Search Results for Security systems. - Narrowed by: Data protection.SirsiDynix Enterprisehttp://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dSecurity$002bsystems.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list2025-02-07T07:01:39ZOnline Business Security Systemsent://SD_ILS/0/SD_ILS:1533552025-02-07T07:01:39Z2025-02-07T07:01:39Zby Williams, Godfried B. author.<br/><a href="https://doi.org/10.1007/978-0-387-68850-3">https://doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Security for Cloud Storage Systemsent://SD_ILS/0/SD_ILS:1567742025-02-07T07:01:39Z2025-02-07T07:01:39Zby Yang, Kan. author.<br/><a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format: Electronic Resources<br/>Open Source Systems Security Certificationent://SD_ILS/0/SD_ILS:1365882025-02-07T07:01:39Z2025-02-07T07:01:39Zby Damiani, Ernesto. author. (orcid)0000-0002-9557-6496<br/><a href="https://doi.org/10.1007/978-0-387-77324-7">https://doi.org/10.1007/978-0-387-77324-7</a><br/>Format: Electronic Resources<br/>Security, Privacy and Trust in Cloud Systemsent://SD_ILS/0/SD_ILS:1577322025-02-07T07:01:39Z2025-02-07T07:01:39Zby Nepal, Surya. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format: Electronic Resources<br/>Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedingsent://SD_ILS/0/SD_ILS:1714862025-02-07T07:01:39Z2025-02-07T07:01:39Zby Teufel, Stephanie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1733812025-02-07T07:01:39Z2025-02-07T07:01:39Zby Cuppens-Boulahia, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format: Electronic Resources<br/>Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedingsent://SD_ILS/0/SD_ILS:1579342025-02-07T07:01:39Z2025-02-07T07:01:39Zby Martinez Perez, Gregorio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format: Electronic Resources<br/>Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:1600802025-02-07T07:01:39Z2025-02-07T07:01:39Zby Kotulski, Zbigniew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format: Electronic Resources<br/>Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedingsent://SD_ILS/0/SD_ILS:1770322025-02-07T07:01:39Z2025-02-07T07:01:39Zby Prakash, Atul. editor.<br/><a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 -- October 1, 2014. Proceedingsent://SD_ILS/0/SD_ILS:1439132025-02-07T07:01:39Z2025-02-07T07:01:39Zby Felber, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11764-5">https://doi.org/10.1007/978-3-319-11764-5</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1694882025-02-07T07:01:39Z2025-02-07T07:01:39Zby Cavallaro, Lorenzo. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38530-8">https://doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Electronic Resources<br/>Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1701192025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bagchi, Aditya. editor.<br/><a href="https://doi.org/10.1007/978-3-642-45204-8">https://doi.org/10.1007/978-3-642-45204-8</a><br/>Format: Electronic Resources<br/>Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Securityent://SD_ILS/0/SD_ILS:1617362025-02-07T07:01:39Z2025-02-07T07:01:39Zby Korzun, Dmitry. author.<br/><a href="https://doi.org/10.1007/978-1-4614-5483-0">https://doi.org/10.1007/978-1-4614-5483-0</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 15th International Symposium, SSS 2013, Osaka, Japan, November 13-16, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1440082025-02-07T07:01:39Z2025-02-07T07:01:39Zby Higashino, Teruo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-03089-0">https://doi.org/10.1007/978-3-319-03089-0</a><br/>Format: Electronic Resources<br/>Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1500082025-02-07T07:01:39Z2025-02-07T07:01:39Zby Cuzzocrea, Alfredo. editor. (orcid)0000-0002-7104-6415<br/><a href="https://doi.org/10.1007/978-3-642-40511-2">https://doi.org/10.1007/978-3-642-40511-2</a><br/>Format: Electronic Resources<br/>Information Security Technology for Applications 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1695422025-02-07T07:01:39Z2025-02-07T07:01:39Zby Laud, Peeter. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29615-4">https://doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Electronic Resources<br/>Security and Intelligent Information Systems International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1699272025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bouvry, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25261-7">https://doi.org/10.1007/978-3-642-25261-7</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1696362025-02-07T07:01:39Z2025-02-07T07:01:39Zby Richa, Andréa W. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33536-5">https://doi.org/10.1007/978-3-642-33536-5</a><br/>Format: Electronic Resources<br/>Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1720972025-02-07T07:01:39Z2025-02-07T07:01:39Zby Venkatakrishnan, Venkat. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35130-3">https://doi.org/10.1007/978-3-642-35130-3</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1429152025-02-07T07:01:39Z2025-02-07T07:01:39Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30955-7">https://doi.org/10.1007/978-3-642-30955-7</a><br/>Format: Electronic Resources<br/>Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1440872025-02-07T07:01:39Z2025-02-07T07:01:39Zby Thampi, Sabu M. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34135-9">https://doi.org/10.1007/978-3-642-34135-9</a><br/>Format: Electronic Resources<br/>Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1508972025-02-07T07:01:39Z2025-02-07T07:01:39Zby Aura, Tuomas. editor.<br/><a href="https://doi.org/10.1007/978-3-642-27937-9">https://doi.org/10.1007/978-3-642-27937-9</a><br/>Format: Electronic Resources<br/>Multidisciplinary Research and Practice for Informations Systems IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1472662025-02-07T07:01:39Z2025-02-07T07:01:39Zby Quirchmayer, Gerald. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32498-7">https://doi.org/10.1007/978-3-642-32498-7</a><br/>Format: Electronic Resources<br/>Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Pevised Selected Papersent://SD_ILS/0/SD_ILS:1352672025-02-07T07:01:39Z2025-02-07T07:01:39Zby Schmidt, Andreas U. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33392-7">https://doi.org/10.1007/978-3-642-33392-7</a><br/>Format: Electronic Resources<br/>Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1733452025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25560-1">https://doi.org/10.1007/978-3-642-25560-1</a><br/>Format: Electronic Resources<br/>Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1441862025-02-07T07:01:39Z2025-02-07T07:01:39Zby Herrero, Álvaro. editor.<br/><a href="https://doi.org/10.1007/978-3-642-21323-6">https://doi.org/10.1007/978-3-642-21323-6</a><br/>Format: Electronic Resources<br/>Security Trends for FPGAS From Secured to Secure Reconfigurable Systemsent://SD_ILS/0/SD_ILS:1455742025-02-07T07:01:39Z2025-02-07T07:01:39Zby Badrignans, Benoit. editor.<br/><a href="https://doi.org/10.1007/978-94-007-1338-3">https://doi.org/10.1007/978-94-007-1338-3</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 13th International Symposium, SSS 2011, Grenoble, France, October 10-12, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1468112025-02-07T07:01:39Z2025-02-07T07:01:39Zby Défago, Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24550-3">https://doi.org/10.1007/978-3-642-24550-3</a><br/>Format: Electronic Resources<br/>Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010ent://SD_ILS/0/SD_ILS:1700142025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jha, Somesh. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17714-9">https://doi.org/10.1007/978-3-642-17714-9</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1704702025-02-07T07:01:39Z2025-02-07T07:01:39Zby Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16023-3">https://doi.org/10.1007/978-3-642-16023-3</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1753312025-02-07T07:01:39Z2025-02-07T07:01:39Zby Samarati, Pierangela. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12368-9">https://doi.org/10.1007/978-3-642-12368-9</a><br/>Format: Electronic Resources<br/>Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1509032025-02-07T07:01:39Z2025-02-07T07:01:39Zby Gu, Qijun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11526-4">https://doi.org/10.1007/978-3-642-11526-4</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1711952025-02-07T07:01:39Z2025-02-07T07:01:39Zby Guerraoui, Rachid. editor.<br/><a href="https://doi.org/10.1007/978-3-642-05118-0">https://doi.org/10.1007/978-3-642-05118-0</a><br/>Format: Electronic Resources<br/>Security in Computing Systems Challenges, Approaches and Solutionsent://SD_ILS/0/SD_ILS:1735252025-02-07T07:01:39Z2025-02-07T07:01:39Zby Biskup, Joachim. author.<br/><a href="https://doi.org/10.1007/978-3-540-78442-5">https://doi.org/10.1007/978-3-540-78442-5</a><br/>Format: Electronic Resources<br/>Security Engineering for Vehicular IT Systems Improving the Trustworthiness and Dependability of Automotive IT Applicationsent://SD_ILS/0/SD_ILS:1608292025-02-07T07:01:39Z2025-02-07T07:01:39Zby Wolf, Marko. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9581-3">https://doi.org/10.1007/978-3-8348-9581-3</a><br/>Format: Electronic Resources<br/>Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1770102025-02-07T07:01:39Z2025-02-07T07:01:39Zby Prakash, Atul. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10772-6">https://doi.org/10.1007/978-3-642-10772-6</a><br/>Format: Electronic Resources<br/>Safety and Security in Multiagent Systems Research Results from 2004-2006ent://SD_ILS/0/SD_ILS:1387302025-02-07T07:01:39Z2025-02-07T07:01:39Zby Barley, Mike. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04879-1">https://doi.org/10.1007/978-3-642-04879-1</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedingsent://SD_ILS/0/SD_ILS:1433312025-02-07T07:01:39Z2025-02-07T07:01:39Zby Markowitch, Olivier. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03944-7">https://doi.org/10.1007/978-3-642-03944-7</a><br/>Format: Electronic Resources<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedingsent://SD_ILS/0/SD_ILS:1725942025-02-07T07:01:39Z2025-02-07T07:01:39Zby Sekar, R. editor.