Search Results for Security systems. - Narrowed by: Data protection. SirsiDynix Enterprise http://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dSecurity$002bsystems.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2025-02-07T07:01:39Z Online Business Security Systems ent://SD_ILS/0/SD_ILS:153355 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Williams, Godfried B. author.<br/><a href="https://doi.org/10.1007/978-0-387-68850-3">https://doi.org/10.1007/978-0-387-68850-3</a><br/>Format:&#160;Electronic Resources<br/> Security for Cloud Storage Systems ent://SD_ILS/0/SD_ILS:156774 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Yang, Kan. author.<br/><a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format:&#160;Electronic Resources<br/> Open Source Systems Security Certification ent://SD_ILS/0/SD_ILS:136588 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Damiani, Ernesto. author. (orcid)0000-0002-9557-6496<br/><a href="https://doi.org/10.1007/978-0-387-77324-7">https://doi.org/10.1007/978-0-387-77324-7</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:157732 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Nepal, Surya. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:171486 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Teufel, Stephanie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:173381 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Cuppens-Boulahia, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:157934 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Martinez Perez, Gregorio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:160080 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Kotulski, Zbigniew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings ent://SD_ILS/0/SD_ILS:177032 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Prakash, Atul. editor.<br/><a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 -- October 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:143913 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Felber, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11764-5">https://doi.org/10.1007/978-3-319-11764-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:169488 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Cavallaro, Lorenzo. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38530-8">https://doi.org/10.1007/978-3-642-38530-8</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings ent://SD_ILS/0/SD_ILS:170119 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bagchi, Aditya. editor.<br/><a href="https://doi.org/10.1007/978-3-642-45204-8">https://doi.org/10.1007/978-3-642-45204-8</a><br/>Format:&#160;Electronic Resources<br/> Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security ent://SD_ILS/0/SD_ILS:161736 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Korzun, Dmitry. author.<br/><a href="https://doi.org/10.1007/978-1-4614-5483-0">https://doi.org/10.1007/978-1-4614-5483-0</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 15th International Symposium, SSS 2013, Osaka, Japan, November 13-16, 2013. Proceedings ent://SD_ILS/0/SD_ILS:144008 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Higashino, Teruo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-03089-0">https://doi.org/10.1007/978-3-319-03089-0</a><br/>Format:&#160;Electronic Resources<br/> Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedings ent://SD_ILS/0/SD_ILS:150008 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Cuzzocrea, Alfredo. editor. (orcid)0000-0002-7104-6415<br/><a href="https://doi.org/10.1007/978-3-642-40511-2">https://doi.org/10.1007/978-3-642-40511-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security Technology for Applications 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:169542 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Laud, Peeter. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29615-4">https://doi.org/10.1007/978-3-642-29615-4</a><br/>Format:&#160;Electronic Resources<br/> Security and Intelligent Information Systems International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:169927 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bouvry, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25261-7">https://doi.org/10.1007/978-3-642-25261-7</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012, Proceedings ent://SD_ILS/0/SD_ILS:169636 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Richa, Andr&eacute;a W. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33536-5">https://doi.org/10.1007/978-3-642-33536-5</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings ent://SD_ILS/0/SD_ILS:172097 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Venkatakrishnan, Venkat. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35130-3">https://doi.org/10.1007/978-3-642-35130-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012, Proceedings ent://SD_ILS/0/SD_ILS:142915 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30955-7">https://doi.org/10.1007/978-3-642-30955-7</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012, Proceedings ent://SD_ILS/0/SD_ILS:144087 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Thampi, Sabu M. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34135-9">https://doi.org/10.1007/978-3-642-34135-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:150897 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Aura, Tuomas. editor.<br/><a href="https://doi.org/10.1007/978-3-642-27937-9">https://doi.org/10.1007/978-3-642-27937-9</a><br/>Format:&#160;Electronic Resources<br/> Multidisciplinary Research and Practice for Informations Systems IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012, Proceedings ent://SD_ILS/0/SD_ILS:147266 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Quirchmayer, Gerald. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32498-7">https://doi.org/10.1007/978-3-642-32498-7</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Pevised Selected Papers ent://SD_ILS/0/SD_ILS:135267 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Schmidt, Andreas U. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33392-7">https://doi.org/10.1007/978-3-642-33392-7</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings ent://SD_ILS/0/SD_ILS:173345 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25560-1">https://doi.org/10.1007/978-3-642-25560-1</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-M&aacute;laga, Spain, June 8-10, 2011, Proceedings ent://SD_ILS/0/SD_ILS:144186 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Herrero, &Aacute;lvaro. editor.<br/><a href="https://doi.org/10.1007/978-3-642-21323-6">https://doi.org/10.1007/978-3-642-21323-6</a><br/>Format:&#160;Electronic Resources<br/> Security Trends for FPGAS From Secured to Secure Reconfigurable Systems ent://SD_ILS/0/SD_ILS:145574 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Badrignans, Benoit. editor.<br/><a href="https://doi.org/10.1007/978-94-007-1338-3">https://doi.org/10.1007/978-94-007-1338-3</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 13th International Symposium, SSS 2011, Grenoble, France, October 10-12, 2011, Proceedings ent://SD_ILS/0/SD_ILS:146811 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;D&eacute;fago, Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24550-3">https://doi.org/10.1007/978-3-642-24550-3</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 ent://SD_ILS/0/SD_ILS:170014 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Jha, Somesh. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17714-9">https://doi.org/10.1007/978-3-642-17714-9</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010, Proceedings ent://SD_ILS/0/SD_ILS:170470 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16023-3">https://doi.org/10.1007/978-3-642-16023-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings ent://SD_ILS/0/SD_ILS:175331 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Samarati, Pierangela. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12368-9">https://doi.org/10.1007/978-3-642-12368-9</a><br/>Format:&#160;Electronic Resources<br/> Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:150903 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Gu, Qijun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11526-4">https://doi.org/10.1007/978-3-642-11526-4</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings ent://SD_ILS/0/SD_ILS:171195 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Guerraoui, Rachid. editor.