Search Results for Computer engineering. - Narrowed by: Cryptology.SirsiDynix Enterprisehttp://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dComputer$002bengineering.$0026qf$003dSUBJECT$002509Konu$002509Cryptology.$002509Cryptology.$0026ps$003d300$0026isd$003dtrue?dt=list2025-02-15T05:18:19ZComputer Applications for Security, Control and System Engineering International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1432852025-02-15T05:18:19Z2025-02-15T05:18:19Zby Kim, Tai-hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35264-5">https://doi.org/10.1007/978-3-642-35264-5</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papersent://SD_ILS/0/SD_ILS:1661122025-02-15T05:18:19Z2025-02-15T05:18:19Zby Keromytis, Angelos D. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36883-7">https://doi.org/10.1007/978-3-642-36883-7</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1441452025-02-15T05:18:19Z2025-02-15T05:18:19Zby Zhi-zhong, Jun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36958-2">https://doi.org/10.1007/978-3-642-36958-2</a><br/>Format: Electronic Resources<br/>Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Confernce, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1626642025-02-15T05:18:19Z2025-02-15T05:18:19Zby Singh, Karan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37949-9">https://doi.org/10.1007/978-3-642-37949-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1393352025-02-15T05:18:19Z2025-02-15T05:18:19Zby Zia, Tanveer. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04283-1">https://doi.org/10.1007/978-3-319-04283-1</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks Third International ICST Conference, ADHOCNETS 2011, Paris, France, September 21-23, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1604832025-02-15T05:18:19Z2025-02-15T05:18:19Zby Simplot-Ryl, David. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29096-1">https://doi.org/10.1007/978-3-642-29096-1</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 7th International ICST Conference, SecureComm 2011, London, September 7-9, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1404932025-02-15T05:18:19Z2025-02-15T05:18:19Zby Rajarajan, Muttukrishnan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31909-9">https://doi.org/10.1007/978-3-642-31909-9</a><br/>Format: Electronic Resources<br/>Personal Satellite Services Second International ICST Conference, PSATS 2010, Rome, Italy, February 4-5, 2010. Revised Selected Papersent://SD_ILS/0/SD_ILS:1500042025-02-15T05:18:19Z2025-02-15T05:18:19Zby Sithamparanathan, Kandeepan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13618-4">https://doi.org/10.1007/978-3-642-13618-4</a><br/>Format: Electronic Resources<br/>Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1509032025-02-15T05:18:19Z2025-02-15T05:18:19Zby Gu, Qijun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11526-4">https://doi.org/10.1007/978-3-642-11526-4</a><br/>Format: Electronic Resources<br/>Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1466872025-02-15T05:18:19Z2025-02-15T05:18:19Zby Schmidt, Andreas U. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17502-2">https://doi.org/10.1007/978-3-642-17502-2</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks Second International Conference, ADHOCNETS 2010, Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1456152025-02-15T05:18:19Z2025-02-15T05:18:19Zby Zhi-zhong, Jun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17994-5">https://doi.org/10.1007/978-3-642-17994-5</a><br/>Format: Electronic Resources<br/>Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1579412025-02-15T05:18:19Z2025-02-15T05:18:19Zby Weerasinghe, Dasun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11530-1">https://doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Electronic Resources<br/>Quantum Communication and Quantum Networking First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1575362025-02-15T05:18:19Z2025-02-15T05:18:19Zby Sergienko, Alexander. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11731-2">https://doi.org/10.1007/978-3-642-11731-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1395302025-02-15T05:18:19Z2025-02-15T05:18:19Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16161-2">https://doi.org/10.1007/978-3-642-16161-2</a><br/>Format: Electronic Resources<br/>Personal Satellite Services International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1497022025-02-15T05:18:19Z2025-02-15T05:18:19Zby Sithamparanathan, Kandeepan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04260-7">https://doi.org/10.1007/978-3-642-04260-7</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1680662025-02-15T05:18:19Z2025-02-15T05:18:19Zby Chen, Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-05284-2">https://doi.org/10.1007/978-3-642-05284-2</a><br/>Format: Electronic Resources<br/>Forensics in Telecommunications, Information and Multimedia Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1393942025-02-15T05:18:19Z2025-02-15T05:18:19Zby Sorell, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02312-5">https://doi.org/10.1007/978-3-642-02312-5</a><br/>Format: Electronic Resources<br/>Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1438042025-02-15T05:18:19Z2025-02-15T05:18:19Zby Lian, Shiguo. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04434-2">https://doi.org/10.1007/978-3-642-04434-2</a><br/>Format: Electronic Resources<br/>Privacy, Security and Trust within the Context of Pervasive Computingent://SD_ILS/0/SD_ILS:1520692025-02-15T05:18:19Z2025-02-15T05:18:19Zby Robinson, Philip. editor.<br/><a href="https://doi.org/10.1007/b101573">https://doi.org/10.1007/b101573</a><br/>Format: Electronic Resources<br/>Engineering Secure Future Internet Services and Systems Current Researchent://SD_ILS/0/SD_ILS:1698562025-02-15T05:18:19Z2025-02-15T05:18:19Zby Heisel, Maritta. editor.<br/><a href="https://doi.org/10.1007/978-3-319-07452-8">https://doi.org/10.1007/978-3-319-07452-8</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1723432025-02-15T05:18:19Z2025-02-15T05:18:19Zby Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-12778-1">https://doi.org/10.1007/978-3-319-12778-1</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1769542025-02-15T05:18:19Z2025-02-15T05:18:19Zby Naccache, David. editor.