007/978-3-642-13971-0</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Network Security and Applications Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 Proceedings ent://SD_ILS/0/SD_ILS:150623 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Meghanathan, Natarajan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-14478-3">https://doi.org/10.1007/978-3-642-14478-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Technology 4th International Conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010, Proceedings ent://SD_ILS/0/SD_ILS:168448 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Papasratorn, Borworn. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16699-0">https://doi.org/10.1007/978-3-642-16699-0</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170993 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Wirsing, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-642-15640-3">https://doi.org/10.1007/978-3-642-15640-3</a><br/>Format:&#160;Electronic Resources<br/> Ethical and Social Issues in the Information Age ent://SD_ILS/0/SD_ILS:143901 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-1-84996-038-0">https://doi.org/10.1007/978-1-84996-038-0</a><br/>Format:&#160;Electronic Resources<br/> Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses ent://SD_ILS/0/SD_ILS:144391 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Snyder, Chris. author.<br/><a href="https://doi.org/10.1007/978-1-4302-3319-0">https://doi.org/10.1007/978-1-4302-3319-0</a><br/>Format:&#160;Electronic Resources<br/> Trust Management IV 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010, Proceedings ent://SD_ILS/0/SD_ILS:162530 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Nishigaki, Masakatsu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13446-3">https://doi.org/10.1007/978-3-642-13446-3</a><br/>Format:&#160;Electronic Resources<br/> Applied Quantum Cryptography ent://SD_ILS/0/SD_ILS:158320 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Kollmitzer, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04831-9">https://doi.org/10.1007/978-3-642-04831-9</a><br/>Format:&#160;Electronic Resources<br/> Securing Wireless Communications at the Physical Layer ent://SD_ILS/0/SD_ILS:138021 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Liu, Ruoheng. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-1385-2">https://doi.org/10.1007/978-1-4419-1385-2</a><br/>Format:&#160;Electronic Resources<br/> Open Source Software for Digital Forensics ent://SD_ILS/0/SD_ILS:138227 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Huebner, Ewa. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-5803-7">https://doi.org/10.1007/978-1-4419-5803-7</a><br/>Format:&#160;Electronic Resources<br/> Insider Threats in Cyber Security ent://SD_ILS/0/SD_ILS:138404 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Probst, Christian W. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-7133-3">https://doi.org/10.1007/978-1-4419-7133-3</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedings ent://SD_ILS/0/SD_ILS:140545 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Xie, Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16576-4">https://doi.org/10.1007/978-3-642-16576-4</a><br/>Format:&#160;Electronic Resources<br/> Information Systems, Technology and Management 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings ent://SD_ILS/0/SD_ILS:142612 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Prasad, Sushil K. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12035-0">https://doi.org/10.1007/978-3-642-12035-0</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Science X Special Issue on Security in Computing, Part I ent://SD_ILS/0/SD_ILS:135183 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17499-5">https://doi.org/10.1007/978-3-642-17499-5</a><br/>Format:&#160;Electronic Resources<br/> Digitale Fernseh- und H&ouml;rfunktechnik in Theorie und Praxis MPEG-Basisbandcodierung, DVB-, DAB-, ATSC-, ISDB-T-&Uuml;bertragungstechnik, Messtechnik ent://SD_ILS/0/SD_ILS:185698 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Fischer, Walter. author.<br/><a href="https://doi.org/10.1007/978-3-642-15047-0">https://doi.org/10.1007/978-3-642-15047-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:172486 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Park, James (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-02617-1">https://doi.org/10.1007/978-3-642-02617-1</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:169663 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Degano, Pierpaolo. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03459-6">https://doi.org/10.1007/978-3-642-03459-6</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings ent://SD_ILS/0/SD_ILS:170143 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Gonz&aacute;lez Nieto, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02704-8">https://doi.org/10.1007/978-3-642-02704-8</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings ent://SD_ILS/0/SD_ILS:172698 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00587-9">https://doi.org/10.1007/978-3-642-00587-9</a><br/>Format:&#160;Electronic Resources<br/> Secure Multi-Party Non-Repudiation Protocols and Applications ent://SD_ILS/0/SD_ILS:153820 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Onieva, Jos&eacute; A. author.<br/><a href="https://doi.org/10.1007/978-0-387-75630-1">https://doi.org/10.1007/978-0-387-75630-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Engineering ent://SD_ILS/0/SD_ILS:153544 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Koc, Cetin Kaya. editor.<br/><a href="https://doi.org/10.1007/978-0-387-71817-0">https://doi.org/10.1007/978-0-387-71817-0</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009, Proceedings ent://SD_ILS/0/SD_ILS:175647 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04062-7">https://doi.org/10.1007/978-3-642-04062-7</a><br/>Format:&#160;Electronic Resources<br/> Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings ent://SD_ILS/0/SD_ILS:147975 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Slezak, Dominik. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10847-1">https://doi.org/10.1007/978-3-642-10847-1</a><br/>Format:&#160;Electronic Resources<br/> Information Systems, Technology and Management Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009, Proceedings ent://SD_ILS/0/SD_ILS:150002 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Prasad, Sushil K. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00405-6">https://doi.org/10.1007/978-3-642-00405-6</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009, Proceedings ent://SD_ILS/0/SD_ILS:149742 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;MASSACCI, Fabio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00199-4">https://doi.org/10.1007/978-3-642-00199-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:150619 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Park, James (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-02633-1">https://doi.org/10.1007/978-3-642-02633-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Spaces and Next Generation Wired/Wireless Networking 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009, Proceedings ent://SD_ILS/0/SD_ILS:170992 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Balandin, Sergey. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04190-7">https://doi.org/10.1007/978-3-642-04190-7</a><br/>Format:&#160;Electronic Resources<br/> Innovations in Digital Watermarking Techniques ent://SD_ILS/0/SD_ILS:168896 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Wang, Feng-Hsing. author.<br/><a href="https://doi.org/10.1007/978-3-642-03187-8">https://doi.org/10.1007/978-3-642-03187-8</a><br/>Format:&#160;Electronic Resources<br/> Software and Data Technolgoies Third International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008 ent://SD_ILS/0/SD_ILS:143595 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Cordeiro, Jos&eacute;. editor.<br/><a href="https://doi.org/10.1007/978-3-642-05201-9">https://doi.org/10.1007/978-3-642-05201-9</a><br/>Format:&#160;Electronic Resources<br/> Wireless and Mobile Networking Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009, Proceedings ent://SD_ILS/0/SD_ILS:142870 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Wozniak, Jozef. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03841-9">https://doi.org/10.1007/978-3-642-03841-9</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009, Proceedings ent://SD_ILS/0/SD_ILS:145984 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Jonker, Willem. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04219-5">https://doi.org/10.1007/978-3-642-04219-5</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography ent://SD_ILS/0/SD_ILS:160279 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Bernstein, Daniel J. editor.<br/><a href="https://doi.org/10.1007/978-3-540-88702-7">https://doi.org/10.1007/978-3-540-88702-7</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Multimedia Signal Processing and Communications ent://SD_ILS/0/SD_ILS:157361 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Grgic, Mislav. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02900-4">https://doi.org/10.1007/978-3-642-02900-4</a><br/>Format:&#160;Electronic Resources<br/> Identifying Malicious Code Through Reverse Engineering ent://SD_ILS/0/SD_ILS:136676 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Singh, Abhishek. editor.