<br/><a href="https://doi.org/10.1007/978-3-540-89862-7">https://doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedingsent://SD_ILS/0/SD_ILS:1722822025-02-07T07:01:39Z2025-02-07T07:01:39Zby McDaniel, Patrick. editor.<br/><a href="https://doi.org/10.1007/978-3-540-77086-2">https://doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007ent://SD_ILS/0/SD_ILS:1726002025-02-07T07:01:39Z2025-02-07T07:01:39Zby Sauveron, Damien. editor.<br/><a href="https://doi.org/10.1007/978-3-540-72354-7">https://doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Electronic Resources<br/>Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedingsent://SD_ILS/0/SD_ILS:1703492025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bagchi, Aditya. editor.<br/><a href="https://doi.org/10.1007/11961635">https://doi.org/10.1007/11961635</a><br/>Format: Electronic Resources<br/>Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systemsent://SD_ILS/0/SD_ILS:1520762025-02-07T07:01:39Z2025-02-07T07:01:39Zby Pejas, Jerzy. editor.<br/><a href="https://doi.org/10.1007/b101135">https://doi.org/10.1007/b101135</a><br/>Format: Electronic Resources<br/>Cyberpatterns Unifying Design Patterns with Security and Attack Patternsent://SD_ILS/0/SD_ILS:1683212025-02-07T07:01:39Z2025-02-07T07:01:39Zby Blackwell, Clive. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04447-7">https://doi.org/10.1007/978-3-319-04447-7</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013ent://SD_ILS/0/SD_ILS:1690352025-02-07T07:01:39Z2025-02-07T07:01:39Zby Krishnan, G. Sai Sundara. editor.<br/><a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format: Electronic Resources<br/>Touchless Palmprint Recognition Systemsent://SD_ILS/0/SD_ILS:1688362025-02-07T07:01:39Z2025-02-07T07:01:39Zby Genovese, Angelo. author.<br/><a href="https://doi.org/10.1007/978-3-319-10365-5">https://doi.org/10.1007/978-3-319-10365-5</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1696882025-02-07T07:01:39Z2025-02-07T07:01:39Zby Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1697272025-02-07T07:01:39Z2025-02-07T07:01:39Zby Linawati. editor.<br/><a href="https://doi.org/10.1007/978-3-642-55032-4">https://doi.org/10.1007/978-3-642-55032-4</a><br/>Format: Electronic Resources<br/>Engineering Secure Future Internet Services and Systems Current Researchent://SD_ILS/0/SD_ILS:1698562025-02-07T07:01:39Z2025-02-07T07:01:39Zby Heisel, Maritta. editor.<br/><a href="https://doi.org/10.1007/978-3-319-07452-8">https://doi.org/10.1007/978-3-319-07452-8</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1698612025-02-07T07:01:39Z2025-02-07T07:01:39Zby Preneel, Bart. editor.<br/><a href="https://doi.org/10.1007/978-3-319-06749-0">https://doi.org/10.1007/978-3-319-06749-0</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1707122025-02-07T07:01:39Z2025-02-07T07:01:39Zby Villari, Massimo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-44879-3">https://doi.org/10.1007/978-3-662-44879-3</a><br/>Format: Electronic Resources<br/>Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:1712292025-02-07T07:01:39Z2025-02-07T07:01:39Zby Cuellar, Jorge. editor.<br/><a href="https://doi.org/10.1007/978-3-319-10329-7">https://doi.org/10.1007/978-3-319-10329-7</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedingsent://SD_ILS/0/SD_ILS:1710702025-02-07T07:01:39Z2025-02-07T07:01:39Zby Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11257-2">https://doi.org/10.1007/978-3-319-11257-2</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1711502025-02-07T07:01:39Z2025-02-07T07:01:39Zby Poovendran, Radha. editor. (orcid)0000-0003-0269-8097<br/><a href="https://doi.org/10.1007/978-3-319-12601-2">https://doi.org/10.1007/978-3-319-12601-2</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems -- CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1714492025-02-07T07:01:39Z2025-02-07T07:01:39Zby Batina, Lejla. editor. (orcid)0000-0003-0727-3573<br/><a href="https://doi.org/10.1007/978-3-662-44709-3">https://doi.org/10.1007/978-3-662-44709-3</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:1714692025-02-07T07:01:39Z2025-02-07T07:01:39Zby Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-45917-1">https://doi.org/10.1007/978-3-662-45917-1</a><br/>Format: Electronic Resources<br/>Network and System Security 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedingsent://SD_ILS/0/SD_ILS:1720382025-02-07T07:01:39Z2025-02-07T07:01:39Zby Au, Man Ho. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11698-3">https://doi.org/10.1007/978-3-319-11698-3</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1723432025-02-07T07:01:39Z2025-02-07T07:01:39Zby Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-12778-1">https://doi.org/10.1007/978-3-319-12778-1</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2014 Conferences Confederated International Conferences: CoopIS and ODBASE 2014, Amantea, Italy, October 27-31, 2014. Proceedingsent://SD_ILS/0/SD_ILS:1718692025-02-07T07:01:39Z2025-02-07T07:01:39Zby Meersman, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-662-45563-0">https://doi.org/10.1007/978-3-662-45563-0</a><br/>Format: Electronic Resources<br/>The Hash Function BLAKEent://SD_ILS/0/SD_ILS:1627812025-02-07T07:01:39Z2025-02-07T07:01:39Zby Aumasson, Jean-Philippe. author.<br/><a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format: Electronic Resources<br/>Pervasive Wireless Environments: Detecting and Localizing User Spoofingent://SD_ILS/0/SD_ILS:1635052025-02-07T07:01:39Z2025-02-07T07:01:39Zby Yang, Jie. author.<br/><a href="https://doi.org/10.1007/978-3-319-07356-9">https://doi.org/10.1007/978-3-319-07356-9</a><br/>Format: Electronic Resources<br/>Trusted Cloud Computingent://SD_ILS/0/SD_ILS:1638932025-02-07T07:01:39Z2025-02-07T07:01:39Zby Krcmar, Helmut. editor.<br/><a href="https://doi.org/10.1007/978-3-319-12718-7">https://doi.org/10.1007/978-3-319-12718-7</a><br/>Format: Electronic Resources<br/>Secure Cloud Computingent://SD_ILS/0/SD_ILS:1578152025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-9278-8">https://doi.org/10.1007/978-1-4614-9278-8</a><br/>Format: Electronic Resources<br/>Virtualization Techniques for Mobile Systemsent://SD_ILS/0/SD_ILS:1578772025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jaramillo, David. author.<br/><a href="https://doi.org/10.1007/978-3-319-05741-5">https://doi.org/10.1007/978-3-319-05741-5</a><br/>Format: Electronic Resources<br/>Future Business Software Current Trends in Business Software Developmentent://SD_ILS/0/SD_ILS:1747282025-02-07T07:01:39Z2025-02-07T07:01:39Zby Brunetti, Gino. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04144-5">https://doi.org/10.1007/978-3-319-04144-5</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1765792025-02-07T07:01:39Z2025-02-07T07:01:39Zby Atluri, Vijay. editor.<br/><a href="https://doi.org/10.1007/978-3-662-43936-4">https://doi.org/10.1007/978-3-662-43936-4</a><br/>Format: Electronic Resources<br/>Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systemsent://SD_ILS/0/SD_ILS:1775282025-02-07T07:01:39Z2025-02-07T07:01:39Zby Hong, Y.-W. Peter. author.<br/><a href="https://doi.org/10.1007/978-981-4560-14-6">https://doi.org/10.1007/978-981-4560-14-6</a><br/>Format: Electronic Resources<br/>Cybersecurity Systems for Human Cognition Augmentationent://SD_ILS/0/SD_ILS:1642522025-02-07T07:01:39Z2025-02-07T07:01:39Zby Pino, Robinson E. editor.<br/><a href="https://doi.org/10.1007/978-3-319-10374-7">https://doi.org/10.1007/978-3-319-10374-7</a><br/>Format: Electronic Resources<br/>Trusted Computing Platforms TPM2.0 in Contextent://SD_ILS/0/SD_ILS:1659642025-02-07T07:01:39Z2025-02-07T07:01:39Zby Proudler, Graeme. author.<br/><a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1661282025-02-07T07:01:39Z2025-02-07T07:01:39Zby Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-662-44788-8">https://doi.org/10.1007/978-3-662-44788-8</a><br/>Format: Electronic Resources<br/>Advanced Information Systems Engineering Workshops CAiSE 2014 International Workshops, Thessaloniki, Greece, June 16-20, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1668222025-02-07T07:01:39Z2025-02-07T07:01:39Zby Iliadis, Lazaros. editor.<br/><a href="https://doi.org/10.1007/978-3-319-07869-4">https://doi.org/10.1007/978-3-319-07869-4</a><br/>Format: Electronic Resources<br/>Secure Smart Embedded Devices, Platforms and Applicationsent://SD_ILS/0/SD_ILS:1393232025-02-07T07:01:39Z2025-02-07T07:01:39Zby Markantonakis, Konstantinos. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-7915-4">https://doi.org/10.1007/978-1-4614-7915-4</a><br/>Format: Electronic Resources<br/>Distributed Denial of Service Attack and Defenseent://SD_ILS/0/SD_ILS:1399132025-02-07T07:01:39Z2025-02-07T07:01:39Zby Yu, Shui. author.<br/><a href="https://doi.org/10.1007/978-1-4614-9491-1">https://doi.org/10.1007/978-1-4614-9491-1</a><br/>Format: Electronic Resources<br/>Advanced API Security Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWEent://SD_ILS/0/SD_ILS:1408342025-02-07T07:01:39Z2025-02-07T07:01:39Zby Siriwardena, Prabath. author.<br/><a href="https://doi.org/10.1007/978-1-4302-6817-8">https://doi.org/10.1007/978-1-4302-6817-8</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1409142025-02-07T07:01:39Z2025-02-07T07:01:39Zby Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-06677-6">https://doi.org/10.1007/978-3-319-06677-6</a><br/>Format: Electronic Resources<br/>Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1409212025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jonker, Willem. editor.<br/><a href="https://doi.org/10.1007/978-3-319-06811-4">https://doi.org/10.1007/978-3-319-06811-4</a><br/>Format: Electronic Resources<br/>Web Technologies and Applications APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1409892025-02-07T07:01:39Z2025-02-07T07:01:39Zby Han, Weihong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11119-3">https://doi.org/10.1007/978-3-319-11119-3</a><br/>Format: Electronic Resources<br/>Cyber Defense and Situational Awarenessent://SD_ILS/0/SD_ILS:1410442025-02-07T07:01:39Z2025-02-07T07:01:39Zby Kott, Alexander. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11391-3">https://doi.org/10.1007/978-3-319-11391-3</a><br/>Format: Electronic Resources<br/>Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1411072025-02-07T07:01:39Z2025-02-07T07:01:39Zby Chow, Sherman S.M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 12th International Conference, WWIC 2014, Paris, France, May 26-28, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:1411122025-02-07T07:01:39Z2025-02-07T07:01:39Zby Mellouk, Abdelhamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-13174-0">https://doi.org/10.1007/978-3-319-13174-0</a><br/>Format: Electronic Resources<br/>Secure IT Systems 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1411202025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bernsmed, Karin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11599-3">https://doi.org/10.1007/978-3-319-11599-3</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013ent://SD_ILS/0/SD_ILS:1411462025-02-07T07:01:39Z2025-02-07T07:01:39Zby Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-45947-8">https://doi.org/10.1007/978-3-662-45947-8</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:1412932025-02-07T07:01:39Z2025-02-07T07:01:39Zby Mitton, Natalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-13329-4">https://doi.org/10.1007/978-3-319-13329-4</a><br/>Format: Electronic Resources<br/>e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1412972025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bissyandé, Tegawendé F. editor.<br/><a href="https://doi.org/10.1007/978-3-319-08368-1">https://doi.org/10.1007/978-3-319-08368-1</a><br/>Format: Electronic Resources<br/>E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1427982025-02-07T07:01:39Z2025-02-07T07:01:39Zby Sideridis, Alexander B. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11710-2">https://doi.org/10.1007/978-3-319-11710-2</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1433782025-02-07T07:01:39Z2025-02-07T07:01:39Zby Sherif, Mostafa Hashem. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04105-6">https://doi.org/10.1007/978-3-319-04105-6</a><br/>Format: Electronic Resources<br/>Primer on Client-Side Web Securityent://SD_ILS/0/SD_ILS:1435002025-02-07T07:01:39Z2025-02-07T07:01:39Zby De Ryck, Philippe. author.<br/><a href="https://doi.org/10.1007/978-3-319-12226-7">https://doi.org/10.1007/978-3-319-12226-7</a><br/>Format: Electronic Resources<br/>Network Hardening An Automated Approach to Improving Network Securityent://SD_ILS/0/SD_ILS:1431022025-02-07T07:01:39Z2025-02-07T07:01:39Zby Wang, Lingyu. author.<br/><a href="https://doi.org/10.1007/978-3-319-04612-9">https://doi.org/10.1007/978-3-319-04612-9</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1433222025-02-07T07:01:39Z2025-02-07T07:01:39Zby Faloutsos, Michalis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04918-2">https://doi.org/10.1007/978-3-319-04918-2</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1431352025-02-07T07:01:39Z2025-02-07T07:01:39Zby Abadi, Martín. editor.<br/><a href="https://doi.org/10.1007/978-3-319-05119-2">https://doi.org/10.1007/978-3-319-05119-2</a><br/>Format: Electronic Resources<br/>Socio-technical Design of Ubiquitous Computing Systemsent://SD_ILS/0/SD_ILS:1512922025-02-07T07:01:39Z2025-02-07T07:01:39Zby David, Klaus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-05044-7">https://doi.org/10.1007/978-3-319-05044-7</a><br/>Format: Electronic Resources<br/>Computer Networks and Distributed Systems International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1496052025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jahangir, Amir Hossein. editor.<br/><a href="https://doi.org/10.1007/978-3-319-10903-9">https://doi.org/10.1007/978-3-319-10903-9</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1497672025-02-07T07:01:39Z2025-02-07T07:01:39Zby Natarajan, Raja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04483-5">https://doi.org/10.1007/978-3-319-04483-5</a><br/>Format: Electronic Resources<br/>Bio-inspiring Cyber Security and Cloud Services: Trends and Innovationsent://SD_ILS/0/SD_ILS:1452102025-02-07T07:01:39Z2025-02-07T07:01:39Zby Hassanien, Aboul Ella. editor.<br/><a href="https://doi.org/10.1007/978-3-662-43616-5">https://doi.org/10.1007/978-3-662-43616-5</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1456072025-02-07T07:01:39Z2025-02-07T07:01:39Zby Preneel, Bart. editor.<br/><a href="https://doi.org/10.1007/978-3-642-54069-1">https://doi.org/10.1007/978-3-642-54069-1</a><br/>Format: Electronic Resources<br/>ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1474692025-02-07T07:01:39Z2025-02-07T07:01:39Zby Kimppa, Kai. editor.<br/><a href="https://doi.org/10.1007/978-3-662-44208-1">https://doi.org/10.1007/978-3-662-44208-1</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 7th International Conference, IDCS 2014, Calabria, Italy, September 22-24, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1462682025-02-07T07:01:39Z2025-02-07T07:01:39Zby Fortino, Giancarlo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11692-1">https://doi.org/10.1007/978-3-319-11692-1</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1482122025-02-07T07:01:39Z2025-02-07T07:01:39Zby Chatterjee, Mainak. editor.<br/><a href="https://doi.org/10.1007/978-3-642-45249-9">https://doi.org/10.1007/978-3-642-45249-9</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1351722025-02-07T07:01:39Z2025-02-07T07:01:39Zby Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-662-44791-8">https://doi.org/10.1007/978-3-662-44791-8</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedingsent://SD_ILS/0/SD_ILS:1356472025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bondavalli, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-319-10506-2">https://doi.org/10.1007/978-3-319-10506-2</a><br/>Format: Electronic Resources<br/>Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuitsent://SD_ILS/0/SD_ILS:1686252025-02-07T07:01:39Z2025-02-07T07:01:39Zby Peeters, Eric. author.<br/><a href="https://doi.org/10.1007/978-1-4614-6783-0">https://doi.org/10.1007/978-1-4614-6783-0</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT- RSA 2013 The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1695462025-02-07T07:01:39Z2025-02-07T07:01:39Zby Dawson, Ed. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36095-4">https://doi.org/10.1007/978-3-642-36095-4</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1704282025-02-07T07:01:39Z2025-02-07T07:01:39Zby Frey, Davide. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35668-1">https://doi.org/10.1007/978-3-642-35668-1</a><br/>Format: Electronic Resources<br/>Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papersent://SD_ILS/0/SD_ILS:1724992025-02-07T07:01:39Z2025-02-07T07:01:39Zby Christianson, Bruce. editor. (orcid)0000-0002-3777-7476<br/><a href="https://doi.org/10.1007/978-3-642-36213-2">https://doi.org/10.1007/978-3-642-36213-2</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1704622025-02-07T07:01:39Z2025-02-07T07:01:39Zby Knudsen, Lars R. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35999-6">https://doi.org/10.1007/978-3-642-35999-6</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XVIIent://SD_ILS/0/SD_ILS:1714872025-02-07T07:01:39Z2025-02-07T07:01:39Zby Gavrilova, Marina. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35840-1">https://doi.org/10.1007/978-3-642-35840-1</a><br/>Format: Electronic Resources<br/>Web-Age Information Management 14th International Conference, WAIM 2013, Beidaihe, China, June 14-16, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1711242025-02-07T07:01:39Z2025-02-07T07:01:39Zby Wang, Jianyong. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38562-9">https://doi.org/10.1007/978-3-642-38562-9</a><br/>Format: Electronic Resources<br/>Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1714532025-02-07T07:01:39Z2025-02-07T07:01:39Zby Riis Nielsen, Hanne. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41488-6">https://doi.org/10.1007/978-3-642-41488-6</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 6th International Conference, IDCS 2013, Hangzhou, China, October 28-30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1722932025-02-07T07:01:39Z2025-02-07T07:01:39Zby Pathan, Mukaddim. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41428-2">https://doi.org/10.1007/978-3-642-41428-2</a><br/>Format: Electronic Resources<br/>E-Voting and Identity 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1722262025-02-07T07:01:39Z2025-02-07T07:01:39Zby Heather, James. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39185-9">https://doi.org/10.1007/978-3-642-39185-9</a><br/>Format: Electronic Resources<br/>Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1722462025-02-07T07:01:39Z2025-02-07T07:01:39Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38631-2">https://doi.org/10.1007/978-3-642-38631-2</a><br/>Format: Electronic Resources<br/>Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1723522025-02-07T07:01:39Z2025-02-07T07:01:39Zby Mustofa, Khabib. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36818-9">https://doi.org/10.1007/978-3-642-36818-9</a><br/>Format: Electronic Resources<br/>Sensor Systems and Software 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1742962025-02-07T07:01:39Z2025-02-07T07:01:39Zby Zuniga, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04166-7">https://doi.org/10.1007/978-3-319-04166-7</a><br/>Format: Electronic Resources<br/>Cyber Security Deterrence and IT Protection for Critical Infrastructuresent://SD_ILS/0/SD_ILS:1608942025-02-07T07:01:39Z2025-02-07T07:01:39Zby Martellini, Maurizio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-02279-6">https://doi.org/10.1007/978-3-319-02279-6</a><br/>Format: Electronic Resources<br/>Iris Biometrics From Segmentation to Template Securityent://SD_ILS/0/SD_ILS:1608322025-02-07T07:01:39Z2025-02-07T07:01:39Zby Rathgeb, Christian. author.<br/><a href="https://doi.org/10.1007/978-1-4614-5571-4">https://doi.org/10.1007/978-1-4614-5571-4</a><br/>Format: Electronic Resources<br/>Physical Layer Approaches for Securing Wireless Communication Systemsent://SD_ILS/0/SD_ILS:1635912025-02-07T07:01:39Z2025-02-07T07:01:39Zby Wen, Hong. author.<br/><a href="https://doi.org/10.1007/978-1-4614-6510-2">https://doi.org/10.1007/978-1-4614-6510-2</a><br/>Format: Electronic Resources<br/>Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasuresent://SD_ILS/0/SD_ILS:1641102025-02-07T07:01:39Z2025-02-07T07:01:39Zby Haataja, Keijo. author.<br/><a href="https://doi.org/10.1007/978-3-642-40646-1">https://doi.org/10.1007/978-3-642-40646-1</a><br/>Format: Electronic Resources<br/>Security and the Networked Societyent://SD_ILS/0/SD_ILS:1569982025-02-07T07:01:39Z2025-02-07T07:01:39Zby Gregory, Mark A. author.