<br/><a href="https://doi.org/10.1007/978-3-642-05118-0">https://doi.org/10.1007/978-3-642-05118-0</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing Systems Challenges, Approaches and Solutions ent://SD_ILS/0/SD_ILS:173525 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Biskup, Joachim. author.<br/><a href="https://doi.org/10.1007/978-3-540-78442-5">https://doi.org/10.1007/978-3-540-78442-5</a><br/>Format:&#160;Electronic Resources<br/> Security Engineering for Vehicular IT Systems Improving the Trustworthiness and Dependability of Automotive IT Applications ent://SD_ILS/0/SD_ILS:160829 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Wolf, Marko. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9581-3">https://doi.org/10.1007/978-3-8348-9581-3</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings ent://SD_ILS/0/SD_ILS:177010 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Prakash, Atul. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10772-6">https://doi.org/10.1007/978-3-642-10772-6</a><br/>Format:&#160;Electronic Resources<br/> Safety and Security in Multiagent Systems Research Results from 2004-2006 ent://SD_ILS/0/SD_ILS:138730 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Barley, Mike. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04879-1">https://doi.org/10.1007/978-3-642-04879-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings ent://SD_ILS/0/SD_ILS:143331 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Markowitch, Olivier. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03944-7">https://doi.org/10.1007/978-3-642-03944-7</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings ent://SD_ILS/0/SD_ILS:172594 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Sekar, R. editor.<br/><a href="https://doi.org/10.1007/978-3-540-89862-7">https://doi.org/10.1007/978-3-540-89862-7</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings ent://SD_ILS/0/SD_ILS:172282 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;McDaniel, Patrick. editor.<br/><a href="https://doi.org/10.1007/978-3-540-77086-2">https://doi.org/10.1007/978-3-540-77086-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 ent://SD_ILS/0/SD_ILS:172600 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Sauveron, Damien. editor.<br/><a href="https://doi.org/10.1007/978-3-540-72354-7">https://doi.org/10.1007/978-3-540-72354-7</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings ent://SD_ILS/0/SD_ILS:170349 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bagchi, Aditya. editor.<br/><a href="https://doi.org/10.1007/11961635">https://doi.org/10.1007/11961635</a><br/>Format:&#160;Electronic Resources<br/> Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ent://SD_ILS/0/SD_ILS:152076 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Pejas, Jerzy. editor.<br/><a href="https://doi.org/10.1007/b101135">https://doi.org/10.1007/b101135</a><br/>Format:&#160;Electronic Resources<br/> Cyberpatterns Unifying Design Patterns with Security and Attack Patterns ent://SD_ILS/0/SD_ILS:168321 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Blackwell, Clive. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04447-7">https://doi.org/10.1007/978-3-319-04447-7</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 ent://SD_ILS/0/SD_ILS:169035 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Krishnan, G. Sai Sundara. editor.<br/><a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format:&#160;Electronic Resources<br/> Touchless Palmprint Recognition Systems ent://SD_ILS/0/SD_ILS:168836 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Genovese, Angelo. author.<br/><a href="https://doi.org/10.1007/978-3-319-10365-5">https://doi.org/10.1007/978-3-319-10365-5</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings ent://SD_ILS/0/SD_ILS:169688 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format:&#160;Electronic Resources<br/> Information and Communication Technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:169727 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Linawati. editor.<br/><a href="https://doi.org/10.1007/978-3-642-55032-4">https://doi.org/10.1007/978-3-642-55032-4</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Future Internet Services and Systems Current Research ent://SD_ILS/0/SD_ILS:169856 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Heisel, Maritta. editor.<br/><a href="https://doi.org/10.1007/978-3-319-07452-8">https://doi.org/10.1007/978-3-319-07452-8</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:169861 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Preneel, Bart. editor.<br/><a href="https://doi.org/10.1007/978-3-319-06749-0">https://doi.org/10.1007/978-3-319-06749-0</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented and Cloud Computing Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:170712 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Villari, Massimo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-44879-3">https://doi.org/10.1007/978-3-662-44879-3</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:171229 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Cuellar, Jorge. editor.<br/><a href="https://doi.org/10.1007/978-3-319-10329-7">https://doi.org/10.1007/978-3-319-10329-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings ent://SD_ILS/0/SD_ILS:171070 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11257-2">https://doi.org/10.1007/978-3-319-11257-2</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings ent://SD_ILS/0/SD_ILS:171150 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097<br/><a href="https://doi.org/10.1007/978-3-319-12601-2">https://doi.org/10.1007/978-3-319-12601-2</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems -- CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:171449 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Batina, Lejla. editor. (orcid)0000-0003-0727-3573<br/><a href="https://doi.org/10.1007/978-3-662-44709-3">https://doi.org/10.1007/978-3-662-44709-3</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:171469 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-45917-1">https://doi.org/10.1007/978-3-662-45917-1</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:172038 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Au, Man Ho. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11698-3">https://doi.org/10.1007/978-3-319-11698-3</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:172343 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-12778-1">https://doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/> On the Move to Meaningful Internet Systems: OTM 2014 Conferences Confederated International Conferences: CoopIS and ODBASE 2014, Amantea, Italy, October 27-31, 2014. Proceedings ent://SD_ILS/0/SD_ILS:171869 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Meersman, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-662-45563-0">https://doi.org/10.1007/978-3-662-45563-0</a><br/>Format:&#160;Electronic Resources<br/> The Hash Function BLAKE ent://SD_ILS/0/SD_ILS:162781 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Aumasson, Jean-Philippe. author.<br/><a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Wireless Environments: Detecting and Localizing User Spoofing ent://SD_ILS/0/SD_ILS:163505 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Yang, Jie. author.<br/><a href="https://doi.org/10.1007/978-3-319-07356-9">https://doi.org/10.1007/978-3-319-07356-9</a><br/>Format:&#160;Electronic Resources<br/> Trusted Cloud Computing ent://SD_ILS/0/SD_ILS:163893 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Krcmar, Helmut. editor.<br/><a href="https://doi.org/10.1007/978-3-319-12718-7">https://doi.org/10.1007/978-3-319-12718-7</a><br/>Format:&#160;Electronic Resources<br/> Secure Cloud Computing ent://SD_ILS/0/SD_ILS:157815 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-9278-8">https://doi.org/10.1007/978-1-4614-9278-8</a><br/>Format:&#160;Electronic Resources<br/> Virtualization Techniques for Mobile Systems ent://SD_ILS/0/SD_ILS:157877 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Jaramillo, David. author.