<br/><a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format: Electronic Resources<br/>Communication Networks for Smart Grids Making Smart Grid Realent://SD_ILS/0/SD_ILS:1751632025-02-15T05:18:19Z2025-02-15T05:18:19Zby Budka, Kenneth C. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6302-2">https://doi.org/10.1007/978-1-4471-6302-2</a><br/>Format: Electronic Resources<br/>Querying over Encrypted Data in Smart Gridsent://SD_ILS/0/SD_ILS:1513282025-02-15T05:18:19Z2025-02-15T05:18:19Zby Wen, Mi. author.<br/><a href="https://doi.org/10.1007/978-3-319-06355-3">https://doi.org/10.1007/978-3-319-06355-3</a><br/>Format: Electronic Resources<br/>Trusted Computing Platforms TPM2.0 in Contextent://SD_ILS/0/SD_ILS:1659642025-02-15T05:18:19Z2025-02-15T05:18:19Zby Proudler, Graeme. author.<br/><a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format: Electronic Resources<br/>Trustworthy Execution on Mobile Devicesent://SD_ILS/0/SD_ILS:1470102025-02-15T05:18:19Z2025-02-15T05:18:19Zby Vasudevan, Amit. author.<br/><a href="https://doi.org/10.1007/978-1-4614-8190-4">https://doi.org/10.1007/978-1-4614-8190-4</a><br/>Format: Electronic Resources<br/>Dynamic Secrets in Communication Securityent://SD_ILS/0/SD_ILS:1612502025-02-15T05:18:19Z2025-02-15T05:18:19Zby Xiao, Sheng. author.<br/><a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format: Electronic Resources<br/>Security, Privacy and Trust in Cloud Systemsent://SD_ILS/0/SD_ILS:1577322025-02-15T05:18:19Z2025-02-15T05:18:19Zby Nepal, Surya. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format: Electronic Resources<br/>The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Valueent://SD_ILS/0/SD_ILS:1378582025-02-15T05:18:19Z2025-02-15T05:18:19Zby Dennedy, Michelle. author.<br/><a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format: Electronic Resources<br/>Security and Privacy for Implantable Medical Devicesent://SD_ILS/0/SD_ILS:1384382025-02-15T05:18:19Z2025-02-15T05:18:19Zby Burleson, Wayne. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-1674-6">https://doi.org/10.1007/978-1-4614-1674-6</a><br/>Format: Electronic Resources<br/>Network Science and Cybersecurityent://SD_ILS/0/SD_ILS:1393062025-02-15T05:18:19Z2025-02-15T05:18:19Zby Pino, Robinson E. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedingsent://SD_ILS/0/SD_ILS:1433142025-02-15T05:18:19Z2025-02-15T05:18:19Zby Chakraborty, Rajat Subhra. editor.<br/><a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:1355812025-02-15T05:18:19Z2025-02-15T05:18:19Zby Jürjens, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04897-0">https://doi.org/10.1007/978-3-319-04897-0</a><br/>Format: Electronic Resources<br/>Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engineent://SD_ILS/0/SD_ILS:1378412025-02-15T05:18:19Z2025-02-15T05:18:19Zby Ruan, Xiaoyu. author.<br/><a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format: Electronic Resources<br/>Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1704802025-02-15T05:18:19Z2025-02-15T05:18:19Zby Accorsi, Rafael. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41098-7">https://doi.org/10.1007/978-3-642-41098-7</a><br/>Format: Electronic Resources<br/>Advanced Infocomm Technology 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected papersent://SD_ILS/0/SD_ILS:1703532025-02-15T05:18:19Z2025-02-15T05:18:19Zby Guyot, Vincent. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38227-7">https://doi.org/10.1007/978-3-642-38227-7</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1719252025-02-15T05:18:19Z2025-02-15T05:18:19Zby Palamidessi, Catuscia. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41157-1">https://doi.org/10.1007/978-3-642-41157-1</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1716512025-02-15T05:18:19Z2025-02-15T05:18:19Zby Gierlichs, Benedikt. editor. (orcid)0000-0002-5866-1990<br/><a href="https://doi.org/10.1007/978-3-642-41224-0">https://doi.org/10.1007/978-3-642-41224-0</a><br/>Format: Electronic Resources<br/>Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1727102025-02-15T05:18:19Z2025-02-15T05:18:19Zby Doyen, Guillaume. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38998-6">https://doi.org/10.1007/978-3-642-38998-6</a><br/>Format: Electronic Resources<br/>Wireless Network Security Theories and Applicationsent://SD_ILS/0/SD_ILS:1755382025-02-15T05:18:19Z2025-02-15T05:18:19Zby Chen, Lei. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36511-9">https://doi.org/10.1007/978-3-642-36511-9</a><br/>Format: Electronic Resources<br/>Security Assessment in Vehicular Networksent://SD_ILS/0/SD_ILS:1470622025-02-15T05:18:19Z2025-02-15T05:18:19Zby Du, Suguo. author.<br/><a href="https://doi.org/10.1007/978-1-4614-9357-0">https://doi.org/10.1007/978-1-4614-9357-0</a><br/>Format: Electronic Resources<br/>Intrusion Detection for IP-Based Multimedia Communications over Wireless Networksent://SD_ILS/0/SD_ILS:1480652025-02-15T05:18:19Z2025-02-15T05:18:19Zby Tang, Jin. author.<br/><a href="https://doi.org/10.1007/978-1-4614-8996-2">https://doi.org/10.1007/978-1-4614-8996-2</a><br/>Format: Electronic Resources<br/>Moving Target Defense II Application of Game Theory and Adversarial Modelingent://SD_ILS/0/SD_ILS:1668242025-02-15T05:18:19Z2025-02-15T05:18:19Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-5416-8">https://doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Electronic Resources<br/>Security Engineering and Intelligence Informatics CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1694822025-02-15T05:18:19Z2025-02-15T05:18:19Zby Cuzzocrea, Alfredo. editor. (orcid)0000-0002-7104-6415<br/><a href="https://doi.org/10.1007/978-3-642-40588-4">https://doi.org/10.1007/978-3-642-40588-4</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1695762025-02-15T05:18:19Z2025-02-15T05:18:19Zby Mangard, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37288-9">https://doi.org/10.1007/978-3-642-37288-9</a><br/>Format: Electronic Resources<br/>Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1441912025-02-15T05:18:19Z2025-02-15T05:18:19Zby Yuan, Yuyu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35795-4">https://doi.org/10.1007/978-3-642-35795-4</a><br/>Format: Electronic Resources<br/>Location Privacy Protection in Mobile Networksent://SD_ILS/0/SD_ILS:1399122025-02-15T05:18:19Z2025-02-15T05:18:19Zby Liu, Xinxin. author.