<br/><a href="https://doi.org/10.1007/978-3-319-02390-8">https://doi.org/10.1007/978-3-319-02390-8</a><br/>Format: Electronic Resources<br/>Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne, Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1752912025-02-07T07:01:39Z2025-02-07T07:01:39Zby Dodge, Ronald C. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39377-8">https://doi.org/10.1007/978-3-642-39377-8</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1758832025-02-07T07:01:39Z2025-02-07T07:01:39Zby Flegel, Ulrich. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37300-8">https://doi.org/10.1007/978-3-642-37300-8</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems -- CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1764932025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bertoni, Guido Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-642-40349-1">https://doi.org/10.1007/978-3-642-40349-1</a><br/>Format: Electronic Resources<br/>Security and Privacy Preserving in Social Networksent://SD_ILS/0/SD_ILS:1769512025-02-07T07:01:39Z2025-02-07T07:01:39Zby Chbeir, Richard. editor.<br/><a href="https://doi.org/10.1007/978-3-7091-0894-9">https://doi.org/10.1007/978-3-7091-0894-9</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communication 11th International Conference, WWIC 2013, St. Petersburg, Russia, June 5-7, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1771432025-02-07T07:01:39Z2025-02-07T07:01:39Zby Tsaoussidis, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38401-1">https://doi.org/10.1007/978-3-642-38401-1</a><br/>Format: Electronic Resources<br/>Frontiers in Internet Technologies Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China. Revised Selected Papersent://SD_ILS/0/SD_ILS:1777072025-02-07T07:01:39Z2025-02-07T07:01:39Zby Su, Jinshu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-53959-6">https://doi.org/10.1007/978-3-642-53959-6</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1774292025-02-07T07:01:39Z2025-02-07T07:01:39Zby Roughan, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36516-4">https://doi.org/10.1007/978-3-642-36516-4</a><br/>Format: Electronic Resources<br/>Security and Privacy in Mobile Social Networksent://SD_ILS/0/SD_ILS:1643342025-02-07T07:01:39Z2025-02-07T07:01:39Zby Liang, Xiaohui. author.<br/><a href="https://doi.org/10.1007/978-1-4614-8857-6">https://doi.org/10.1007/978-1-4614-8857-6</a><br/>Format: Electronic Resources<br/>Secure IP Mobility Management for VANETent://SD_ILS/0/SD_ILS:1657852025-02-07T07:01:39Z2025-02-07T07:01:39Zby Taha, Sanaa. author.<br/><a href="https://doi.org/10.1007/978-3-319-01351-0">https://doi.org/10.1007/978-3-319-01351-0</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papersent://SD_ILS/0/SD_ILS:1661122025-02-07T07:01:39Z2025-02-07T07:01:39Zby Keromytis, Angelos D. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36883-7">https://doi.org/10.1007/978-3-642-36883-7</a><br/>Format: Electronic Resources<br/>IT-Risikomanagement mit System Praxisorientiertes Management von Informationssicherheits- und IT-Risikenent://SD_ILS/0/SD_ILS:1846202025-02-07T07:01:39Z2025-02-07T07:01:39Zby Königs, Hans-Peter. author.<br/><a href="https://doi.org/10.1007/978-3-8348-2165-2">https://doi.org/10.1007/978-3-8348-2165-2</a><br/>Format: Electronic Resources<br/>Physical Unclonable Functions in Theory and Practiceent://SD_ILS/0/SD_ILS:1387792025-02-07T07:01:39Z2025-02-07T07:01:39Zby Böhm, Christoph. author.<br/><a href="https://doi.org/10.1007/978-1-4614-5040-5">https://doi.org/10.1007/978-1-4614-5040-5</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1393352025-02-07T07:01:39Z2025-02-07T07:01:39Zby Zia, Tanveer. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04283-1">https://doi.org/10.1007/978-3-319-04283-1</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1393532025-02-07T07:01:39Z2025-02-07T07:01:39Zby Stolfo, Salvatore J. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41284-4">https://doi.org/10.1007/978-3-642-41284-4</a><br/>Format: Electronic Resources<br/>SmartData Privacy Meets Evolutionary Roboticsent://SD_ILS/0/SD_ILS:1397972025-02-07T07:01:39Z2025-02-07T07:01:39Zby Harvey, Inman. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-6409-9">https://doi.org/10.1007/978-1-4614-6409-9</a><br/>Format: Electronic Resources<br/>Automatic Malware Analysis An Emulator Based Approachent://SD_ILS/0/SD_ILS:1398162025-02-07T07:01:39Z2025-02-07T07:01:39Zby Yin, Heng. author.<br/><a href="https://doi.org/10.1007/978-1-4614-5523-3">https://doi.org/10.1007/978-1-4614-5523-3</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1405312025-02-07T07:01:39Z2025-02-07T07:01:39Zby Marinos, Louis. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39345-7">https://doi.org/10.1007/978-3-642-39345-7</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1407162025-02-07T07:01:39Z2025-02-07T07:01:39Zby Das, Sajal K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-02786-9">https://doi.org/10.1007/978-3-319-02786-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Social Networksent://SD_ILS/0/SD_ILS:1421052025-02-07T07:01:39Z2025-02-07T07:01:39Zby Altshuler, Yaniv. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-4139-7">https://doi.org/10.1007/978-1-4614-4139-7</a><br/>Format: Electronic Resources<br/>Trusted Systems 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1431272025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bloem, Roderick. editor.<br/><a href="https://doi.org/10.1007/978-3-319-03491-1">https://doi.org/10.1007/978-3-319-03491-1</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1430542025-02-07T07:01:39Z2025-02-07T07:01:39Zby Rieck, Konrad. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39235-1">https://doi.org/10.1007/978-3-642-39235-1</a><br/>Format: Electronic Resources<br/>Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1441912025-02-07T07:01:39Z2025-02-07T07:01:39Zby Yuan, Yuyu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35795-4">https://doi.org/10.1007/978-3-642-35795-4</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2013 Conferences Confederated International Conferences: CoopIS, DOA-Trusted Cloud and ODBASE 2013, Graz, Austria, September 9-13, 2013. Proceedings.ent://SD_ILS/0/SD_ILS:1441022025-02-07T07:01:39Z2025-02-07T07:01:39Zby Meersman, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41030-7">https://doi.org/10.1007/978-3-642-41030-7</a><br/>Format: Electronic Resources<br/>Introduction to Public Key Infrastructuresent://SD_ILS/0/SD_ILS:1447832025-02-07T07:01:39Z2025-02-07T07:01:39Zby Buchmann, Johannes A. author.<br/><a href="https://doi.org/10.1007/978-3-642-40657-7">https://doi.org/10.1007/978-3-642-40657-7</a><br/>Format: Electronic Resources<br/>Personal Satellite Services 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papersent://SD_ILS/0/SD_ILS:1441662025-02-07T07:01:39Z2025-02-07T07:01:39Zby Pillai, Prashant. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36787-8">https://doi.org/10.1007/978-3-642-36787-8</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 14-27, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1487212025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121<br/><a href="https://doi.org/10.1007/978-3-642-40793-2">https://doi.org/10.1007/978-3-642-40793-2</a><br/>Format: Electronic Resources<br/>Outlier Analysisent://SD_ILS/0/SD_ILS:1518372025-02-07T07:01:39Z2025-02-07T07:01:39Zby Aggarwal, Charu C. author.<br/><a href="https://doi.org/10.1007/978-1-4614-6396-2">https://doi.org/10.1007/978-1-4614-6396-2</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papersent://SD_ILS/0/SD_ILS:1455952025-02-07T07:01:39Z2025-02-07T07:01:39Zby Di Pietro, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35890-6">https://doi.org/10.1007/978-3-642-35890-6</a><br/>Format: Electronic Resources<br/>Advances in Communication Networking 19th EUNICE/IFIP EG WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1454282025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bauschert, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-642-40552-5">https://doi.org/10.1007/978-3-642-40552-5</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing Second European Conference, ESOCC 2013, Málaga, Spain, September 11-13, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1459182025-02-07T07:01:39Z2025-02-07T07:01:39Zby Lau, Kung-Kiu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-40651-5">https://doi.org/10.1007/978-3-642-40651-5</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1454662025-02-07T07:01:39Z2025-02-07T07:01:39Zby Wang, G. Alan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39693-9">https://doi.org/10.1007/978-3-642-39693-9</a><br/>Format: Electronic Resources<br/>PBX Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:1459702025-02-07T07:01:39Z2025-02-07T07:01:39Zby Androulidakis, I.I. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1656-2">https://doi.org/10.1007/978-1-4614-1656-2</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification: Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1477242025-02-07T07:01:39Z2025-02-07T07:01:39Zby Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36140-1">https://doi.org/10.1007/978-3-642-36140-1</a><br/>Format: Electronic Resources<br/>Smart Grid Security First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1483362025-02-07T07:01:39Z2025-02-07T07:01:39Zby Cuellar, Jorge. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38030-3">https://doi.org/10.1007/978-3-642-38030-3</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 9th International Conference, ICDCIT 2013, Bhubaneswar, India, February 5-8, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1351702025-02-07T07:01:39Z2025-02-07T07:01:39Zby Hota, Chittaranjan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36071-8">https://doi.org/10.1007/978-3-642-36071-8</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1351742025-02-07T07:01:39Z2025-02-07T07:01:39Zby Wang, Lingyu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39256-6">https://doi.org/10.1007/978-3-642-39256-6</a><br/>Format: Electronic Resources<br/>Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1349732025-02-07T07:01:39Z2025-02-07T07:01:39Zby Fischer-Hübner, Simone. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37282-7">https://doi.org/10.1007/978-3-642-37282-7</a><br/>Format: Electronic Resources<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:1993352025-02-07T07:01:39Z2025-02-07T07:01:39Zby Raggo, Michael T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597497435">https://www.sciencedirect.com/science/book/9781597497435</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2012 Confederated International Conferences: CoopIS, DOA-SVI, and ODBASE 2012, Rome, Italy, September 10-14, 2012. Proceedings, Part IIent://SD_ILS/0/SD_ILS:1695852025-02-07T07:01:39Z2025-02-07T07:01:39Zby Meersman, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33615-7">https://doi.org/10.1007/978-3-642-33615-7</a><br/>Format: Electronic Resources<br/>Web-Age Information Management 13th International Conference, WAIM 2012, Harbin, China, August 18-20, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1703102025-02-07T07:01:39Z2025-02-07T07:01:39Zby Gao, Hong. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32281-5">https://doi.org/10.1007/978-3-642-32281-5</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems -- CHES 2012 14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1698512025-02-07T07:01:39Z2025-02-07T07:01:39Zby Prouff, Emmanuel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33027-8">https://doi.org/10.1007/978-3-642-33027-8</a><br/>Format: Electronic Resources<br/>Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1699112025-02-07T07:01:39Z2025-02-07T07:01:39Zby Meadows, Catherine A. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29963-6">https://doi.org/10.1007/978-3-642-29963-6</a><br/>Format: Electronic Resources<br/>Pervasive Computing 10th International Conference, Pervasive 2012, Newcastle, UK, June 18-22, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1703272025-02-07T07:01:39Z2025-02-07T07:01:39Zby Kay, Judy. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31205-2">https://doi.org/10.1007/978-3-642-31205-2</a><br/>Format: Electronic Resources<br/>Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Comüuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1704202025-02-07T07:01:39Z2025-02-07T07:01:39Zby Kotenko, Igor. editor. (orcid)0000-0001-6859-7120<br/><a href="https://doi.org/10.1007/978-3-642-33704-8">https://doi.org/10.1007/978-3-642-33704-8</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security VIIent://SD_ILS/0/SD_ILS:1706782025-02-07T07:01:39Z2025-02-07T07:01:39Zby Shi, Yun Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-642-28693-3">https://doi.org/10.1007/978-3-642-28693-3</a><br/>Format: Electronic Resources<br/>Data Security and Security Data 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papersent://SD_ILS/0/SD_ILS:1697682025-02-07T07:01:39Z2025-02-07T07:01:39Zby MacKinnon, Lachlan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25704-9">https://doi.org/10.1007/978-3-642-25704-9</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1706422025-02-07T07:01:39Z2025-02-07T07:01:39Zby Fischer-Hübner, Simone. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32287-7">https://doi.org/10.1007/978-3-642-32287-7</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1706452025-02-07T07:01:39Z2025-02-07T07:01:39Zby Miri, Ali. editor.<br/><a href="https://doi.org/10.1007/978-3-642-28496-0">https://doi.org/10.1007/978-3-642-28496-0</a><br/>Format: Electronic Resources<br/>Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papersent://SD_ILS/0/SD_ILS:1707502025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jung, Souhwan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-27890-7">https://doi.org/10.1007/978-3-642-27890-7</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2012 Confederated International Conferences: CoopIS, DOA-SVI, and ODBASE 2012, Rome, Italy, September 10-14, 2012. Proceedings, Part Ient://SD_ILS/0/SD_ILS:1707522025-02-07T07:01:39Z2025-02-07T07:01:39Zby Meersman, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33606-5">https://doi.org/10.1007/978-3-642-33606-5</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing First European Conference, ESOCC 2012, Bertinoro, Italy, September 19-21, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1707672025-02-07T07:01:39Z2025-02-07T07:01:39Zby De Paoli, Flavio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33427-6">https://doi.org/10.1007/978-3-642-33427-6</a><br/>Format: Electronic Resources<br/>Trusted Systems 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1709492025-02-07T07:01:39Z2025-02-07T07:01:39Zby Mitchell, Chris J. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35371-0">https://doi.org/10.1007/978-3-642-35371-0</a><br/>Format: Electronic Resources<br/>Formal Aspects of Security and Trust 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papersent://SD_ILS/0/SD_ILS:1711062025-02-07T07:01:39Z2025-02-07T07:01:39Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29420-4">https://doi.org/10.1007/978-3-642-29420-4</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1711552025-02-07T07:01:39Z2025-02-07T07:01:39Zby Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33627-0">https://doi.org/10.1007/978-3-642-33627-0</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1719822025-02-07T07:01:39Z2025-02-07T07:01:39Zby Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142<br/><a href="https://doi.org/10.1007/978-3-642-33678-2">https://doi.org/10.1007/978-3-642-33678-2</a><br/>Format: Electronic Resources<br/>Trusted Systems Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1724182025-02-07T07:01:39Z2025-02-07T07:01:39Zby Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32298-3">https://doi.org/10.1007/978-3-642-32298-3</a><br/>Format: Electronic Resources<br/>Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1718542025-02-07T07:01:39Z2025-02-07T07:01:39Zby Lee, Dong Hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35416-8">https://doi.org/10.1007/978-3-642-35416-8</a><br/>Format: Electronic Resources<br/>Advanced Computing, Networking and Security International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1726172025-02-07T07:01:39Z2025-02-07T07:01:39Zby Thilagam, P. Santhi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29280-4">https://doi.org/10.1007/978-3-642-29280-4</a><br/>Format: Electronic Resources<br/>Network and System Security 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedingsent://SD_ILS/0/SD_ILS:1735112025-02-07T07:01:39Z2025-02-07T07:01:39Zby Xu, Li. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34601-9">https://doi.org/10.1007/978-3-642-34601-9</a><br/>Format: Electronic Resources<br/>Secure Data Management 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1731432025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jonker, Willem. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32873-2">https://doi.org/10.1007/978-3-642-32873-2</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1734562025-02-07T07:01:39Z2025-02-07T07:01:39Zby Grossklags, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34266-0">https://doi.org/10.1007/978-3-642-34266-0</a><br/>Format: Electronic Resources<br/>Future Security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1735462025-02-07T07:01:39Z2025-02-07T07:01:39Zby Aschenbruck, Nils. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33161-9">https://doi.org/10.1007/978-3-642-33161-9</a><br/>Format: Electronic Resources<br/>Information Security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1744022025-02-07T07:01:39Z2025-02-07T07:01:39Zby Gollmann, Dieter. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33383-5">https://doi.org/10.1007/978-3-642-33383-5</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics VIII 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1615962025-02-07T07:01:39Z2025-02-07T07:01:39Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33962-2">https://doi.org/10.1007/978-3-642-33962-2</a><br/>Format: Electronic Resources<br/>Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1621762025-02-07T07:01:39Z2025-02-07T07:01:39Zby Lee, Geuk. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32692-9">https://doi.org/10.1007/978-3-642-32692-9</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1631632025-02-07T07:01:39Z2025-02-07T07:01:39Zby Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35764-0">https://doi.org/10.1007/978-3-642-35764-0</a><br/>Format: Electronic Resources<br/>RFID Security and Privacy 7th International Workshop, RFIDsec 2011, Amherst, MA, USA, June 26-28, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1583442025-02-07T07:01:39Z2025-02-07T07:01:39Zby Juels, Ari. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25286-0">https://doi.org/10.1007/978-3-642-25286-0</a><br/>Format: Electronic Resources<br/>ICT Critical Infrastructures and Society 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1588642025-02-07T07:01:39Z2025-02-07T07:01:39Zby David Hercheui, Magda. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33332-3">https://doi.org/10.1007/978-3-642-33332-3</a><br/>Format: Electronic Resources<br/>Trustworthy Ubiquitous Computingent://SD_ILS/0/SD_ILS:1597202025-02-07T07:01:39Z2025-02-07T07:01:39Zby Khalil, Ismail. editor.<br/><a href="https://doi.org/10.2991/978-94-91216-71-8">https://doi.org/10.2991/978-94-91216-71-8</a><br/>Format: Electronic Resources<br/>Web Information Systems and Mining International Conference, WISM 2012, Chengdu, China, October 26-28, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1744742025-02-07T07:01:39Z2025-02-07T07:01:39Zby Wang, Wu Lee. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33469-6">https://doi.org/10.1007/978-3-642-33469-6</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1752602025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bononi, Luciano. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25959-3">https://doi.org/10.1007/978-3-642-25959-3</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1760812025-02-07T07:01:39Z2025-02-07T07:01:39Zby Xiang, Yang. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35362-8">https://doi.org/10.1007/978-3-642-35362-8</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1756402025-02-07T07:01:39Z2025-02-07T07:01:39Zby Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-27585-2">https://doi.org/10.1007/978-3-642-27585-2</a><br/>Format: Electronic Resources<br/>E-Voting and Identity Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1765802025-02-07T07:01:39Z2025-02-07T07:01:39Zby Kiayias, Aggelos. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32747-6">https://doi.org/10.1007/978-3-642-32747-6</a><br/>Format: Electronic Resources<br/>Global Security, Safety, and Sustainability 7th International and 4th e-Democracy Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1772052025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33448-1">https://doi.org/10.1007/978-3-642-33448-1</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security VIIIent://SD_ILS/0/SD_ILS:1772442025-02-07T07:01:39Z2025-02-07T07:01:39Zby Shi, Yun Q. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31971-6">https://doi.org/10.1007/978-3-642-31971-6</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1775422025-02-07T07:01:39Z2025-02-07T07:01:39Zby Gladyshev, Pavel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35515-8">https://doi.org/10.1007/978-3-642-35515-8</a><br/>Format: Electronic Resources<br/>Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1646082025-02-07T07:01:39Z2025-02-07T07:01:39Zby Lei, Jingsheng. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35211-9">https://doi.org/10.1007/978-3-642-35211-9</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011. Revised Selected Papersent://SD_ILS/0/SD_ILS:1677382025-02-07T07:01:39Z2025-02-07T07:01:39Zby Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35755-8">https://doi.org/10.1007/978-3-642-35755-8</a><br/>Format: Electronic Resources<br/>Smart Mobile Apps Mit Business-Apps ins Zeitalter mobiler Geschäftsprozesseent://SD_ILS/0/SD_ILS:1903992025-02-07T07:01:39Z2025-02-07T07:01:39Zby Verclas, Stephan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22259-7">https://doi.org/10.1007/978-3-642-22259-7</a><br/>Format: Electronic Resources<br/>Achieving Systems Safety Proceedings of the Twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012ent://SD_ILS/0/SD_ILS:1388792025-02-07T07:01:39Z2025-02-07T07:01:39Zby Dale, Chris. editor.<br/><a href="https://doi.org/10.1007/978-1-4471-2494-8">https://doi.org/10.1007/978-1-4471-2494-8</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 7th International ICST Conference, SecureComm 2011, London, September 7-9, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1404932025-02-07T07:01:39Z2025-02-07T07:01:39Zby Rajarajan, Muttukrishnan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31909-9">https://doi.org/10.1007/978-3-642-31909-9</a><br/>Format: Electronic Resources<br/>Provable Security 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1406512025-02-07T07:01:39Z2025-02-07T07:01:39Zby Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33272-2">https://doi.org/10.1007/978-3-642-33272-2</a><br/>Format: Electronic Resources<br/>Wired / Wireless Internet Communication 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1429082025-02-07T07:01:39Z2025-02-07T07:01:39Zby Koucheryavy, Yevgeni. editor. (orcid)0000-0003-3976-297X<br/><a href="https://doi.org/10.1007/978-3-642-30630-3">https://doi.org/10.1007/978-3-642-30630-3</a><br/>Format: Electronic Resources<br/>Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1437232025-02-07T07:01:39Z2025-02-07T07:01:39Zby Lee, Geuk. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32645-5">https://doi.org/10.1007/978-3-642-32645-5</a><br/>Format: Electronic Resources<br/>Emerging Trends and Applications in Information Communication Technologies Second International Multi Topic Conference, IMTIC 2012, Jamshoro, Pakistan, March 28-30, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1436492025-02-07T07:01:39Z2025-02-07T07:01:39Zby Chowdhry, Bhawani Shankar. editor.<br/><a href="https://doi.org/10.1007/978-3-642-28962-0">https://doi.org/10.1007/978-3-642-28962-0</a><br/>Format: Electronic Resources<br/>Programming Languages and Systems 10th Asian Symposium, APLAS 2012, Kyoto, Japan, December 11-13, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1450972025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jhala, Ranjit. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35182-2">https://doi.org/10.1007/978-3-642-35182-2</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1494782025-02-07T07:01:39Z2025-02-07T07:01:39Zby Xiang, Yang. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34883-9">https://doi.org/10.1007/978-3-642-34883-9</a><br/>Format: Electronic Resources<br/>Internet of Things International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1492222025-02-07T07:01:39Z2025-02-07T07:01:39Zby Wang, Yongheng. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32427-7">https://doi.org/10.1007/978-3-642-32427-7</a><br/>Format: Electronic Resources<br/>Modeling Decisions for Artificial Intelligence 9th International Conference, MDAI 2012, Girona, Catalonia, Spain, November 21-23, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1501332025-02-07T07:01:39Z2025-02-07T07:01:39Zby Torra, Vincenc. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34620-0">https://doi.org/10.1007/978-3-642-34620-0</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defenseent://SD_ILS/0/SD_ILS:1508792025-02-07T07:01:39Z2025-02-07T07:01:39Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-642-28920-0">https://doi.org/10.1007/978-3-642-28920-0</a><br/>Format: Electronic Resources<br/>Mobile Phone Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:1510092025-02-07T07:01:39Z2025-02-07T07:01:39Zby Androulidakis, I.I. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1650-0">https://doi.org/10.1007/978-1-4614-1650-0</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1514882025-02-07T07:01:39Z2025-02-07T07:01:39Zby Cuppens-Boulahia, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31540-4">https://doi.org/10.1007/978-3-642-31540-4</a><br/>Format: Electronic Resources<br/>Secure IT Systems 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1512452025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jøsang, Audun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34210-3">https://doi.org/10.1007/978-3-642-34210-3</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions and Defenses 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1516572025-02-07T07:01:39Z2025-02-07T07:01:39Zby Balzarotti, Davide. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33338-5">https://doi.org/10.1007/978-3-642-33338-5</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1451882025-02-07T07:01:39Z2025-02-07T07:01:39Zby Ryan, Mark D. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29101-2">https://doi.org/10.1007/978-3-642-29101-2</a><br/>Format: Electronic Resources<br/>Wireless Networks and Computational Intelligence 6th International Conference on Information Processing, ICIP 2012, Bangalore, India, August 10-12, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1470592025-02-07T07:01:39Z2025-02-07T07:01:39Zby Venugopal, K. R. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31686-9">https://doi.org/10.1007/978-3-642-31686-9</a><br/>Format: Electronic Resources<br/>Computer Networks 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1480382025-02-07T07:01:39Z2025-02-07T07:01:39Zby Kwiecien, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31217-5">https://doi.org/10.1007/978-3-642-31217-5</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1476702025-02-07T07:01:39Z2025-02-07T07:01:39Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33167-1">https://doi.org/10.1007/978-3-642-33167-1</a><br/>Format: Electronic Resources<br/>Business System Management and Engineering From Open Issues to Applicationsent://SD_ILS/0/SD_ILS:1352772025-02-07T07:01:39Z2025-02-07T07:01:39Zby Ardagna, Claudio Agostino. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32439-0">https://doi.org/10.1007/978-3-642-32439-0</a><br/>Format: Electronic Resources<br/>Information and Communication Technologies 18th EUNICE/IFIP WG 6.2, 6.6 International Conference, EUNICE 2012, Budapest, Hungary, August 29-31, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1353272025-02-07T07:01:39Z2025-02-07T07:01:39Zby Szabo, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32808-4">https://doi.org/10.1007/978-3-642-32808-4</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXV 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1702152025-02-07T07:01:39Z2025-02-07T07:01:39Zby Li, Yingjiu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22348-8">https://doi.org/10.1007/978-3-642-22348-8</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1701612025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-642-21031-0">https://doi.org/10.1007/978-3-642-21031-0</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1705372025-02-07T07:01:39Z2025-02-07T07:01:39Zby Baras, John S. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25280-8">https://doi.org/10.1007/978-3-642-25280-8</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security VIent://SD_ILS/0/SD_ILS:1706462025-02-07T07:01:39Z2025-02-07T07:01:39Zby Shi, Yun Q. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24556-5">https://doi.org/10.1007/978-3-642-24556-5</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 30th International Conference, SAFECOMP 2011, Naples, Italy, September 19-22, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1705422025-02-07T07:01:39Z2025-02-07T07:01:39Zby Flammini, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24270-0">https://doi.org/10.1007/978-3-642-24270-0</a><br/>Format: Electronic Resources<br/>Trusted Systems Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1712072025-02-07T07:01:39Z2025-02-07T07:01:39Zby Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25283-9">https://doi.org/10.1007/978-3-642-25283-9</a><br/>Format: Electronic Resources<br/>Dependable and Historic Computing Essays Dedicated to Brian Randell on the Occasion of his 75th Birthdayent://SD_ILS/0/SD_ILS:1720822025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jones, Cliff B. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24541-1">https://doi.org/10.1007/978-3-642-24541-1</a><br/>Format: Electronic Resources<br/>Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1740162025-02-07T07:01:39Z2025-02-07T07:01:39Zby Burmester, Mike. editor.