<br/><a href="https://doi.org/10.1007/978-3-319-05741-5">https://doi.org/10.1007/978-3-319-05741-5</a><br/>Format:&#160;Electronic Resources<br/> Future Business Software Current Trends in Business Software Development ent://SD_ILS/0/SD_ILS:174728 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Brunetti, Gino. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04144-5">https://doi.org/10.1007/978-3-319-04144-5</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014, Proceedings ent://SD_ILS/0/SD_ILS:176579 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Atluri, Vijay. editor.<br/><a href="https://doi.org/10.1007/978-3-662-43936-4">https://doi.org/10.1007/978-3-662-43936-4</a><br/>Format:&#160;Electronic Resources<br/> Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems ent://SD_ILS/0/SD_ILS:177528 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Hong, Y.-W. Peter. author.<br/><a href="https://doi.org/10.1007/978-981-4560-14-6">https://doi.org/10.1007/978-981-4560-14-6</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Systems for Human Cognition Augmentation ent://SD_ILS/0/SD_ILS:164252 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Pino, Robinson E. editor.<br/><a href="https://doi.org/10.1007/978-3-319-10374-7">https://doi.org/10.1007/978-3-319-10374-7</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:165964 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Proudler, Graeme. author.<br/><a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:166128 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-662-44788-8">https://doi.org/10.1007/978-3-662-44788-8</a><br/>Format:&#160;Electronic Resources<br/> Advanced Information Systems Engineering Workshops CAiSE 2014 International Workshops, Thessaloniki, Greece, June 16-20, 2014, Proceedings ent://SD_ILS/0/SD_ILS:166822 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Iliadis, Lazaros. editor.<br/><a href="https://doi.org/10.1007/978-3-319-07869-4">https://doi.org/10.1007/978-3-319-07869-4</a><br/>Format:&#160;Electronic Resources<br/> Secure Smart Embedded Devices, Platforms and Applications ent://SD_ILS/0/SD_ILS:139323 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Markantonakis, Konstantinos. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-7915-4">https://doi.org/10.1007/978-1-4614-7915-4</a><br/>Format:&#160;Electronic Resources<br/> Distributed Denial of Service Attack and Defense ent://SD_ILS/0/SD_ILS:139913 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Yu, Shui. author.<br/><a href="https://doi.org/10.1007/978-1-4614-9491-1">https://doi.org/10.1007/978-1-4614-9491-1</a><br/>Format:&#160;Electronic Resources<br/> Advanced API Security Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE ent://SD_ILS/0/SD_ILS:140834 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Siriwardena, Prabath. author.<br/><a href="https://doi.org/10.1007/978-1-4302-6817-8">https://doi.org/10.1007/978-1-4302-6817-8</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:140914 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-06677-6">https://doi.org/10.1007/978-3-319-06677-6</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:140921 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Jonker, Willem. editor.<br/><a href="https://doi.org/10.1007/978-3-319-06811-4">https://doi.org/10.1007/978-3-319-06811-4</a><br/>Format:&#160;Electronic Resources<br/> Web Technologies and Applications APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014, Proceedings ent://SD_ILS/0/SD_ILS:140989 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Han, Weihong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11119-3">https://doi.org/10.1007/978-3-319-11119-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber Defense and Situational Awareness ent://SD_ILS/0/SD_ILS:141044 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Kott, Alexander. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11391-3">https://doi.org/10.1007/978-3-319-11391-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings ent://SD_ILS/0/SD_ILS:141107 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Chow, Sherman S.M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 12th International Conference, WWIC 2014, Paris, France, May 26-28, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:141112 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Mellouk, Abdelhamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-13174-0">https://doi.org/10.1007/978-3-319-13174-0</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 19th Nordic Conference, NordSec 2014, Troms&oslash;, Norway, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:141120 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bernsmed, Karin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11599-3">https://doi.org/10.1007/978-3-319-11599-3</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013 ent://SD_ILS/0/SD_ILS:141146 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-45947-8">https://doi.org/10.1007/978-3-662-45947-8</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:141293 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Mitton, Natalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-13329-4">https://doi.org/10.1007/978-3-319-13329-4</a><br/>Format:&#160;Electronic Resources<br/> e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:141297 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bissyand&eacute;, Tegawend&eacute; F. editor.<br/><a href="https://doi.org/10.1007/978-3-319-08368-1">https://doi.org/10.1007/978-3-319-08368-1</a><br/>Format:&#160;Electronic Resources<br/> E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:142798 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Sideridis, Alexander B. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11710-2">https://doi.org/10.1007/978-3-319-11710-2</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:143378 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Sherif, Mostafa Hashem. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04105-6">https://doi.org/10.1007/978-3-319-04105-6</a><br/>Format:&#160;Electronic Resources<br/> Primer on Client-Side Web Security ent://SD_ILS/0/SD_ILS:143500 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;De Ryck, Philippe. author.<br/><a href="https://doi.org/10.1007/978-3-319-12226-7">https://doi.org/10.1007/978-3-319-12226-7</a><br/>Format:&#160;Electronic Resources<br/> Network Hardening An Automated Approach to Improving Network Security ent://SD_ILS/0/SD_ILS:143102 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Wang, Lingyu. author.<br/><a href="https://doi.org/10.1007/978-3-319-04612-9">https://doi.org/10.1007/978-3-319-04612-9</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:143322 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Faloutsos, Michalis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04918-2">https://doi.org/10.1007/978-3-319-04918-2</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:143135 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Abadi, Mart&iacute;n. editor.<br/><a href="https://doi.org/10.1007/978-3-319-05119-2">https://doi.org/10.1007/978-3-319-05119-2</a><br/>Format:&#160;Electronic Resources<br/> Socio-technical Design of Ubiquitous Computing Systems ent://SD_ILS/0/SD_ILS:151292 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;David, Klaus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-05044-7">https://doi.org/10.1007/978-3-319-05044-7</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks and Distributed Systems International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:149605 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Jahangir, Amir Hossein. editor.<br/><a href="https://doi.org/10.1007/978-3-319-10903-9">https://doi.org/10.1007/978-3-319-10903-9</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014, Proceedings ent://SD_ILS/0/SD_ILS:149767 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Natarajan, Raja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04483-5">https://doi.org/10.1007/978-3-319-04483-5</a><br/>Format:&#160;Electronic Resources<br/> Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations ent://SD_ILS/0/SD_ILS:145210 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Hassanien, Aboul Ella. editor.