<br/><a href="https://doi.org/10.1007/978-1-4614-9074-6">https://doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1357142025-02-15T05:18:19Z2025-02-15T05:18:19Zby Jürjens, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36563-8">https://doi.org/10.1007/978-3-642-36563-8</a><br/>Format: Electronic Resources<br/>Netzwerk- und Datensicherheit Eine praktische Einführungent://SD_ILS/0/SD_ILS:1887702025-02-15T05:18:19Z2025-02-15T05:18:19Zby Kappes, Martin. author.<br/><a href="https://doi.org/10.1007/978-3-8348-8612-5">https://doi.org/10.1007/978-3-8348-8612-5</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1708932025-02-15T05:18:19Z2025-02-15T05:18:19Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-642-28166-2">https://doi.org/10.1007/978-3-642-28166-2</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1712782025-02-15T05:18:19Z2025-02-15T05:18:19Zby Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/><a href="https://doi.org/10.1007/978-3-642-27901-0">https://doi.org/10.1007/978-3-642-27901-0</a><br/>Format: Electronic Resources<br/>Security and Intelligent Information Systems International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1699272025-02-15T05:18:19Z2025-02-15T05:18:19Zby Bouvry, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25261-7">https://doi.org/10.1007/978-3-642-25261-7</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1709012025-02-15T05:18:19Z2025-02-15T05:18:19Zby Bogdanov, Andrey. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34416-9">https://doi.org/10.1007/978-3-642-34416-9</a><br/>Format: Electronic Resources<br/>Theory of Security and Applications Joint Workshop, TOSCA 2011, Saarbrücken, Germany,March 31-April 1, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1722072025-02-15T05:18:19Z2025-02-15T05:18:19Zby Moedersheim, Sebastian. editor.<br/><a href="https://doi.org/10.1007/978-3-642-27375-9">https://doi.org/10.1007/978-3-642-27375-9</a><br/>Format: Electronic Resources<br/>NETWORKING 2012 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part IIent://SD_ILS/0/SD_ILS:1717372025-02-15T05:18:19Z2025-02-15T05:18:19Zby Bestak, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30054-7">https://doi.org/10.1007/978-3-642-30054-7</a><br/>Format: Electronic Resources<br/>Android Apps Securityent://SD_ILS/0/SD_ILS:1564012025-02-15T05:18:19Z2025-02-15T05:18:19Zby Gunasekera, Sheran. author.<br/><a href="https://doi.org/10.1007/978-1-4302-4063-1">https://doi.org/10.1007/978-1-4302-4063-1</a><br/>Format: Electronic Resources<br/>NETWORKING 2012 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part Ient://SD_ILS/0/SD_ILS:1756912025-02-15T05:18:19Z2025-02-15T05:18:19Zby Bestak, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30045-5">https://doi.org/10.1007/978-3-642-30045-5</a><br/>Format: Electronic Resources<br/>Multiple Access Communications 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1754502025-02-15T05:18:19Z2025-02-15T05:18:19Zby Bellalta, Boris. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34976-8">https://doi.org/10.1007/978-3-642-34976-8</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1476702025-02-15T05:18:19Z2025-02-15T05:18:19Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33167-1">https://doi.org/10.1007/978-3-642-33167-1</a><br/>Format: Electronic Resources<br/>Research in Cryptology 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1483652025-02-15T05:18:19Z2025-02-15T05:18:19Zby Armknecht, Frederik. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34159-5">https://doi.org/10.1007/978-3-642-34159-5</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papersent://SD_ILS/0/SD_ILS:1455972025-02-15T05:18:19Z2025-02-15T05:18:19Zby Bruni, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30065-3">https://doi.org/10.1007/978-3-642-30065-3</a><br/>Format: Electronic Resources<br/>Advances in Information Technology 5th International Conference, IAIT 2012, Bangkok, Thailand, December 6-7, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1412092025-02-15T05:18:19Z2025-02-15T05:18:19Zby Papasratorn, Borworn. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35076-4">https://doi.org/10.1007/978-3-642-35076-4</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1704092025-02-15T05:18:19Z2025-02-15T05:18:19Zby Prouff, Emmanuel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-27257-8">https://doi.org/10.1007/978-3-642-27257-8</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1712502025-02-15T05:18:19Z2025-02-15T05:18:19Zby Erlingsson, Úlfar. editor.<br/><a href="https://doi.org/10.1007/978-3-642-19125-1">https://doi.org/10.1007/978-3-642-19125-1</a><br/>Format: Electronic Resources<br/>Multiple Access Communications 4th International Workshop, MACOM 2011, Trento, Italy, September 12-13, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1719532025-02-15T05:18:19Z2025-02-15T05:18:19Zby Sacchi, Claudio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23795-9">https://doi.org/10.1007/978-3-642-23795-9</a><br/>Format: Electronic Resources<br/>NETWORKING 2011 Workshops International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, Valencia, Spain, May 13, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1722212025-02-15T05:18:19Z2025-02-15T05:18:19Zby Casares-Giner, Vicente. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23041-7">https://doi.org/10.1007/978-3-642-23041-7</a><br/>Format: Electronic Resources<br/>Spyware and Adwareent://SD_ILS/0/SD_ILS:1539872025-02-15T05:18:19Z2025-02-15T05:18:19Zby Aycock, John. author.