<br/><a href="https://doi.org/10.1007/978-0-387-89468-3">https://doi.org/10.1007/978-0-387-89468-3</a><br/>Format:&#160;Electronic Resources<br/> Open Source Systems Security Certification ent://SD_ILS/0/SD_ILS:136588 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Damiani, Ernesto. author. (orcid)0000-0002-9557-6496<br/><a href="https://doi.org/10.1007/978-0-387-77324-7">https://doi.org/10.1007/978-0-387-77324-7</a><br/>Format:&#160;Electronic Resources<br/> Global Initiatives to Secure Cyberspace An Emerging Landscape ent://SD_ILS/0/SD_ILS:136094 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Portnoy, Michael. editor.<br/><a href="https://doi.org/10.1007/978-0-387-09764-0">https://doi.org/10.1007/978-0-387-09764-0</a><br/>Format:&#160;Electronic Resources<br/> Digitale Fernseh- und H&ouml;rfunktechnik in Theorie und Praxis MPEG-Basisbandcodierung, DVB-, DAB-, ATSC-, ISDB-T-&Uuml;bertragungstechnik, Messtechnik ent://SD_ILS/0/SD_ILS:180336 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Fischer, Walter. author.<br/><a href="https://doi.org/10.1007/978-3-540-88195-7">https://doi.org/10.1007/978-3-540-88195-7</a><br/>Format:&#160;Electronic Resources<br/> Sichere Systeme Konzepte, Architekturen und Frameworks ent://SD_ILS/0/SD_ILS:180752 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Kriha, Walter. author.<br/><a href="https://doi.org/10.1007/978-3-540-78959-8">https://doi.org/10.1007/978-3-540-78959-8</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedings ent://SD_ILS/0/SD_ILS:171361 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Lipp, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-540-68979-9">https://doi.org/10.1007/978-3-540-68979-9</a><br/>Format:&#160;Electronic Resources<br/> Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:151684 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Schulzrinne, Henning. editor.<br/><a href="https://doi.org/10.1007/978-3-540-89054-6">https://doi.org/10.1007/978-3-540-89054-6</a><br/>Format:&#160;Electronic Resources<br/> RFID Security Techniques, Protocols and System-On-Chip Design ent://SD_ILS/0/SD_ILS:153860 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Kitsos, Paris. editor.<br/><a href="https://doi.org/10.1007/978-0-387-76481-8">https://doi.org/10.1007/978-0-387-76481-8</a><br/>Format:&#160;Electronic Resources<br/> Vulnerability Analysis and Defense for the Internet ent://SD_ILS/0/SD_ILS:153740 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Singh, Abhishek. editor.<br/><a href="https://doi.org/10.1007/978-0-387-74390-5">https://doi.org/10.1007/978-0-387-74390-5</a><br/>Format:&#160;Electronic Resources<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:153346 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Lee, Wenke. editor.<br/><a href="https://doi.org/10.1007/978-0-387-68768-1">https://doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Electronic Resources<br/> Network-Aware Security for Group Communications ent://SD_ILS/0/SD_ILS:153354 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Sun, Yan. author.<br/><a href="https://doi.org/10.1007/978-0-387-68848-0">https://doi.org/10.1007/978-0-387-68848-0</a><br/>Format:&#160;Electronic Resources<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:153572 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Mayes, Keith. editor.<br/><a href="https://doi.org/10.1007/978-0-387-72198-9">https://doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/> Insider Attack and Cyber Security Beyond the Hacker ent://SD_ILS/0/SD_ILS:153943 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Stolfo, Salvatore J. editor.<br/><a href="https://doi.org/10.1007/978-0-387-77322-3">https://doi.org/10.1007/978-0-387-77322-3</a><br/>Format:&#160;Electronic Resources<br/> Network and Parallel Computing IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings ent://SD_ILS/0/SD_ILS:175410 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Cao, Jian. editor.<br/><a href="https://doi.org/10.1007/978-3-540-88140-7">https://doi.org/10.1007/978-3-540-88140-7</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Techniques and Applications ent://SD_ILS/0/SD_ILS:147716 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Chen, Hsinchun. editor.<br/><a href="https://doi.org/10.1007/978-3-540-69209-6">https://doi.org/10.1007/978-3-540-69209-6</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings ent://SD_ILS/0/SD_ILS:149298 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Rong, Chunming. editor.