<br/><a href="https://doi.org/10.1007/978-3-662-43616-5">https://doi.org/10.1007/978-3-662-43616-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:145607 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Preneel, Bart. editor.<br/><a href="https://doi.org/10.1007/978-3-642-54069-1">https://doi.org/10.1007/978-3-642-54069-1</a><br/>Format:&#160;Electronic Resources<br/> ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014, Proceedings ent://SD_ILS/0/SD_ILS:147469 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Kimppa, Kai. editor.<br/><a href="https://doi.org/10.1007/978-3-662-44208-1">https://doi.org/10.1007/978-3-662-44208-1</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 7th International Conference, IDCS 2014, Calabria, Italy, September 22-24, 2014, Proceedings ent://SD_ILS/0/SD_ILS:146268 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Fortino, Giancarlo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-11692-1">https://doi.org/10.1007/978-3-319-11692-1</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014, Proceedings ent://SD_ILS/0/SD_ILS:148212 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Chatterjee, Mainak. editor.<br/><a href="https://doi.org/10.1007/978-3-642-45249-9">https://doi.org/10.1007/978-3-642-45249-9</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:135172 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-662-44791-8">https://doi.org/10.1007/978-3-662-44791-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:135647 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bondavalli, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-319-10506-2">https://doi.org/10.1007/978-3-319-10506-2</a><br/>Format:&#160;Electronic Resources<br/> Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits ent://SD_ILS/0/SD_ILS:168625 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Peeters, Eric. author.<br/><a href="https://doi.org/10.1007/978-1-4614-6783-0">https://doi.org/10.1007/978-1-4614-6783-0</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology - CT- RSA 2013 The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings ent://SD_ILS/0/SD_ILS:169546 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Dawson, Ed. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36095-4">https://doi.org/10.1007/978-3-642-36095-4</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:170428 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Frey, Davide. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35668-1">https://doi.org/10.1007/978-3-642-35668-1</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:172499 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Christianson, Bruce. editor. (orcid)0000-0002-3777-7476<br/><a href="https://doi.org/10.1007/978-3-642-36213-2">https://doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170462 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Knudsen, Lars R. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35999-6">https://doi.org/10.1007/978-3-642-35999-6</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Science XVII ent://SD_ILS/0/SD_ILS:171487 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Gavrilova, Marina. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35840-1">https://doi.org/10.1007/978-3-642-35840-1</a><br/>Format:&#160;Electronic Resources<br/> Web-Age Information Management 14th International Conference, WAIM 2013, Beidaihe, China, June 14-16, 2013. Proceedings ent://SD_ILS/0/SD_ILS:171124 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Wang, Jianyong. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38562-9">https://doi.org/10.1007/978-3-642-38562-9</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings ent://SD_ILS/0/SD_ILS:171453 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Riis Nielsen, Hanne. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41488-6">https://doi.org/10.1007/978-3-642-41488-6</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 6th International Conference, IDCS 2013, Hangzhou, China, October 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:172293 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Pathan, Mukaddim. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41428-2">https://doi.org/10.1007/978-3-642-41428-2</a><br/>Format:&#160;Electronic Resources<br/> E-Voting and Identity 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings ent://SD_ILS/0/SD_ILS:172226 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Heather, James. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39185-9">https://doi.org/10.1007/978-3-642-39185-9</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings ent://SD_ILS/0/SD_ILS:172246 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38631-2">https://doi.org/10.1007/978-3-642-38631-2</a><br/>Format:&#160;Electronic Resources<br/> Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings ent://SD_ILS/0/SD_ILS:172352 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Mustofa, Khabib. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36818-9">https://doi.org/10.1007/978-3-642-36818-9</a><br/>Format:&#160;Electronic Resources<br/> Sensor Systems and Software 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:174296 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Zuniga, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04166-7">https://doi.org/10.1007/978-3-319-04166-7</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Deterrence and IT Protection for Critical Infrastructures ent://SD_ILS/0/SD_ILS:160894 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Martellini, Maurizio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-02279-6">https://doi.org/10.1007/978-3-319-02279-6</a><br/>Format:&#160;Electronic Resources<br/> Iris Biometrics From Segmentation to Template Security ent://SD_ILS/0/SD_ILS:160832 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Rathgeb, Christian. author.<br/><a href="https://doi.org/10.1007/978-1-4614-5571-4">https://doi.org/10.1007/978-1-4614-5571-4</a><br/>Format:&#160;Electronic Resources<br/> Physical Layer Approaches for Securing Wireless Communication Systems ent://SD_ILS/0/SD_ILS:163591 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Wen, Hong. author.<br/><a href="https://doi.org/10.1007/978-1-4614-6510-2">https://doi.org/10.1007/978-1-4614-6510-2</a><br/>Format:&#160;Electronic Resources<br/> Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures ent://SD_ILS/0/SD_ILS:164110 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Haataja, Keijo. author.<br/><a href="https://doi.org/10.1007/978-3-642-40646-1">https://doi.org/10.1007/978-3-642-40646-1</a><br/>Format:&#160;Electronic Resources<br/> Security and the Networked Society ent://SD_ILS/0/SD_ILS:156998 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Gregory, Mark A. author.<br/><a href="https://doi.org/10.1007/978-3-319-02390-8">https://doi.org/10.1007/978-3-319-02390-8</a><br/>Format:&#160;Electronic Resources<br/> Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne, Switzerland, June 9-10, 2011, and WISE 6, Bento Gon&ccedil;alves, RS, Brazil, July 27-31, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:175291 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Dodge, Ronald C. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39377-8">https://doi.org/10.1007/978-3-642-39377-8</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:175883 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Flegel, Ulrich. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37300-8">https://doi.org/10.1007/978-3-642-37300-8</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems -- CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings ent://SD_ILS/0/SD_ILS:176493 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bertoni, Guido Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-642-40349-1">https://doi.org/10.1007/978-3-642-40349-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy Preserving in Social Networks ent://SD_ILS/0/SD_ILS:176951 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Chbeir, Richard. editor.