<br/><a href="https://doi.org/10.1007/978-0-387-77741-2">https://doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Secure and Trust Computing, Data Management, and Applications 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings, Part Ient://SD_ILS/0/SD_ILS:1747002025-02-15T05:18:19Z2025-02-15T05:18:19Zby Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-22339-6">https://doi.org/10.1007/978-3-642-22339-6</a><br/>Format: Electronic Resources<br/>Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1485072025-02-15T05:18:19Z2025-02-15T05:18:19Zby Kim, Tai-Hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23141-4">https://doi.org/10.1007/978-3-642-23141-4</a><br/>Format: Electronic Resources<br/>NETWORKING 2011 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part Ient://SD_ILS/0/SD_ILS:1694652025-02-15T05:18:19Z2025-02-15T05:18:19Zby Domingo-Pascual, Jordi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-20757-0">https://doi.org/10.1007/978-3-642-20757-0</a><br/>Format: Electronic Resources<br/>Advances in Network Security and Applications 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1636272025-02-15T05:18:19Z2025-02-15T05:18:19Zby Wyld, David C. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22540-6">https://doi.org/10.1007/978-3-642-22540-6</a><br/>Format: Electronic Resources<br/>Smart Spaces and Next Generation Wired/Wireless Networking 11th International Conference, NEW2AN 2011 and 4th Conference on Smart Spaces, RuSMART 2011, St. Petersburg, Russia, August 22-15, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1400452025-02-15T05:18:19Z2025-02-15T05:18:19Zby Balandin, Sergey. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22875-9">https://doi.org/10.1007/978-3-642-22875-9</a><br/>Format: Electronic Resources<br/>Identity-Based Encryptionent://SD_ILS/0/SD_ILS:1421442025-02-15T05:18:19Z2025-02-15T05:18:19Zby Chatterjee, Sanjit. author.<br/><a href="https://doi.org/10.1007/978-1-4419-9383-0">https://doi.org/10.1007/978-1-4419-9383-0</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1350052025-02-15T05:18:19Z2025-02-15T05:18:19Zby Alcaraz Calero, Jose M. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23496-5">https://doi.org/10.1007/978-3-642-23496-5</a><br/>Format: Electronic Resources<br/>NETWORKING 2011 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part IIent://SD_ILS/0/SD_ILS:1357092025-02-15T05:18:19Z2025-02-15T05:18:19Zby Domingo-Pascual, Jordi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-20798-3">https://doi.org/10.1007/978-3-642-20798-3</a><br/>Format: Electronic Resources<br/>Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1701182025-02-15T05:18:19Z2025-02-15T05:18:19Zby Armando, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16074-5">https://doi.org/10.1007/978-3-642-16074-5</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1701722025-02-15T05:18:19Z2025-02-15T05:18:19Zby Sion, Radu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-14992-4">https://doi.org/10.1007/978-3-642-14992-4</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1699622025-02-15T05:18:19Z2025-02-15T05:18:19Zby MASSACCI, Fabio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11747-3">https://doi.org/10.1007/978-3-642-11747-3</a><br/>Format: Electronic Resources<br/>NETWORKING 2010 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1722752025-02-15T05:18:19Z2025-02-15T05:18:19Zby Crovella, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12963-6">https://doi.org/10.1007/978-3-642-12963-6</a><br/>Format: Electronic Resources<br/>Digital Signaturesent://SD_ILS/0/SD_ILS:1524332025-02-15T05:18:19Z2025-02-15T05:18:19Zby Katz, Jonathan. author.<br/><a href="https://doi.org/10.1007/978-0-387-27712-7">https://doi.org/10.1007/978-0-387-27712-7</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection and Prevention Concepts and Techniquesent://SD_ILS/0/SD_ILS:1542482025-02-15T05:18:19Z2025-02-15T05:18:19Zby Ghorbani, Ali A. author.<br/><a href="https://doi.org/10.1007/978-0-387-88771-5">https://doi.org/10.1007/978-0-387-88771-5</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1723462025-02-15T05:18:19Z2025-02-15T05:18:19Zby Kant, Krishna. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11322-2">https://doi.org/10.1007/978-3-642-11322-2</a><br/>Format: Electronic Resources<br/>Collaborative Networks for a Sustainable World 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1504142025-02-15T05:18:19Z2025-02-15T05:18:19Zby Camarinha-Matos, Luis M. editor.<br/><a href="https://doi.org/10.1007/978-3-642-15961-9">https://doi.org/10.1007/978-3-642-15961-9</a><br/>Format: Electronic Resources<br/>Networked Services and Applications - Engineering, Control and Management 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1506932025-02-15T05:18:19Z2025-02-15T05:18:19Zby Aagesen, Finn Arve. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13971-0">https://doi.org/10.1007/978-3-642-13971-0</a><br/>Format: Electronic Resources<br/>Recent Trends in Network Security and Applications Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 Proceedingsent://SD_ILS/0/SD_ILS:1506232025-02-15T05:18:19Z2025-02-15T05:18:19Zby Meghanathan, Natarajan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-14478-3">https://doi.org/10.1007/978-3-642-14478-3</a><br/>Format: Electronic Resources<br/>Advances in Information Technology 4th International Conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1684482025-02-15T05:18:19Z2025-02-15T05:18:19Zby Papasratorn, Borworn. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16699-0">https://doi.org/10.1007/978-3-642-16699-0</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1709932025-02-15T05:18:19Z2025-02-15T05:18:19Zby Wirsing, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-642-15640-3">https://doi.org/10.1007/978-3-642-15640-3</a><br/>Format: Electronic Resources<br/>Ethical and Social Issues in the Information Ageent://SD_ILS/0/SD_ILS:1439012025-02-15T05:18:19Z2025-02-15T05:18:19Zby Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-1-84996-038-0">https://doi.org/10.1007/978-1-84996-038-0</a><br/>Format: Electronic Resources<br/>Pro PHP Security From Application Security Principles to the Implementation of XSS Defensesent://SD_ILS/0/SD_ILS:1443912025-02-15T05:18:19Z2025-02-15T05:18:19Zby Snyder, Chris. author.<br/><a href="https://doi.org/10.1007/978-1-4302-3319-0">https://doi.org/10.1007/978-1-4302-3319-0</a><br/>Format: Electronic Resources<br/>Trust Management IV 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1625302025-02-15T05:18:19Z2025-02-15T05:18:19Zby Nishigaki, Masakatsu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13446-3">https://doi.org/10.1007/978-3-642-13446-3</a><br/>Format: Electronic Resources<br/>Applied Quantum Cryptographyent://SD_ILS/0/SD_ILS:1583202025-02-15T05:18:19Z2025-02-15T05:18:19Zby Kollmitzer, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04831-9">https://doi.org/10.1007/978-3-642-04831-9</a><br/>Format: Electronic Resources<br/>Securing Wireless Communications at the Physical Layerent://SD_ILS/0/SD_ILS:1380212025-02-15T05:18:19Z2025-02-15T05:18:19Zby Liu, Ruoheng. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-1385-2">https://doi.org/10.1007/978-1-4419-1385-2</a><br/>Format: Electronic Resources<br/>Open Source Software for Digital Forensicsent://SD_ILS/0/SD_ILS:1382272025-02-15T05:18:19Z2025-02-15T05:18:19Zby Huebner, Ewa. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-5803-7">https://doi.org/10.1007/978-1-4419-5803-7</a><br/>Format: Electronic Resources<br/>Insider Threats in Cyber Securityent://SD_ILS/0/SD_ILS:1384042025-02-15T05:18:19Z2025-02-15T05:18:19Zby Probst, Christian W. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-7133-3">https://doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1405452025-02-15T05:18:19Z2025-02-15T05:18:19Zby Xie, Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16576-4">https://doi.org/10.1007/978-3-642-16576-4</a><br/>Format: Electronic Resources<br/>Information Systems, Technology and Management 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1426122025-02-15T05:18:19Z2025-02-15T05:18:19Zby Prasad, Sushil K. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12035-0">https://doi.org/10.1007/978-3-642-12035-0</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science X Special Issue on Security in Computing, Part Ient://SD_ILS/0/SD_ILS:1351832025-02-15T05:18:19Z2025-02-15T05:18:19Zby Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17499-5">https://doi.org/10.1007/978-3-642-17499-5</a><br/>Format: Electronic Resources<br/>Digitale Fernseh- und Hörfunktechnik in Theorie und Praxis MPEG-Basisbandcodierung, DVB-, DAB-, ATSC-, ISDB-T-Übertragungstechnik, Messtechnikent://SD_ILS/0/SD_ILS:1856982025-02-15T05:18:19Z2025-02-15T05:18:19Zby Fischer, Walter. author.<br/><a href="https://doi.org/10.1007/978-3-642-15047-0">https://doi.org/10.1007/978-3-642-15047-0</a><br/>Format: Electronic Resources<br/>Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1724862025-02-15T05:18:19Z2025-02-15T05:18:19Zby Park, James (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-02617-1">https://doi.org/10.1007/978-3-642-02617-1</a><br/>Format: Electronic Resources<br/>Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1696632025-02-15T05:18:19Z2025-02-15T05:18:19Zby Degano, Pierpaolo. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03459-6">https://doi.org/10.1007/978-3-642-03459-6</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1701432025-02-15T05:18:19Z2025-02-15T05:18:19Zby González Nieto, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02704-8">https://doi.org/10.1007/978-3-642-02704-8</a><br/>Format: Electronic Resources<br/>Trusted Computing Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1726982025-02-15T05:18:19Z2025-02-15T05:18:19Zby Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00587-9">https://doi.org/10.1007/978-3-642-00587-9</a><br/>Format: Electronic Resources<br/>Secure Multi-Party Non-Repudiation Protocols and Applicationsent://SD_ILS/0/SD_ILS:1538202025-02-15T05:18:19Z2025-02-15T05:18:19Zby Onieva, José A. author.<br/><a href="https://doi.org/10.1007/978-0-387-75630-1">https://doi.org/10.1007/978-0-387-75630-1</a><br/>Format: Electronic Resources<br/>Cryptographic Engineeringent://SD_ILS/0/SD_ILS:1535442025-02-15T05:18:19Z2025-02-15T05:18:19Zby Koc, Cetin Kaya. editor.<br/><a href="https://doi.org/10.1007/978-0-387-71817-0">https://doi.org/10.1007/978-0-387-71817-0</a><br/>Format: Electronic Resources<br/>Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1756472025-02-15T05:18:19Z2025-02-15T05:18:19Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04062-7">https://doi.org/10.1007/978-3-642-04062-7</a><br/>Format: Electronic Resources<br/>Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1479752025-02-15T05:18:19Z2025-02-15T05:18:19Zby Slezak, Dominik. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10847-1">https://doi.org/10.1007/978-3-642-10847-1</a><br/>Format: Electronic Resources<br/>Information Systems, Technology and Management Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1500022025-02-15T05:18:19Z2025-02-15T05:18:19Zby Prasad, Sushil K. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00405-6">https://doi.org/10.1007/978-3-642-00405-6</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1497422025-02-15T05:18:19Z2025-02-15T05:18:19Zby MASSACCI, Fabio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00199-4">https://doi.org/10.1007/978-3-642-00199-4</a><br/>Format: Electronic Resources<br/>Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1506192025-02-15T05:18:19Z2025-02-15T05:18:19Zby Park, James (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-02633-1">https://doi.org/10.1007/978-3-642-02633-1</a><br/>Format: Electronic Resources<br/>Smart Spaces and Next Generation Wired/Wireless Networking 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1709922025-02-15T05:18:19Z2025-02-15T05:18:19Zby Balandin, Sergey. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04190-7">https://doi.org/10.1007/978-3-642-04190-7</a><br/>Format: Electronic Resources<br/>Innovations in Digital Watermarking Techniquesent://SD_ILS/0/SD_ILS:1688962025-02-15T05:18:19Z2025-02-15T05:18:19Zby Wang, Feng-Hsing. author.<br/><a href="https://doi.org/10.1007/978-3-642-03187-8">https://doi.org/10.1007/978-3-642-03187-8</a><br/>Format: Electronic Resources<br/>Software and Data Technolgoies Third International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008ent://SD_ILS/0/SD_ILS:1435952025-02-15T05:18:19Z2025-02-15T05:18:19Zby Cordeiro, José. editor.<br/><a href="https://doi.org/10.1007/978-3-642-05201-9">https://doi.org/10.1007/978-3-642-05201-9</a><br/>Format: Electronic Resources<br/>Wireless and Mobile Networking Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1428702025-02-15T05:18:19Z2025-02-15T05:18:19Zby Wozniak, Jozef. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03841-9">https://doi.org/10.1007/978-3-642-03841-9</a><br/>Format: Electronic Resources<br/>Secure Data Management 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1459842025-02-15T05:18:19Z2025-02-15T05:18:19Zby Jonker, Willem. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04219-5">https://doi.org/10.1007/978-3-642-04219-5</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptographyent://SD_ILS/0/SD_ILS:1602792025-02-15T05:18:19Z2025-02-15T05:18:19Zby Bernstein, Daniel J. editor.<br/><a href="https://doi.org/10.1007/978-3-540-88702-7">https://doi.org/10.1007/978-3-540-88702-7</a><br/>Format: Electronic Resources<br/>Recent Advances in Multimedia Signal Processing and Communicationsent://SD_ILS/0/SD_ILS:1573612025-02-15T05:18:19Z2025-02-15T05:18:19Zby Grgic, Mislav. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02900-4">https://doi.org/10.1007/978-3-642-02900-4</a><br/>Format: Electronic Resources<br/>Identifying Malicious Code Through Reverse Engineeringent://SD_ILS/0/SD_ILS:1366762025-02-15T05:18:19Z2025-02-15T05:18:19Zby Singh, Abhishek. editor.<br/><a href="https://doi.org/10.1007/978-0-387-89468-3">https://doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Electronic Resources<br/>Open Source Systems Security Certificationent://SD_ILS/0/SD_ILS:1365882025-02-15T05:18:19Z2025-02-15T05:18:19Zby Damiani, Ernesto. author. (orcid)0000-0002-9557-6496<br/><a href="https://doi.org/10.1007/978-0-387-77324-7">https://doi.org/10.1007/978-0-387-77324-7</a><br/>Format: Electronic Resources<br/>Global Initiatives to Secure Cyberspace An Emerging Landscapeent://SD_ILS/0/SD_ILS:1360942025-02-15T05:18:19Z2025-02-15T05:18:19Zby Portnoy, Michael. editor.<br/><a href="https://doi.org/10.1007/978-0-387-09764-0">https://doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Electronic Resources<br/>Digitale Fernseh- und Hörfunktechnik in Theorie und Praxis MPEG-Basisbandcodierung, DVB-, DAB-, ATSC-, ISDB-T-Übertragungstechnik, Messtechnikent://SD_ILS/0/SD_ILS:1803362025-02-15T05:18:19Z2025-02-15T05:18:19Zby Fischer, Walter. author.<br/><a href="https://doi.org/10.1007/978-3-540-88195-7">https://doi.org/10.1007/978-3-540-88195-7</a><br/>Format: Electronic Resources<br/>Sichere Systeme Konzepte, Architekturen und Frameworksent://SD_ILS/0/SD_ILS:1807522025-02-15T05:18:19Z2025-02-15T05:18:19Zby Kriha, Walter. author.<br/><a href="https://doi.org/10.1007/978-3-540-78959-8">https://doi.org/10.1007/978-3-540-78959-8</a><br/>Format: Electronic Resources<br/>Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedingsent://SD_ILS/0/SD_ILS:1713612025-02-15T05:18:19Z2025-02-15T05:18:19Zby Lipp, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-540-68979-9">https://doi.org/10.1007/978-3-540-68979-9</a><br/>Format: Electronic Resources<br/>Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1516842025-02-15T05:18:19Z2025-02-15T05:18:19Zby Schulzrinne, Henning. editor.<br/><a href="https://doi.org/10.1007/978-3-540-89054-6">https://doi.org/10.1007/978-3-540-89054-6</a><br/>Format: Electronic Resources<br/>RFID Security Techniques, Protocols and System-On-Chip Designent://SD_ILS/0/SD_ILS:1538602025-02-15T05:18:19Z2025-02-15T05:18:19Zby Kitsos, Paris. editor.<br/><a href="https://doi.org/10.1007/978-0-387-76481-8">https://doi.org/10.1007/978-0-387-76481-8</a><br/>Format: Electronic Resources<br/>Vulnerability Analysis and Defense for the Internetent://SD_ILS/0/SD_ILS:1537402025-02-15T05:18:19Z2025-02-15T05:18:19Zby Singh, Abhishek. editor.<br/><a href="https://doi.org/10.1007/978-0-387-74390-5">https://doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Botnet Detection Countering the Largest Security Threatent://SD_ILS/0/SD_ILS:1533462025-02-15T05:18:19Z2025-02-15T05:18:19Zby Lee, Wenke. editor.<br/><a href="https://doi.org/10.1007/978-0-387-68768-1">https://doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Network-Aware Security for Group Communicationsent://SD_ILS/0/SD_ILS:1533542025-02-15T05:18:19Z2025-02-15T05:18:19Zby Sun, Yan. author.<br/><a href="https://doi.org/10.1007/978-0-387-68848-0">https://doi.org/10.1007/978-0-387-68848-0</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:1535722025-02-15T05:18:19Z2025-02-15T05:18:19Zby Mayes, Keith. editor.<br/><a href="https://doi.org/10.1007/978-0-387-72198-9">https://doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Insider Attack and Cyber Security Beyond the Hackerent://SD_ILS/0/SD_ILS:1539432025-02-15T05:18:19Z2025-02-15T05:18:19Zby Stolfo, Salvatore J. editor.<br/><a href="https://doi.org/10.1007/978-0-387-77322-3">https://doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Network and Parallel Computing IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedingsent://SD_ILS/0/SD_ILS:1754102025-02-15T05:18:19Z2025-02-15T05:18:19Zby Cao, Jian. editor.<br/><a href="https://doi.org/10.1007/978-3-540-88140-7">https://doi.org/10.1007/978-3-540-88140-7</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Techniques and Applicationsent://SD_ILS/0/SD_ILS:1477162025-02-15T05:18:19Z2025-02-15T05:18:19Zby Chen, Hsinchun. editor.<br/><a href="https://doi.org/10.1007/978-3-540-69209-6">https://doi.org/10.1007/978-3-540-69209-6</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedingsent://SD_ILS/0/SD_ILS:1492982025-02-15T05:18:19Z2025-02-15T05:18:19Zby Rong, Chunming. editor.<br/><a href="https://doi.org/10.1007/978-3-540-69295-9">https://doi.org/10.1007/978-3-540-69295-9</a><br/>Format: Electronic Resources<br/>Research in Cryptology Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:1464252025-02-15T05:18:19Z2025-02-15T05:18:19Zby Lucks, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-540-88353-1">https://doi.org/10.1007/978-3-540-88353-1</a><br/>Format: Electronic Resources<br/>Security for Telecommunications Networksent://SD_ILS/0/SD_ILS:1465612025-02-15T05:18:19Z2025-02-15T05:18:19Zby Traynor, Patrick. author.<br/><a href="https://doi.org/10.1007/978-0-387-72442-3">https://doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>RFID Security and Privacy Concepts, Protocols, and Architecturesent://SD_ILS/0/SD_ILS:1616872025-02-15T05:18:19Z2025-02-15T05:18:19Zby Henrici, Dirk. author.