<br/><a href="https://doi.org/10.1007/978-3-540-69295-9">https://doi.org/10.1007/978-3-540-69295-9</a><br/>Format:&#160;Electronic Resources<br/> Research in Cryptology Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:146425 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Lucks, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-540-88353-1">https://doi.org/10.1007/978-3-540-88353-1</a><br/>Format:&#160;Electronic Resources<br/> Security for Telecommunications Networks ent://SD_ILS/0/SD_ILS:146561 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Traynor, Patrick. author.<br/><a href="https://doi.org/10.1007/978-0-387-72442-3">https://doi.org/10.1007/978-0-387-72442-3</a><br/>Format:&#160;Electronic Resources<br/> RFID Security and Privacy Concepts, Protocols, and Architectures ent://SD_ILS/0/SD_ILS:161687 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Henrici, Dirk. author.<br/><a href="https://doi.org/10.1007/978-3-540-79076-1">https://doi.org/10.1007/978-3-540-79076-1</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:141368 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Di Pietro, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-0-387-77265-3">https://doi.org/10.1007/978-0-387-77265-3</a><br/>Format:&#160;Electronic Resources<br/> Kryptographie und IT-Sicherheit Grundlagen und Anwendungen ent://SD_ILS/0/SD_ILS:180253 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Swoboda, Jochim. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9473-1">https://doi.org/10.1007/978-3-8348-9473-1</a><br/>Format:&#160;Electronic Resources<br/> Internet-Security aus Software-Sicht Grundlagen der Software-Erstellung f&uuml;r sicherheitskritische Bereiche ent://SD_ILS/0/SD_ILS:180789 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Kriha, Walter. author.<br/><a href="https://doi.org/10.1007/978-3-540-68906-5">https://doi.org/10.1007/978-3-540-68906-5</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings ent://SD_ILS/0/SD_ILS:170941 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Zhang, Hongke. editor.<br/><a href="https://doi.org/10.1007/978-3-540-77024-4">https://doi.org/10.1007/978-3-540-77024-4</a><br/>Format:&#160;Electronic Resources<br/> Embedded Java Security Security for Mobile Devices ent://SD_ILS/0/SD_ILS:172714 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Debbabi, Mourad. author.<br/><a href="https://doi.org/10.1007/978-1-84628-711-4">https://doi.org/10.1007/978-1-84628-711-4</a><br/>Format:&#160;Electronic Resources<br/> Wireless Network Security ent://SD_ILS/0/SD_ILS:152801 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Xiao, Yang. editor.<br/><a href="https://doi.org/10.1007/978-0-387-33112-6">https://doi.org/10.1007/978-0-387-33112-6</a><br/>Format:&#160;Electronic Resources<br/> Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks ent://SD_ILS/0/SD_ILS:153123 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097<br/><a href="https://doi.org/10.1007/978-0-387-46276-9">https://doi.org/10.1007/978-0-387-46276-9</a><br/>Format:&#160;Electronic Resources<br/> Power Analysis Attacks Revealing the Secrets of Smart Cards ent://SD_ILS/0/SD_ILS:153043 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Mangard, Stefan. author.<br/><a href="https://doi.org/10.1007/978-0-387-38162-6">https://doi.org/10.1007/978-0-387-38162-6</a><br/>Format:&#160;Electronic Resources<br/> Security for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:153134 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Liu, Donggang. author.<br/><a href="https://doi.org/10.1007/978-0-387-46781-8">https://doi.org/10.1007/978-0-387-46781-8</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:153291 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Flegel, Ulrich. author.<br/><a href="https://doi.org/10.1007/978-0-387-68254-9">https://doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Electronic Resources<br/> Practical Internet Security ent://SD_ILS/0/SD_ILS:152626 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Vacca, John R. author.<br/><a href="https://doi.org/10.1007/978-0-387-29844-3">https://doi.org/10.1007/978-0-387-29844-3</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings ent://SD_ILS/0/SD_ILS:172347 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Okamoto, Tatsuaki. editor.<br/><a href="https://doi.org/10.1007/978-3-540-71677-8">https://doi.org/10.1007/978-3-540-71677-8</a><br/>Format:&#160;Electronic Resources<br/> Forensic Computing ent://SD_ILS/0/SD_ILS:175727 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Sammes, Anthony. author.<br/><a href="https://doi.org/10.1007/978-1-84628-732-9">https://doi.org/10.1007/978-1-84628-732-9</a><br/>Format:&#160;Electronic Resources<br/> TErrestrial Trunked RAdio - TETRA A Global Security Tool ent://SD_ILS/0/SD_ILS:166736 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Stavroulakis, Peter. author.