<br/><a href="https://doi.org/10.1007/978-3-642-18178-8">https://doi.org/10.1007/978-3-642-18178-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- AFRICACRYPT 2011 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1724122025-02-07T07:01:39Z2025-02-07T07:01:39Zby Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757<br/><a href="https://doi.org/10.1007/978-3-642-21969-6">https://doi.org/10.1007/978-3-642-21969-6</a><br/>Format: Electronic Resources<br/>Open Research Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1720662025-02-07T07:01:39Z2025-02-07T07:01:39Zby Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-19228-9">https://doi.org/10.1007/978-3-642-19228-9</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 9th IFIP TC 6 International Conference, WWIC 2011, Vilanova i la Geltrú, Spain, June 15-17, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1747962025-02-07T07:01:39Z2025-02-07T07:01:39Zby Masip-Bruin, Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-642-21560-5">https://doi.org/10.1007/978-3-642-21560-5</a><br/>Format: Electronic Resources<br/>Secure and Trust Computing, Data Management, and Applications 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings, Part Ient://SD_ILS/0/SD_ILS:1747002025-02-07T07:01:39Z2025-02-07T07:01:39Zby Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-22339-6">https://doi.org/10.1007/978-3-642-22339-6</a><br/>Format: Electronic Resources<br/>Spyware and Adwareent://SD_ILS/0/SD_ILS:1539872025-02-07T07:01:39Z2025-02-07T07:01:39Zby Aycock, John. author.<br/><a href="https://doi.org/10.1007/978-0-387-77741-2">https://doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Advances in Systems Safety Proceedings of the Nineteenth Safety-Critical Systems Symposium, Southampton, UK, 8-10th February 2011ent://SD_ILS/0/SD_ILS:1546162025-02-07T07:01:39Z2025-02-07T07:01:39Zby Dale, Chris. editor.<br/><a href="https://doi.org/10.1007/978-0-85729-133-2">https://doi.org/10.1007/978-0-85729-133-2</a><br/>Format: Electronic Resources<br/>Model-Driven Risk Analysis The CORAS Approachent://SD_ILS/0/SD_ILS:1628982025-02-07T07:01:39Z2025-02-07T07:01:39Zby Lund, Mass Soldal. author.<br/><a href="https://doi.org/10.1007/978-3-642-12323-8">https://doi.org/10.1007/978-3-642-12323-8</a><br/>Format: Electronic Resources<br/>Counterterrorism and Open Source Intelligenceent://SD_ILS/0/SD_ILS:1638782025-02-07T07:01:39Z2025-02-07T07:01:39Zby Wiil, Uffe. editor.<br/><a href="https://doi.org/10.1007/978-3-7091-0388-3">https://doi.org/10.1007/978-3-7091-0388-3</a><br/>Format: Electronic Resources<br/>Advanced Research on Electronic Commerce, Web Application, and Communication International Conference, ECWAC 2011, Guangzhou, China, April 16-17, 2011. Proceedings, Part Ient://SD_ILS/0/SD_ILS:1595992025-02-07T07:01:39Z2025-02-07T07:01:39Zby Shen, Gang. editor.<br/><a href="https://doi.org/10.1007/978-3-642-20367-1">https://doi.org/10.1007/978-3-642-20367-1</a><br/>Format: Electronic Resources<br/>Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papersent://SD_ILS/0/SD_ILS:1744552025-02-07T07:01:39Z2025-02-07T07:01:39Zby Degano, Pierpaolo. editor.<br/><a href="https://doi.org/10.1007/978-3-642-19751-2">https://doi.org/10.1007/978-3-642-19751-2</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection V 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1754242025-02-07T07:01:39Z2025-02-07T07:01:39Zby Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24864-1">https://doi.org/10.1007/978-3-642-24864-1</a><br/>Format: Electronic Resources<br/>Information Security 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1769142025-02-07T07:01:39Z2025-02-07T07:01:39Zby Lai, Xuejia. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24861-0">https://doi.org/10.1007/978-3-642-24861-0</a><br/>Format: Electronic Resources<br/>Information Security Risk Management Risikomanagement mit ISO/IEC 27001, 27005 und 31010ent://SD_ILS/0/SD_ILS:1799172025-02-07T07:01:39Z2025-02-07T07:01:39Zby Klipper, Sebastian. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9870-8">https://doi.org/10.1007/978-3-8348-9870-8</a><br/>Format: Electronic Resources<br/>Apple's iPad im Enterprise-Einsatz Einsatzmöglichkeiten, Programmierung, Betrieb und Sicherheit im Unternehmenent://SD_ILS/0/SD_ILS:1805522025-02-07T07:01:39Z2025-02-07T07:01:39Zby Oelmaier, Florian. author.<br/><a href="https://doi.org/10.1007/978-3-642-15437-9">https://doi.org/10.1007/978-3-642-15437-9</a><br/>Format: Electronic Resources<br/>Metriken - der Schlüssel zum erfolgreichen Security und Compliance Monitoring Design, Implementierung und Validierung in der Praxisent://SD_ILS/0/SD_ILS:1809852025-02-07T07:01:39Z2025-02-07T07:01:39Zby Sowa, Aleksandra. author.<br/><a href="https://doi.org/10.1007/978-3-8348-8194-6">https://doi.org/10.1007/978-3-8348-8194-6</a><br/>Format: Electronic Resources<br/>IT-Notfallmanagement mit System Notfälle bei der Informationsverarbeitung sicher beherrschenent://SD_ILS/0/SD_ILS:1874722025-02-07T07:01:39Z2025-02-07T07:01:39Zby Klett, Gerhard. author.<br/><a href="https://doi.org/10.1007/978-3-8348-8226-4">https://doi.org/10.1007/978-3-8348-8226-4</a><br/>Format: Electronic Resources<br/>IT-Sicherheit mit System Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklungent://SD_ILS/0/SD_ILS:1839172025-02-07T07:01:39Z2025-02-07T07:01:39Zby Müller, Klaus-Rainer. author.<br/><a href="https://doi.org/10.1007/978-3-8348-8178-6">https://doi.org/10.1007/978-3-8348-8178-6</a><br/>Format: Electronic Resources<br/>Konzeption eines Systems zur überbetrieblichen Sammlung und Nutzung von quantitativen Daten über Informationssicherheitsvorfälleent://SD_ILS/0/SD_ILS:1836732025-02-07T07:01:39Z2025-02-07T07:01:39Zby Nowey, Thomas. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9873-9">https://doi.org/10.1007/978-3-8348-9873-9</a><br/>Format: Electronic Resources<br/>Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threatsent://SD_ILS/0/SD_ILS:1397532025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-0977-9">https://doi.org/10.1007/978-1-4614-0977-9</a><br/>Format: Electronic Resources<br/>Preserving Privacy in Data Outsourcingent://SD_ILS/0/SD_ILS:1431032025-02-07T07:01:39Z2025-02-07T07:01:39Zby Foresti, Sara. author.<br/><a href="https://doi.org/10.1007/978-1-4419-7659-8">https://doi.org/10.1007/978-1-4419-7659-8</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems -- CHES 2011 13th International Workshop, Nara, Japan, September 28 -- October 1, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1498782025-02-07T07:01:39Z2025-02-07T07:01:39Zby Preneel, Bart. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23951-9">https://doi.org/10.1007/978-3-642-23951-9</a><br/>Format: Electronic Resources<br/>Computer Networks 18th Conference, CN 2011, Ustron, Poland, June 14-18, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1516012025-02-07T07:01:39Z2025-02-07T07:01:39Zby Kwiecien, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-642-21771-5">https://doi.org/10.1007/978-3-642-21771-5</a><br/>Format: Electronic Resources<br/>Programming Languages and Systems 9th Asian Symposium, APLAS 2011, Kenting, Taiwan, December 5-7, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1474812025-02-07T07:01:39Z2025-02-07T07:01:39Zby Yang, Hongseok. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25318-8">https://doi.org/10.1007/978-3-642-25318-8</a><br/>Format: Electronic Resources<br/>Quantitative Security Risk Assessment of Enterprise Networksent://SD_ILS/0/SD_ILS:1471712025-02-07T07:01:39Z2025-02-07T07:01:39Zby Ou, Xinming. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1860-3">https://doi.org/10.1007/978-1-4614-1860-3</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 12th International Conference, ICDCN 2011, Bangalore, India, January 2-5, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1483812025-02-07T07:01:39Z2025-02-07T07:01:39Zby Aguilera, Marcos K. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17679-1">https://doi.org/10.1007/978-3-642-17679-1</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1350052025-02-07T07:01:39Z2025-02-07T07:01:39Zby Alcaraz Calero, Jose M. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23496-5">https://doi.org/10.1007/978-3-642-23496-5</a><br/>Format: Electronic Resources<br/>Trustworthy Internetent://SD_ILS/0/SD_ILS:1351922025-02-07T07:01:39Z2025-02-07T07:01:39Zby Blefari-Melazzi, Nicola. editor.<br/><a href="https://doi.org/10.1007/978-88-470-1818-1">https://doi.org/10.1007/978-88-470-1818-1</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1700482025-02-07T07:01:39Z2025-02-07T07:01:39Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11207-2">https://doi.org/10.1007/978-3-642-11207-2</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1695052025-02-07T07:01:39Z2025-02-07T07:01:39Zby Echizen, Isao. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16825-3">https://doi.org/10.1007/978-3-642-16825-3</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1703782025-02-07T07:01:39Z2025-02-07T07:01:39Zby Degano, Pierpaolo. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12459-4">https://doi.org/10.1007/978-3-642-12459-4</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 8th International Conference, WWIC 2010, Lulea, Sweden, June 1-3, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1697542025-02-07T07:01:39Z2025-02-07T07:01:39Zby Osipov, Evgeny. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13315-2">https://doi.org/10.1007/978-3-642-13315-2</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1703522025-02-07T07:01:39Z2025-02-07T07:01:39Zby Ors Yalcin, Siddika Berna. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16822-2">https://doi.org/10.1007/978-3-642-16822-2</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - AFRICACRYPT 2010 Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1707032025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bernstein, Daniel J. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12678-9">https://doi.org/10.1007/978-3-642-12678-9</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems -- CHES 2010 12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedingsent://SD_ILS/0/SD_ILS:1713792025-02-07T07:01:39Z2025-02-07T07:01:39Zby Mangard, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-15031-9">https://doi.org/10.1007/978-3-642-15031-9</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1711292025-02-07T07:01:39Z2025-02-07T07:01:39Zby Sendrier, Nicolas. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12929-2">https://doi.org/10.1007/978-3-642-12929-2</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papersent://SD_ILS/0/SD_ILS:1720872025-02-07T07:01:39Z2025-02-07T07:01:39Zby Hong, Seokhie. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13858-4">https://doi.org/10.1007/978-3-642-13858-4</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1723462025-02-07T07:01:39Z2025-02-07T07:01:39Zby Kant, Krishna. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11322-2">https://doi.org/10.1007/978-3-642-11322-2</a><br/>Format: Electronic Resources<br/>Understanding Cryptography A Textbook for Students and Practitionersent://SD_ILS/0/SD_ILS:1727452025-02-07T07:01:39Z2025-02-07T07:01:39Zby Paar, Christof. author.<br/><a href="https://doi.org/10.1007/978-3-642-04101-3">https://doi.org/10.1007/978-3-642-04101-3</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security Vent://SD_ILS/0/SD_ILS:1735382025-02-07T07:01:39Z2025-02-07T07:01:39Zby Shi, Yun Q. editor.<br/><a href="https://doi.org/10.1007/978-3-642-14298-7">https://doi.org/10.1007/978-3-642-14298-7</a><br/>Format: Electronic Resources<br/>Electronic Healthcare Information Securityent://SD_ILS/0/SD_ILS:1541652025-02-07T07:01:39Z2025-02-07T07:01:39Zby Shoniregun, Charles A. author.<br/><a href="https://doi.org/10.1007/978-0-387-84919-5">https://doi.org/10.1007/978-0-387-84919-5</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection and Prevention Concepts and Techniquesent://SD_ILS/0/SD_ILS:1542482025-02-07T07:01:39Z2025-02-07T07:01:39Zby Ghorbani, Ali A. author.<br/><a href="https://doi.org/10.1007/978-0-387-88771-5">https://doi.org/10.1007/978-0-387-88771-5</a><br/>Format: Electronic Resources<br/>Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1579412025-02-07T07:01:39Z2025-02-07T07:01:39Zby Weerasinghe, Dasun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11530-1">https://doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Electronic Resources<br/>Security for Web Services and Service-Oriented Architecturesent://SD_ILS/0/SD_ILS:1651662025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bertino, Elisa. author.<br/><a href="https://doi.org/10.1007/978-3-540-87742-4">https://doi.org/10.1007/978-3-540-87742-4</a><br/>Format: Electronic Resources<br/>Computer Networks 17th Conference, CN 2010, Ustron, Poland, June 15-19, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1652052025-02-07T07:01:39Z2025-02-07T07:01:39Zby Kwiecien, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13861-4">https://doi.org/10.1007/978-3-642-13861-4</a><br/>Format: Electronic Resources<br/>Privacy and Anonymity in Information Management Systems New Techniques for New Practical Problemsent://SD_ILS/0/SD_ILS:1659102025-02-07T07:01:39Z2025-02-07T07:01:39Zby Nin, Jordi. editor.<br/><a href="https://doi.org/10.1007/978-1-84996-238-4">https://doi.org/10.1007/978-1-84996-238-4</a><br/>Format: Electronic Resources<br/>sicher & mobil Sicherheit in der drahtlosen Kommunikationent://SD_ILS/0/SD_ILS:1792622025-02-07T07:01:39Z2025-02-07T07:01:39Zby Osterhage, Wolfgang W. author.<br/><a href="https://doi.org/10.1007/978-3-642-03083-3">https://doi.org/10.1007/978-3-642-03083-3</a><br/>Format: Electronic Resources<br/>Security in Embedded Devicesent://SD_ILS/0/SD_ILS:1379972025-02-07T07:01:39Z2025-02-07T07:01:39Zby Gebotys, Catherine H. author.<br/><a href="https://doi.org/10.1007/978-1-4419-1530-6">https://doi.org/10.1007/978-1-4419-1530-6</a><br/>Format: Electronic Resources<br/>Cyber Situational Awareness Issues and Researchent://SD_ILS/0/SD_ILS:1379512025-02-07T07:01:39Z2025-02-07T07:01:39Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-0140-8">https://doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Electronic Resources<br/>Open Source Software for Digital Forensicsent://SD_ILS/0/SD_ILS:1382272025-02-07T07:01:39Z2025-02-07T07:01:39Zby Huebner, Ewa. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-5803-7">https://doi.org/10.1007/978-1-4419-5803-7</a><br/>Format: Electronic Resources<br/>Insider Threats in Cyber Securityent://SD_ILS/0/SD_ILS:1384042025-02-07T07:01:39Z2025-02-07T07:01:39Zby Probst, Christian W. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-7133-3">https://doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1405452025-02-07T07:01:39Z2025-02-07T07:01:39Zby Xie, Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16576-4">https://doi.org/10.1007/978-3-642-16576-4</a><br/>Format: Electronic Resources<br/>Machine Learning and Systems Engineeringent://SD_ILS/0/SD_ILS:1502012025-02-07T07:01:39Z2025-02-07T07:01:39Zby Ao, Sio-Iong. editor.<br/><a href="https://doi.org/10.1007/978-90-481-9419-3">https://doi.org/10.1007/978-90-481-9419-3</a><br/>Format: Electronic Resources<br/>Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1504512025-02-07T07:01:39Z2025-02-07T07:01:39Zby Kurosawa, Kaoru. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16280-0">https://doi.org/10.1007/978-3-642-16280-0</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2010, Corfu, Greece, September 22-24, 2010, Proceedingsent://SD_ILS/0/SD_ILS:1472822025-02-07T07:01:39Z2025-02-07T07:01:39Zby Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-642-15838-4">https://doi.org/10.1007/978-3-642-15838-4</a><br/>Format: Electronic Resources<br/>Making Systems Safer Proceedings of the Eighteenth Safety-Critical Systems Symposium, Bristol, UK, 9-11th February 2010ent://SD_ILS/0/SD_ILS:1479942025-02-07T07:01:39Z2025-02-07T07:01:39Zby Dale, Chris. editor.<br/><a href="https://doi.org/10.1007/978-1-84996-086-1">https://doi.org/10.1007/978-1-84996-086-1</a><br/>Format: Electronic Resources<br/>Programming Languages and Systems 8th Asian Symposium, APLAS 2010, Shanghai, China, November 28 - December 1, 2010 Proceedingsent://SD_ILS/0/SD_ILS:1478232025-02-07T07:01:39Z2025-02-07T07:01:39Zby Ueda, Kazunori. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17164-2">https://doi.org/10.1007/978-3-642-17164-2</a><br/>Format: Electronic Resources<br/>I contenuti digitali tecnologie, diritti e libertàent://SD_ILS/0/SD_ILS:1352232025-02-07T07:01:39Z2025-02-07T07:01:39Zby Lucchi, Nicola. author.<br/><a href="https://doi.org/10.1007/978-88-470-1399-5">https://doi.org/10.1007/978-88-470-1399-5</a><br/>Format: Electronic Resources<br/>Security Informaticsent://SD_ILS/0/SD_ILS:1355522025-02-07T07:01:39Z2025-02-07T07:01:39Zby Yang, Christopher C. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-1325-8">https://doi.org/10.1007/978-1-4419-1325-8</a><br/>Format: Electronic Resources<br/>Secure Integrated Circuits and Systemsent://SD_ILS/0/SD_ILS:1364952025-02-07T07:01:39Z2025-02-07T07:01:39Zby Verbauwhede, Ingrid M.R. editor.<br/><a href="https://doi.org/10.1007/978-0-387-71829-3">https://doi.org/10.1007/978-0-387-71829-3</a><br/>Format: Electronic Resources<br/>Handbuch Unternehmenssicherheit Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit Systement://SD_ILS/0/SD_ILS:1926772025-02-07T07:01:39Z2025-02-07T07:01:39Zby Müller, Klaus-Rainer. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9772-5">https://doi.org/10.1007/978-3-8348-9772-5</a><br/>Format: Electronic Resources<br/>Protecting Privacy in Video Surveillanceent://SD_ILS/0/SD_ILS:1692052025-02-07T07:01:39Z2025-02-07T07:01:39Zby Senior, Andrew. editor.<br/><a href="https://doi.org/10.1007/978-1-84882-301-3">https://doi.org/10.1007/978-1-84882-301-3</a><br/>Format: Electronic Resources<br/>Active and Programmable Networks IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005, Revised Papersent://SD_ILS/0/SD_ILS:1697922025-02-07T07:01:39Z2025-02-07T07:01:39Zby Hutchison, David. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00972-3">https://doi.org/10.1007/978-3-642-00972-3</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1698842025-02-07T07:01:39Z2025-02-07T07:01:39Zby Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04846-3">https://doi.org/10.1007/978-3-642-04846-3</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1701152025-02-07T07:01:39Z2025-02-07T07:01:39Zby Buth, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04468-7">https://doi.org/10.1007/978-3-642-04468-7</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1701432025-02-07T07:01:39Z2025-02-07T07:01:39Zby González Nieto, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02704-8">https://doi.org/10.1007/978-3-642-02704-8</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 7th International Conference, WWIC 2009, Enschede, The Netherlands, May 27-29 2009, Proceedingsent://SD_ILS/0/SD_ILS:1702452025-02-07T07:01:39Z2025-02-07T07:01:39Zby van den Berg, Hans. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02118-3">https://doi.org/10.1007/978-3-642-02118-3</a><br/>Format: Electronic Resources<br/>Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1724862025-02-07T07:01:39Z2025-02-07T07:01:39Zby Park, James (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-02617-1">https://doi.org/10.1007/978-3-642-02617-1</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2009 Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part IIent://SD_ILS/0/SD_ILS:1725062025-02-07T07:01:39Z2025-02-07T07:01:39Zby Meersman, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-05151-7">https://doi.org/10.1007/978-3-642-05151-7</a><br/>Format: Electronic Resources<br/>Programming Languages and Systems 7th Asian Symposium, APLAS 2009, Seoul, Korea, December 14-16, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1703662025-02-07T07:01:39Z2025-02-07T07:01:39Zby Hu, Zhenjiang. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10672-9">https://doi.org/10.1007/978-3-642-10672-9</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1711932025-02-07T07:01:39Z2025-02-07T07:01:39Zby Abdalla, Michel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01957-9">https://doi.org/10.1007/978-3-642-01957-9</a><br/>Format: Electronic Resources<br/>Integrated Management of Systems, Services, Processes and People in IT 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2009, Venice, Italy, October 27-28, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1708752025-02-07T07:01:39Z2025-02-07T07:01:39Zby Bartolini, Claudio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04989-7">https://doi.org/10.1007/978-3-642-04989-7</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008ent://SD_ILS/0/SD_ILS:1713592025-02-07T07:01:39Z2025-02-07T07:01:39Zby Setola, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03552-4">https://doi.org/10.1007/978-3-642-03552-4</a><br/>Format: Electronic Resources<br/>Future Generation Information Technology First International Conference, FGIT 2009, Jeju Island, Korea, December 10-12,2009, Proceedingsent://SD_ILS/0/SD_ILS:1721242025-02-07T07:01:39Z2025-02-07T07:01:39Zby Lee, Young Hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10509-8">https://doi.org/10.1007/978-3-642-10509-8</a><br/>Format: Electronic Resources<br/>