<br/><a href="https://doi.org/10.1007/978-3-540-79076-1">https://doi.org/10.1007/978-3-540-79076-1</a><br/>Format: Electronic Resources<br/>Intrusion Detection Systemsent://SD_ILS/0/SD_ILS:1413682025-02-15T05:18:19Z2025-02-15T05:18:19Zby Di Pietro, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-0-387-77265-3">https://doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Kryptographie und IT-Sicherheit Grundlagen und Anwendungenent://SD_ILS/0/SD_ILS:1802532025-02-15T05:18:19Z2025-02-15T05:18:19Zby Swoboda, Jochim. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9473-1">https://doi.org/10.1007/978-3-8348-9473-1</a><br/>Format: Electronic Resources<br/>Internet-Security aus Software-Sicht Grundlagen der Software-Erstellung für sicherheitskritische Bereicheent://SD_ILS/0/SD_ILS:1807892025-02-15T05:18:19Z2025-02-15T05:18:19Zby Kriha, Walter. author.<br/><a href="https://doi.org/10.1007/978-3-540-68906-5">https://doi.org/10.1007/978-3-540-68906-5</a><br/>Format: Electronic Resources<br/>Mobile Ad-hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedingsent://SD_ILS/0/SD_ILS:1709412025-02-15T05:18:19Z2025-02-15T05:18:19Zby Zhang, Hongke. editor.<br/><a href="https://doi.org/10.1007/978-3-540-77024-4">https://doi.org/10.1007/978-3-540-77024-4</a><br/>Format: Electronic Resources<br/>Embedded Java Security Security for Mobile Devicesent://SD_ILS/0/SD_ILS:1727142025-02-15T05:18:19Z2025-02-15T05:18:19Zby Debbabi, Mourad. author.<br/><a href="https://doi.org/10.1007/978-1-84628-711-4">https://doi.org/10.1007/978-1-84628-711-4</a><br/>Format: Electronic Resources<br/>Wireless Network Securityent://SD_ILS/0/SD_ILS:1528012025-02-15T05:18:19Z2025-02-15T05:18:19Zby Xiao, Yang. editor.<br/><a href="https://doi.org/10.1007/978-0-387-33112-6">https://doi.org/10.1007/978-0-387-33112-6</a><br/>Format: Electronic Resources<br/>Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networksent://SD_ILS/0/SD_ILS:1531232025-02-15T05:18:19Z2025-02-15T05:18:19Zby Poovendran, Radha. editor. (orcid)0000-0003-0269-8097<br/><a href="https://doi.org/10.1007/978-0-387-46276-9">https://doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Power Analysis Attacks Revealing the Secrets of Smart Cardsent://SD_ILS/0/SD_ILS:1530432025-02-15T05:18:19Z2025-02-15T05:18:19Zby Mangard, Stefan. author.<br/><a href="https://doi.org/10.1007/978-0-387-38162-6">https://doi.org/10.1007/978-0-387-38162-6</a><br/>Format: Electronic Resources<br/>Security for Wireless Sensor Networksent://SD_ILS/0/SD_ILS:1531342025-02-15T05:18:19Z2025-02-15T05:18:19Zby Liu, Donggang. author.<br/><a href="https://doi.org/10.1007/978-0-387-46781-8">https://doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Privacy-Respecting Intrusion Detectionent://SD_ILS/0/SD_ILS:1532912025-02-15T05:18:19Z2025-02-15T05:18:19Zby Flegel, Ulrich. author.<br/><a href="https://doi.org/10.1007/978-0-387-68254-9">https://doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Practical Internet Securityent://SD_ILS/0/SD_ILS:1526262025-02-15T05:18:19Z2025-02-15T05:18:19Zby Vacca, John R. author.<br/><a href="https://doi.org/10.1007/978-0-387-29844-3">https://doi.org/10.1007/978-0-387-29844-3</a><br/>Format: Electronic Resources<br/>Public Key Cryptography - PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedingsent://SD_ILS/0/SD_ILS:1723472025-02-15T05:18:19Z2025-02-15T05:18:19Zby Okamoto, Tatsuaki. editor.<br/><a href="https://doi.org/10.1007/978-3-540-71677-8">https://doi.org/10.1007/978-3-540-71677-8</a><br/>Format: Electronic Resources<br/>Forensic Computingent://SD_ILS/0/SD_ILS:1757272025-02-15T05:18:19Z2025-02-15T05:18:19Zby Sammes, Anthony. author.<br/><a href="https://doi.org/10.1007/978-1-84628-732-9">https://doi.org/10.1007/978-1-84628-732-9</a><br/>Format: Electronic Resources<br/>TErrestrial Trunked RAdio - TETRA A Global Security Toolent://SD_ILS/0/SD_ILS:1667362025-02-15T05:18:19Z2025-02-15T05:18:19Zby Stavroulakis, Peter. author.<br/><a href="https://doi.org/10.1007/3-540-71192-9">https://doi.org/10.1007/3-540-71192-9</a><br/>Format: Electronic Resources<br/>Malware Detectionent://SD_ILS/0/SD_ILS:1363932025-02-15T05:18:19Z2025-02-15T05:18:19Zby Christodorescu, Mihai. editor.<br/><a href="https://doi.org/10.1007/978-0-387-44599-1">https://doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedingsent://SD_ILS/0/SD_ILS:1400482025-02-15T05:18:19Z2025-02-15T05:18:19Zby Xiao, Bin. editor.<br/><a href="https://doi.org/10.1007/978-3-540-73547-2">https://doi.org/10.1007/978-3-540-73547-2</a><br/>Format: Electronic Resources<br/>Network Security Policies and Proceduresent://SD_ILS/0/SD_ILS:1438692025-02-15T05:18:19Z2025-02-15T05:18:19Zby Frye, Douglas W. author.<br/><a href="https://doi.org/10.1007/978-0-387-47955-2">https://doi.org/10.1007/978-0-387-47955-2</a><br/>Format: Electronic Resources<br/>Synchronizing Internet Protocol Security (SIPSec)ent://SD_ILS/0/SD_ILS:1438742025-02-15T05:18:19Z2025-02-15T05:18:19Zby Shoniregun, Charles A. author.<br/><a href="https://doi.org/10.1007/978-0-387-68569-4">https://doi.org/10.1007/978-0-387-68569-4</a><br/>Format: Electronic Resources<br/>Mobile Ad-hoc and Sensor Networks Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedingsent://SD_ILS/0/SD_ILS:1706382025-02-15T05:18:19Z2025-02-15T05:18:19Zby Cao, Jiannong. editor.<br/><a href="https://doi.org/10.1007/11943952">https://doi.org/10.1007/11943952</a><br/>Format: Electronic Resources<br/>Security in Pervasive Computing Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedingsent://SD_ILS/0/SD_ILS:1722832025-02-15T05:18:19Z2025-02-15T05:18:19Zby Clark, John A. editor.<br/><a href="https://doi.org/10.1007/11734666">https://doi.org/10.1007/11734666</a><br/>Format: Electronic Resources<br/>Hop Integrity in the Internetent://SD_ILS/0/SD_ILS:1508682025-02-15T05:18:19Z2025-02-15T05:18:19Zby Huang, Chin-Tser. author.<br/><a href="https://doi.org/10.1007/0-387-29444-9">https://doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>CryptoGraphics Exploiting Graphics Cards For Securityent://SD_ILS/0/SD_ILS:1528762025-02-15T05:18:19Z2025-02-15T05:18:19Zby Cook, Debra. author.<br/><a href="https://doi.org/10.1007/0-387-34189-7">https://doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>Quality Of Protection Security Measurements and Metricsent://SD_ILS/0/SD_ILS:1529882025-02-15T05:18:19Z2025-02-15T05:18:19Zby Gollmann, Dieter. editor.<br/><a href="https://doi.org/10.1007/978-0-387-36584-8">https://doi.org/10.1007/978-0-387-36584-8</a><br/>Format: Electronic Resources<br/>Guide to Wireless Network Securityent://SD_ILS/0/SD_ILS:1526272025-02-15T05:18:19Z2025-02-15T05:18:19Zby Vacca, John R. author.