<br/><a href="https://doi.org/10.1007/3-540-71192-9">https://doi.org/10.1007/3-540-71192-9</a><br/>Format:&#160;Electronic Resources<br/> Malware Detection ent://SD_ILS/0/SD_ILS:136393 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Christodorescu, Mihai. editor.<br/><a href="https://doi.org/10.1007/978-0-387-44599-1">https://doi.org/10.1007/978-0-387-44599-1</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings ent://SD_ILS/0/SD_ILS:140048 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Xiao, Bin. editor.<br/><a href="https://doi.org/10.1007/978-3-540-73547-2">https://doi.org/10.1007/978-3-540-73547-2</a><br/>Format:&#160;Electronic Resources<br/> Network Security Policies and Procedures ent://SD_ILS/0/SD_ILS:143869 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Frye, Douglas W. author.<br/><a href="https://doi.org/10.1007/978-0-387-47955-2">https://doi.org/10.1007/978-0-387-47955-2</a><br/>Format:&#160;Electronic Resources<br/> Synchronizing Internet Protocol Security (SIPSec) ent://SD_ILS/0/SD_ILS:143874 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Shoniregun, Charles A. author.<br/><a href="https://doi.org/10.1007/978-0-387-68569-4">https://doi.org/10.1007/978-0-387-68569-4</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-hoc and Sensor Networks Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings ent://SD_ILS/0/SD_ILS:170638 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Cao, Jiannong. editor.<br/><a href="https://doi.org/10.1007/11943952">https://doi.org/10.1007/11943952</a><br/>Format:&#160;Electronic Resources<br/> Security in Pervasive Computing Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings ent://SD_ILS/0/SD_ILS:172283 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Clark, John A. editor.<br/><a href="https://doi.org/10.1007/11734666">https://doi.org/10.1007/11734666</a><br/>Format:&#160;Electronic Resources<br/> Hop Integrity in the Internet ent://SD_ILS/0/SD_ILS:150868 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Huang, Chin-Tser. author.<br/><a href="https://doi.org/10.1007/0-387-29444-9">https://doi.org/10.1007/0-387-29444-9</a><br/>Format:&#160;Electronic Resources<br/> CryptoGraphics Exploiting Graphics Cards For Security ent://SD_ILS/0/SD_ILS:152876 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Cook, Debra. author.<br/><a href="https://doi.org/10.1007/0-387-34189-7">https://doi.org/10.1007/0-387-34189-7</a><br/>Format:&#160;Electronic Resources<br/> Quality Of Protection Security Measurements and Metrics ent://SD_ILS/0/SD_ILS:152988 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Gollmann, Dieter. editor.<br/><a href="https://doi.org/10.1007/978-0-387-36584-8">https://doi.org/10.1007/978-0-387-36584-8</a><br/>Format:&#160;Electronic Resources<br/> Guide to Wireless Network Security ent://SD_ILS/0/SD_ILS:152627 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Vacca, John R. author.<br/><a href="https://doi.org/10.1007/978-0-387-29845-0">https://doi.org/10.1007/978-0-387-29845-0</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006 ent://SD_ILS/0/SD_ILS:147035 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Yang, Laurence T. editor.<br/><a href="https://doi.org/10.1007/11839569">https://doi.org/10.1007/11839569</a><br/>Format:&#160;Electronic Resources<br/> Secure Mobile Ad-hoc Networks and Sensors First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:147685 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Burmester, Mike. editor.<br/><a href="https://doi.org/10.1007/11801412">https://doi.org/10.1007/11801412</a><br/>Format:&#160;Electronic Resources<br/> Embedded Security in Cars Securing Current and Future Automotive IT Applications ent://SD_ILS/0/SD_ILS:169435 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Lemke, Kerstin. editor.<br/><a href="https://doi.org/10.1007/3-540-28428-1">https://doi.org/10.1007/3-540-28428-1</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings ent://SD_ILS/0/SD_ILS:146560 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Leitold, Herbert. editor.<br/><a href="https://doi.org/10.1007/11909033">https://doi.org/10.1007/11909033</a><br/>Format:&#160;Electronic Resources<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:138161 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Vaudenay, Serge. author.<br/><a href="https://doi.org/10.1007/b136373">https://doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/> Grundkurs Codierung Verschl&uuml;sselung, Kompression, Fehlerbeseitigung ent://SD_ILS/0/SD_ILS:182929 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Dankmeier, Wilfried. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9009-2">https://doi.org/10.1007/978-3-8348-9009-2</a><br/>Format:&#160;Electronic Resources<br/> Digitale Fernsehtechnik in Theorie und Praxis MPEG-Basiscodierung, DVB-, DAB-, ATSC-&Uuml;bertragungstechnik, Messtechnik ent://SD_ILS/0/SD_ILS:186274 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Fischer, Walter. author.<br/><a href="https://doi.org/10.1007/3-540-29204-7">https://doi.org/10.1007/3-540-29204-7</a><br/>Format:&#160;Electronic Resources<br/> Construction and Analysis of Safe, Secure, and Interoperable Smart Devices International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:171383 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/b105030">https://doi.org/10.1007/b105030</a><br/>Format:&#160;Electronic Resources<br/> Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:171719 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Castelluccia, Claude. editor.<br/><a href="https://doi.org/10.1007/b105219">https://doi.org/10.1007/b105219</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-hoc and Sensor Networks First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings ent://SD_ILS/0/SD_ILS:171466 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Jia, Xiaohua. editor.<br/><a href="https://doi.org/10.1007/11599463">https://doi.org/10.1007/11599463</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:172123 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Molva, Refik. editor.<br/><a href="https://doi.org/10.1007/11601494">https://doi.org/10.1007/11601494</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science - ASIAN 2004, Higher Level Decision Making 9th Asian Computing Science Conference. Dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand, December 8-10, 2004 ent://SD_ILS/0/SD_ILS:151008 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Maher, Michael J. editor.<br/><a href="https://doi.org/10.1007/b103476">https://doi.org/10.1007/b103476</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms Design and Applications ent://SD_ILS/0/SD_ILS:152120 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Smith, Sean W. author.<br/><a href="https://doi.org/10.1007/b103637">https://doi.org/10.1007/b103637</a><br/>Format:&#160;Electronic Resources<br/> Computer Security in the 21st Century ent://SD_ILS/0/SD_ILS:152128 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Lee, D.T. editor.<br/><a href="https://doi.org/10.1007/b104203">https://doi.org/10.1007/b104203</a><br/>Format:&#160;Electronic Resources<br/> Security in E-Learning ent://SD_ILS/0/SD_ILS:152292 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Weippl, Edgar R. author.<br/><a href="https://doi.org/10.1007/b136702">https://doi.org/10.1007/b136702</a><br/>Format:&#160;Electronic Resources<br/> Information Processing and Security Systems ent://SD_ILS/0/SD_ILS:152322 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Saeed, Khalid. editor.<br/><a href="https://doi.org/10.1007/b137371">https://doi.org/10.1007/b137371</a><br/>Format:&#160;Electronic Resources<br/> Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) ent://SD_ILS/0/SD_ILS:152323 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Shoniregun, Charles A. author.<br/><a href="https://doi.org/10.1007/b137376">https://doi.org/10.1007/b137376</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005 ent://SD_ILS/0/SD_ILS:152716 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Pollitt, Mark. editor.<br/><a href="https://doi.org/10.1007/0-387-31163-7">https://doi.org/10.1007/0-387-31163-7</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:152074 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;van Tilborg, Henk C.A. editor.<br/><a href="https://doi.org/10.1007/0-387-23483-7">https://doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/> Certification and Security in Inter-Organizational E-Services IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France ent://SD_ILS/0/SD_ILS:142862 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Nardelli, Enrico. editor.<br/><a href="https://doi.org/10.1007/11397427">https://doi.org/10.1007/11397427</a><br/>Format:&#160;Electronic Resources<br/> Secure Group Communications Over Data Networks ent://SD_ILS/0/SD_ILS:139362 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Zou, Xukai. author.<br/><a href="https://doi.org/10.1007/b100182">https://doi.org/10.1007/b100182</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Encryption and Watermarking ent://SD_ILS/0/SD_ILS:139471 2025-02-15T05:18:19Z 2025-02-15T05:18:19Z by&#160;Furht, Borko. author.<br/><a href="https://doi.org/10.1007/b136785">https://doi.org/10.1007/b136785</a><br/>Format:&#160;Electronic Resources<br/>