<br/><a href="https://doi.org/10.1007/978-0-387-29845-0">https://doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006ent://SD_ILS/0/SD_ILS:1470352025-02-15T05:18:19Z2025-02-15T05:18:19Zby Yang, Laurence T. editor.<br/><a href="https://doi.org/10.1007/11839569">https://doi.org/10.1007/11839569</a><br/>Format: Electronic Resources<br/>Secure Mobile Ad-hoc Networks and Sensors First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:1476852025-02-15T05:18:19Z2025-02-15T05:18:19Zby Burmester, Mike. editor.<br/><a href="https://doi.org/10.1007/11801412">https://doi.org/10.1007/11801412</a><br/>Format: Electronic Resources<br/>Embedded Security in Cars Securing Current and Future Automotive IT Applicationsent://SD_ILS/0/SD_ILS:1694352025-02-15T05:18:19Z2025-02-15T05:18:19Zby Lemke, Kerstin. editor.<br/><a href="https://doi.org/10.1007/3-540-28428-1">https://doi.org/10.1007/3-540-28428-1</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedingsent://SD_ILS/0/SD_ILS:1465602025-02-15T05:18:19Z2025-02-15T05:18:19Zby Leitold, Herbert. editor.<br/><a href="https://doi.org/10.1007/11909033">https://doi.org/10.1007/11909033</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Applications for Communications Securityent://SD_ILS/0/SD_ILS:1381612025-02-15T05:18:19Z2025-02-15T05:18:19Zby Vaudenay, Serge. author.<br/><a href="https://doi.org/10.1007/b136373">https://doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Grundkurs Codierung Verschlüsselung, Kompression, Fehlerbeseitigungent://SD_ILS/0/SD_ILS:1829292025-02-15T05:18:19Z2025-02-15T05:18:19Zby Dankmeier, Wilfried. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9009-2">https://doi.org/10.1007/978-3-8348-9009-2</a><br/>Format: Electronic Resources<br/>Digitale Fernsehtechnik in Theorie und Praxis MPEG-Basiscodierung, DVB-, DAB-, ATSC-Übertragungstechnik, Messtechnikent://SD_ILS/0/SD_ILS:1862742025-02-15T05:18:19Z2025-02-15T05:18:19Zby Fischer, Walter. author.<br/><a href="https://doi.org/10.1007/3-540-29204-7">https://doi.org/10.1007/3-540-29204-7</a><br/>Format: Electronic Resources<br/>Construction and Analysis of Safe, Secure, and Interoperable Smart Devices International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1713832025-02-15T05:18:19Z2025-02-15T05:18:19Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/b105030">https://doi.org/10.1007/b105030</a><br/>Format: Electronic Resources<br/>Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:1717192025-02-15T05:18:19Z2025-02-15T05:18:19Zby Castelluccia, Claude. editor.<br/><a href="https://doi.org/10.1007/b105219">https://doi.org/10.1007/b105219</a><br/>Format: Electronic Resources<br/>Mobile Ad-hoc and Sensor Networks First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedingsent://SD_ILS/0/SD_ILS:1714662025-02-15T05:18:19Z2025-02-15T05:18:19Zby Jia, Xiaohua. editor.<br/><a href="https://doi.org/10.1007/11599463">https://doi.org/10.1007/11599463</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:1721232025-02-15T05:18:19Z2025-02-15T05:18:19Zby Molva, Refik. editor.<br/><a href="https://doi.org/10.1007/11601494">https://doi.org/10.1007/11601494</a><br/>Format: Electronic Resources<br/>Advances in Computer Science - ASIAN 2004, Higher Level Decision Making 9th Asian Computing Science Conference. Dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand, December 8-10, 2004ent://SD_ILS/0/SD_ILS:1510082025-02-15T05:18:19Z2025-02-15T05:18:19Zby Maher, Michael J. editor.<br/><a href="https://doi.org/10.1007/b103476">https://doi.org/10.1007/b103476</a><br/>Format: Electronic Resources<br/>Trusted Computing Platforms Design and Applicationsent://SD_ILS/0/SD_ILS:1521202025-02-15T05:18:19Z2025-02-15T05:18:19Zby Smith, Sean W. author.<br/><a href="https://doi.org/10.1007/b103637">https://doi.org/10.1007/b103637</a><br/>Format: Electronic Resources<br/>Computer Security in the 21st Centuryent://SD_ILS/0/SD_ILS:1521282025-02-15T05:18:19Z2025-02-15T05:18:19Zby Lee, D.T. editor.<br/><a href="https://doi.org/10.1007/b104203">https://doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Security in E-Learningent://SD_ILS/0/SD_ILS:1522922025-02-15T05:18:19Z2025-02-15T05:18:19Zby Weippl, Edgar R. author.<br/><a href="https://doi.org/10.1007/b136702">https://doi.org/10.1007/b136702</a><br/>Format: Electronic Resources<br/>Information Processing and Security Systemsent://SD_ILS/0/SD_ILS:1523222025-02-15T05:18:19Z2025-02-15T05:18:19Zby Saeed, Khalid. editor.<br/><a href="https://doi.org/10.1007/b137371">https://doi.org/10.1007/b137371</a><br/>Format: Electronic Resources<br/>Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)ent://SD_ILS/0/SD_ILS:1523232025-02-15T05:18:19Z2025-02-15T05:18:19Zby Shoniregun, Charles A. author.<br/><a href="https://doi.org/10.1007/b137376">https://doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005ent://SD_ILS/0/SD_ILS:1527162025-02-15T05:18:19Z2025-02-15T05:18:19Zby Pollitt, Mark. editor.<br/><a href="https://doi.org/10.1007/0-387-31163-7">https://doi.org/10.1007/0-387-31163-7</a><br/>Format: Electronic Resources<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:1520742025-02-15T05:18:19Z2025-02-15T05:18:19Zby van Tilborg, Henk C.A. editor.<br/><a href="https://doi.org/10.1007/0-387-23483-7">https://doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Certification and Security in Inter-Organizational E-Services IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, Franceent://SD_ILS/0/SD_ILS:1428622025-02-15T05:18:19Z2025-02-15T05:18:19Zby Nardelli, Enrico. editor.<br/><a href="https://doi.org/10.1007/11397427">https://doi.org/10.1007/11397427</a><br/>Format: Electronic Resources<br/>Secure Group Communications Over Data Networksent://SD_ILS/0/SD_ILS:1393622025-02-15T05:18:19Z2025-02-15T05:18:19Zby Zou, Xukai. author.<br/><a href="https://doi.org/10.1007/b100182">https://doi.org/10.1007/b100182</a><br/>Format: Electronic Resources<br/>Multimedia Encryption and Watermarkingent://SD_ILS/0/SD_ILS:1394712025-02-15T05:18:19Z2025-02-15T05:18:19Zby Furht, Borko. author.<br/><a href="https://doi.org/10.1007/b136785">https://doi.org/10.1007/b136785</a><br/>Format: Electronic Resources<br/>