<br/><a href="https://doi.org/10.1007/978-3-7091-0894-9">https://doi.org/10.1007/978-3-7091-0894-9</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communication 11th International Conference, WWIC 2013, St. Petersburg, Russia, June 5-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:177143 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Tsaoussidis, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38401-1">https://doi.org/10.1007/978-3-642-38401-1</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Internet Technologies Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China. Revised Selected Papers ent://SD_ILS/0/SD_ILS:177707 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Su, Jinshu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-53959-6">https://doi.org/10.1007/978-3-642-53959-6</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013, Proceedings ent://SD_ILS/0/SD_ILS:177429 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Roughan, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36516-4">https://doi.org/10.1007/978-3-642-36516-4</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Mobile Social Networks ent://SD_ILS/0/SD_ILS:164334 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Liang, Xiaohui. author.<br/><a href="https://doi.org/10.1007/978-1-4614-8857-6">https://doi.org/10.1007/978-1-4614-8857-6</a><br/>Format:&#160;Electronic Resources<br/> Secure IP Mobility Management for VANET ent://SD_ILS/0/SD_ILS:165785 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Taha, Sanaa. author.<br/><a href="https://doi.org/10.1007/978-3-319-01351-0">https://doi.org/10.1007/978-3-319-01351-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:166112 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Keromytis, Angelos D. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36883-7">https://doi.org/10.1007/978-3-642-36883-7</a><br/>Format:&#160;Electronic Resources<br/> IT-Risikomanagement mit System Praxisorientiertes Management von Informationssicherheits- und IT-Risiken ent://SD_ILS/0/SD_ILS:184620 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;K&ouml;nigs, Hans-Peter. author.<br/><a href="https://doi.org/10.1007/978-3-8348-2165-2">https://doi.org/10.1007/978-3-8348-2165-2</a><br/>Format:&#160;Electronic Resources<br/> Physical Unclonable Functions in Theory and Practice ent://SD_ILS/0/SD_ILS:138779 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;B&ouml;hm, Christoph. author.<br/><a href="https://doi.org/10.1007/978-1-4614-5040-5">https://doi.org/10.1007/978-1-4614-5040-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:139335 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Zia, Tanveer. editor.<br/><a href="https://doi.org/10.1007/978-3-319-04283-1">https://doi.org/10.1007/978-3-319-04283-1</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings ent://SD_ILS/0/SD_ILS:139353 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Stolfo, Salvatore J. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41284-4">https://doi.org/10.1007/978-3-642-41284-4</a><br/>Format:&#160;Electronic Resources<br/> SmartData Privacy Meets Evolutionary Robotics ent://SD_ILS/0/SD_ILS:139797 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Harvey, Inman. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-6409-9">https://doi.org/10.1007/978-1-4614-6409-9</a><br/>Format:&#160;Electronic Resources<br/> Automatic Malware Analysis An Emulator Based Approach ent://SD_ILS/0/SD_ILS:139816 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Yin, Heng. author.<br/><a href="https://doi.org/10.1007/978-1-4614-5523-3">https://doi.org/10.1007/978-1-4614-5523-3</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of Information Security, Privacy and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:140531 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Marinos, Louis. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39345-7">https://doi.org/10.1007/978-3-642-39345-7</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013, Proceedings ent://SD_ILS/0/SD_ILS:140716 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Das, Sajal K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-02786-9">https://doi.org/10.1007/978-3-319-02786-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Social Networks ent://SD_ILS/0/SD_ILS:142105 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Altshuler, Yaniv. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-4139-7">https://doi.org/10.1007/978-1-4614-4139-7</a><br/>Format:&#160;Electronic Resources<br/> Trusted Systems 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings ent://SD_ILS/0/SD_ILS:143127 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bloem, Roderick. editor.<br/><a href="https://doi.org/10.1007/978-3-319-03491-1">https://doi.org/10.1007/978-3-319-03491-1</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:143054 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Rieck, Konrad. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39235-1">https://doi.org/10.1007/978-3-642-39235-1</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:144191 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Yuan, Yuyu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35795-4">https://doi.org/10.1007/978-3-642-35795-4</a><br/>Format:&#160;Electronic Resources<br/> On the Move to Meaningful Internet Systems: OTM 2013 Conferences Confederated International Conferences: CoopIS, DOA-Trusted Cloud and ODBASE 2013, Graz, Austria, September 9-13, 2013. Proceedings. ent://SD_ILS/0/SD_ILS:144102 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Meersman, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-41030-7">https://doi.org/10.1007/978-3-642-41030-7</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Public Key Infrastructures ent://SD_ILS/0/SD_ILS:144783 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Buchmann, Johannes A. author.<br/><a href="https://doi.org/10.1007/978-3-642-40657-7">https://doi.org/10.1007/978-3-642-40657-7</a><br/>Format:&#160;Electronic Resources<br/> Personal Satellite Services 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:144166 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Pillai, Prashant. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36787-8">https://doi.org/10.1007/978-3-642-36787-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 14-27, 2013, Proceedings ent://SD_ILS/0/SD_ILS:148721 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121<br/><a href="https://doi.org/10.1007/978-3-642-40793-2">https://doi.org/10.1007/978-3-642-40793-2</a><br/>Format:&#160;Electronic Resources<br/> Outlier Analysis ent://SD_ILS/0/SD_ILS:151837 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Aggarwal, Charu C. author.<br/><a href="https://doi.org/10.1007/978-1-4614-6396-2">https://doi.org/10.1007/978-1-4614-6396-2</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:145595 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Di Pietro, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35890-6">https://doi.org/10.1007/978-3-642-35890-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Communication Networking 19th EUNICE/IFIP EG WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:145428 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bauschert, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-642-40552-5">https://doi.org/10.1007/978-3-642-40552-5</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented and Cloud Computing Second European Conference, ESOCC 2013, M&aacute;laga, Spain, September 11-13, 2013, Proceedings ent://SD_ILS/0/SD_ILS:145918 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Lau, Kung-Kiu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-40651-5">https://doi.org/10.1007/978-3-642-40651-5</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:145466 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Wang, G. Alan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39693-9">https://doi.org/10.1007/978-3-642-39693-9</a><br/>Format:&#160;Electronic Resources<br/> PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:145970 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Androulidakis, I.I. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1656-2">https://doi.org/10.1007/978-1-4614-1656-2</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification: Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:147724 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36140-1">https://doi.org/10.1007/978-3-642-36140-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid Security First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:148336 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Cuellar, Jorge. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38030-3">https://doi.org/10.1007/978-3-642-38030-3</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 9th International Conference, ICDCIT 2013, Bhubaneswar, India, February 5-8, 2013, Proceedings ent://SD_ILS/0/SD_ILS:135170 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Hota, Chittaranjan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-36071-8">https://doi.org/10.1007/978-3-642-36071-8</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings ent://SD_ILS/0/SD_ILS:135174 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Wang, Lingyu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-39256-6">https://doi.org/10.1007/978-3-642-39256-6</a><br/>Format:&#160;Electronic Resources<br/> Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013, Proceedings ent://SD_ILS/0/SD_ILS:134973 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Fischer-H&uuml;bner, Simone. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37282-7">https://doi.org/10.1007/978-3-642-37282-7</a><br/>Format:&#160;Electronic Resources<br/> Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:199335 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Raggo, Michael T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597497435">https://www.sciencedirect.com/science/book/9781597497435</a><br/>Format:&#160;Electronic Resources<br/> On the Move to Meaningful Internet Systems: OTM 2012 Confederated International Conferences: CoopIS, DOA-SVI, and ODBASE 2012, Rome, Italy, September 10-14, 2012. Proceedings, Part II ent://SD_ILS/0/SD_ILS:169585 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Meersman, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33615-7">https://doi.org/10.1007/978-3-642-33615-7</a><br/>Format:&#160;Electronic Resources<br/> Web-Age Information Management 13th International Conference, WAIM 2012, Harbin, China, August 18-20, 2012. Proceedings ent://SD_ILS/0/SD_ILS:170310 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Gao, Hong. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32281-5">https://doi.org/10.1007/978-3-642-32281-5</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems -- CHES 2012 14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedings ent://SD_ILS/0/SD_ILS:169851 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Prouff, Emmanuel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33027-8">https://doi.org/10.1007/978-3-642-33027-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:169911 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Meadows, Catherine A. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29963-6">https://doi.org/10.1007/978-3-642-29963-6</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Computing 10th International Conference, Pervasive 2012, Newcastle, UK, June 18-22, 2012. Proceedings ent://SD_ILS/0/SD_ILS:170327 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Kay, Judy. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31205-2">https://doi.org/10.1007/978-3-642-31205-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Com&uuml;uter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings ent://SD_ILS/0/SD_ILS:170420 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120<br/><a href="https://doi.org/10.1007/978-3-642-33704-8">https://doi.org/10.1007/978-3-642-33704-8</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security VII ent://SD_ILS/0/SD_ILS:170678 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Shi, Yun Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-642-28693-3">https://doi.org/10.1007/978-3-642-28693-3</a><br/>Format:&#160;Electronic Resources<br/> Data Security and Security Data 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:169768 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;MacKinnon, Lachlan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25704-9">https://doi.org/10.1007/978-3-642-25704-9</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012, Proceedings ent://SD_ILS/0/SD_ILS:170642 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Fischer-H&uuml;bner, Simone. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32287-7">https://doi.org/10.1007/978-3-642-32287-7</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170645 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Miri, Ali. editor.<br/><a href="https://doi.org/10.1007/978-3-642-28496-0">https://doi.org/10.1007/978-3-642-28496-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:170750 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Jung, Souhwan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-27890-7">https://doi.org/10.1007/978-3-642-27890-7</a><br/>Format:&#160;Electronic Resources<br/> On the Move to Meaningful Internet Systems: OTM 2012 Confederated International Conferences: CoopIS, DOA-SVI, and ODBASE 2012, Rome, Italy, September 10-14, 2012. Proceedings, Part I ent://SD_ILS/0/SD_ILS:170752 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Meersman, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33606-5">https://doi.org/10.1007/978-3-642-33606-5</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented and Cloud Computing First European Conference, ESOCC 2012, Bertinoro, Italy, September 19-21, 2012, Proceedings ent://SD_ILS/0/SD_ILS:170767 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;De Paoli, Flavio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33427-6">https://doi.org/10.1007/978-3-642-33427-6</a><br/>Format:&#160;Electronic Resources<br/> Trusted Systems 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings ent://SD_ILS/0/SD_ILS:170949 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Mitchell, Chris J. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35371-0">https://doi.org/10.1007/978-3-642-35371-0</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects of Security and Trust 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:171106 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29420-4">https://doi.org/10.1007/978-3-642-29420-4</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012, Proceedings ent://SD_ILS/0/SD_ILS:171155 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33627-0">https://doi.org/10.1007/978-3-642-33627-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012, Proceedings ent://SD_ILS/0/SD_ILS:171982 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142<br/><a href="https://doi.org/10.1007/978-3-642-33678-2">https://doi.org/10.1007/978-3-642-33678-2</a><br/>Format:&#160;Electronic Resources<br/> Trusted Systems Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:172418 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32298-3">https://doi.org/10.1007/978-3-642-32298-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:171854 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Lee, Dong Hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35416-8">https://doi.org/10.1007/978-3-642-35416-8</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing, Networking and Security International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:172617 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Thilagam, P. Santhi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29280-4">https://doi.org/10.1007/978-3-642-29280-4</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings ent://SD_ILS/0/SD_ILS:173511 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Xu, Li. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34601-9">https://doi.org/10.1007/978-3-642-34601-9</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012, Proceedings ent://SD_ILS/0/SD_ILS:173143 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Jonker, Willem. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32873-2">https://doi.org/10.1007/978-3-642-32873-2</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings ent://SD_ILS/0/SD_ILS:173456 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Grossklags, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34266-0">https://doi.org/10.1007/978-3-642-34266-0</a><br/>Format:&#160;Electronic Resources<br/> Future Security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:173546 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Aschenbruck, Nils. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33161-9">https://doi.org/10.1007/978-3-642-33161-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings ent://SD_ILS/0/SD_ILS:174402 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Gollmann, Dieter. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33383-5">https://doi.org/10.1007/978-3-642-33383-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics VIII 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:161596 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33962-2">https://doi.org/10.1007/978-3-642-33962-2</a><br/>Format:&#160;Electronic Resources<br/> Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings ent://SD_ILS/0/SD_ILS:162176 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Lee, Geuk. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32692-9">https://doi.org/10.1007/978-3-642-32692-9</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:163163 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35764-0">https://doi.org/10.1007/978-3-642-35764-0</a><br/>Format:&#160;Electronic Resources<br/> RFID Security and Privacy 7th International Workshop, RFIDsec 2011, Amherst, MA, USA, June 26-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:158344 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Juels, Ari. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25286-0">https://doi.org/10.1007/978-3-642-25286-0</a><br/>Format:&#160;Electronic Resources<br/> ICT Critical Infrastructures and Society 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012, Proceedings ent://SD_ILS/0/SD_ILS:158864 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;David Hercheui, Magda. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33332-3">https://doi.org/10.1007/978-3-642-33332-3</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Ubiquitous Computing ent://SD_ILS/0/SD_ILS:159720 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Khalil, Ismail. editor.<br/><a href="https://doi.org/10.2991/978-94-91216-71-8">https://doi.org/10.2991/978-94-91216-71-8</a><br/>Format:&#160;Electronic Resources<br/> Web Information Systems and Mining International Conference, WISM 2012, Chengdu, China, October 26-28, 2012, Proceedings ent://SD_ILS/0/SD_ILS:174474 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Wang, Wu Lee. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33469-6">https://doi.org/10.1007/978-3-642-33469-6</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012, Proceedings ent://SD_ILS/0/SD_ILS:175260 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bononi, Luciano. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25959-3">https://doi.org/10.1007/978-3-642-25959-3</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Safety and Security 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings ent://SD_ILS/0/SD_ILS:176081 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Xiang, Yang. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35362-8">https://doi.org/10.1007/978-3-642-35362-8</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:175640 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-27585-2">https://doi.org/10.1007/978-3-642-27585-2</a><br/>Format:&#160;Electronic Resources<br/> E-Voting and Identity Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:176580 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Kiayias, Aggelos. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32747-6">https://doi.org/10.1007/978-3-642-32747-6</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety, and Sustainability 7th International and 4th e-Democracy Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:177205 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33448-1">https://doi.org/10.1007/978-3-642-33448-1</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security VIII ent://SD_ILS/0/SD_ILS:177244 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Shi, Yun Q. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31971-6">https://doi.org/10.1007/978-3-642-31971-6</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:177542 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Gladyshev, Pavel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35515-8">https://doi.org/10.1007/978-3-642-35515-8</a><br/>Format:&#160;Electronic Resources<br/> Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012, Proceedings ent://SD_ILS/0/SD_ILS:164608 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Lei, Jingsheng. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35211-9">https://doi.org/10.1007/978-3-642-35211-9</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:167738 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35755-8">https://doi.org/10.1007/978-3-642-35755-8</a><br/>Format:&#160;Electronic Resources<br/> Smart Mobile Apps Mit Business-Apps ins Zeitalter mobiler Gesch&auml;ftsprozesse ent://SD_ILS/0/SD_ILS:190399 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Verclas, Stephan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22259-7">https://doi.org/10.1007/978-3-642-22259-7</a><br/>Format:&#160;Electronic Resources<br/> Achieving Systems Safety Proceedings of the Twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012 ent://SD_ILS/0/SD_ILS:138879 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Dale, Chris. editor.<br/><a href="https://doi.org/10.1007/978-1-4471-2494-8">https://doi.org/10.1007/978-1-4471-2494-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 7th International ICST Conference, SecureComm 2011, London, September 7-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:140493 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Rajarajan, Muttukrishnan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31909-9">https://doi.org/10.1007/978-3-642-31909-9</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings ent://SD_ILS/0/SD_ILS:140651 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33272-2">https://doi.org/10.1007/978-3-642-33272-2</a><br/>Format:&#160;Electronic Resources<br/> Wired / Wireless Internet Communication 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012, Proceedings ent://SD_ILS/0/SD_ILS:142908 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Koucheryavy, Yevgeni. editor. (orcid)0000-0003-3976-297X<br/><a href="https://doi.org/10.1007/978-3-642-30630-3">https://doi.org/10.1007/978-3-642-30630-3</a><br/>Format:&#160;Electronic Resources<br/> Convergence and Hybrid Information Technology 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings ent://SD_ILS/0/SD_ILS:143723 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Lee, Geuk. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32645-5">https://doi.org/10.1007/978-3-642-32645-5</a><br/>Format:&#160;Electronic Resources<br/> Emerging Trends and Applications in Information Communication Technologies Second International Multi Topic Conference, IMTIC 2012, Jamshoro, Pakistan, March 28-30, 2012. Proceedings ent://SD_ILS/0/SD_ILS:143649 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Chowdhry, Bhawani Shankar. editor.<br/><a href="https://doi.org/10.1007/978-3-642-28962-0">https://doi.org/10.1007/978-3-642-28962-0</a><br/>Format:&#160;Electronic Resources<br/> Programming Languages and Systems 10th Asian Symposium, APLAS 2012, Kyoto, Japan, December 11-13, 2012, Proceedings ent://SD_ILS/0/SD_ILS:145097 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Jhala, Ranjit. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35182-2">https://doi.org/10.1007/978-3-642-35182-2</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedings ent://SD_ILS/0/SD_ILS:149478 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Xiang, Yang. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34883-9">https://doi.org/10.1007/978-3-642-34883-9</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:149222 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Wang, Yongheng. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32427-7">https://doi.org/10.1007/978-3-642-32427-7</a><br/>Format:&#160;Electronic Resources<br/> Modeling Decisions for Artificial Intelligence 9th International Conference, MDAI 2012, Girona, Catalonia, Spain, November 21-23, 2012, Proceedings ent://SD_ILS/0/SD_ILS:150133 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Torra, Vincenc. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34620-0">https://doi.org/10.1007/978-3-642-34620-0</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense ent://SD_ILS/0/SD_ILS:150879 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-642-28920-0">https://doi.org/10.1007/978-3-642-28920-0</a><br/>Format:&#160;Electronic Resources<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:151009 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Androulidakis, I.I. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1650-0">https://doi.org/10.1007/978-1-4614-1650-0</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012, Proceedings ent://SD_ILS/0/SD_ILS:151488 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Cuppens-Boulahia, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31540-4">https://doi.org/10.1007/978-3-642-31540-4</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings ent://SD_ILS/0/SD_ILS:151245 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;J&oslash;sang, Audun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-34210-3">https://doi.org/10.1007/978-3-642-34210-3</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions and Defenses 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012, Proceedings ent://SD_ILS/0/SD_ILS:151657 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Balzarotti, Davide. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33338-5">https://doi.org/10.1007/978-3-642-33338-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings ent://SD_ILS/0/SD_ILS:145188 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Ryan, Mark D. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29101-2">https://doi.org/10.1007/978-3-642-29101-2</a><br/>Format:&#160;Electronic Resources<br/> Wireless Networks and Computational Intelligence 6th International Conference on Information Processing, ICIP 2012, Bangalore, India, August 10-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:147059 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Venugopal, K. R. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31686-9">https://doi.org/10.1007/978-3-642-31686-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:148038 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Kwiecien, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31217-5">https://doi.org/10.1007/978-3-642-31217-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings ent://SD_ILS/0/SD_ILS:147670 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33167-1">https://doi.org/10.1007/978-3-642-33167-1</a><br/>Format:&#160;Electronic Resources<br/> Business System Management and Engineering From Open Issues to Applications ent://SD_ILS/0/SD_ILS:135277 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Ardagna, Claudio Agostino. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32439-0">https://doi.org/10.1007/978-3-642-32439-0</a><br/>Format:&#160;Electronic Resources<br/> Information and Communication Technologies 18th EUNICE/IFIP WG 6.2, 6.6 International Conference, EUNICE 2012, Budapest, Hungary, August 29-31, 2012, Proceedings ent://SD_ILS/0/SD_ILS:135327 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Szabo, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-32808-4">https://doi.org/10.1007/978-3-642-32808-4</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXV 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings ent://SD_ILS/0/SD_ILS:170215 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Li, Yingjiu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22348-8">https://doi.org/10.1007/978-3-642-22348-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings ent://SD_ILS/0/SD_ILS:170161 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-642-21031-0">https://doi.org/10.1007/978-3-642-21031-0</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings ent://SD_ILS/0/SD_ILS:170537 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Baras, John S. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25280-8">https://doi.org/10.1007/978-3-642-25280-8</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security VI ent://SD_ILS/0/SD_ILS:170646 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Shi, Yun Q. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24556-5">https://doi.org/10.1007/978-3-642-24556-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 30th International Conference, SAFECOMP 2011, Naples, Italy, September 19-22, 2011, Proceedings ent://SD_ILS/0/SD_ILS:170542 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Flammini, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24270-0">https://doi.org/10.1007/978-3-642-24270-0</a><br/>Format:&#160;Electronic Resources<br/> Trusted Systems Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:171207 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25283-9">https://doi.org/10.1007/978-3-642-25283-9</a><br/>Format:&#160;Electronic Resources<br/> Dependable and Historic Computing Essays Dedicated to Brian Randell on the Occasion of his 75th Birthday ent://SD_ILS/0/SD_ILS:172082 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Jones, Cliff B. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24541-1">https://doi.org/10.1007/978-3-642-24541-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:174016 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Burmester, Mike. editor.<br/><a href="https://doi.org/10.1007/978-3-642-18178-8">https://doi.org/10.1007/978-3-642-18178-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- AFRICACRYPT 2011 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011, Proceedings ent://SD_ILS/0/SD_ILS:172412 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757<br/><a href="https://doi.org/10.1007/978-3-642-21969-6">https://doi.org/10.1007/978-3-642-21969-6</a><br/>Format:&#160;Electronic Resources<br/> Open Research Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:172066 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-19228-9">https://doi.org/10.1007/978-3-642-19228-9</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 9th IFIP TC 6 International Conference, WWIC 2011, Vilanova i la Geltr&uacute;, Spain, June 15-17, 2011, Proceedings ent://SD_ILS/0/SD_ILS:174796 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Masip-Bruin, Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-642-21560-5">https://doi.org/10.1007/978-3-642-21560-5</a><br/>Format:&#160;Electronic Resources<br/> Secure and Trust Computing, Data Management, and Applications 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings, Part I ent://SD_ILS/0/SD_ILS:174700 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-22339-6">https://doi.org/10.1007/978-3-642-22339-6</a><br/>Format:&#160;Electronic Resources<br/> Spyware and Adware ent://SD_ILS/0/SD_ILS:153987 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Aycock, John. author.<br/><a href="https://doi.org/10.1007/978-0-387-77741-2">https://doi.org/10.1007/978-0-387-77741-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Systems Safety Proceedings of the Nineteenth Safety-Critical Systems Symposium, Southampton, UK, 8-10th February 2011 ent://SD_ILS/0/SD_ILS:154616 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Dale, Chris. editor.<br/><a href="https://doi.org/10.1007/978-0-85729-133-2">https://doi.org/10.1007/978-0-85729-133-2</a><br/>Format:&#160;Electronic Resources<br/> Model-Driven Risk Analysis The CORAS Approach ent://SD_ILS/0/SD_ILS:162898 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Lund, Mass Soldal. author.<br/><a href="https://doi.org/10.1007/978-3-642-12323-8">https://doi.org/10.1007/978-3-642-12323-8</a><br/>Format:&#160;Electronic Resources<br/> Counterterrorism and Open Source Intelligence ent://SD_ILS/0/SD_ILS:163878 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Wiil, Uffe. editor.<br/><a href="https://doi.org/10.1007/978-3-7091-0388-3">https://doi.org/10.1007/978-3-7091-0388-3</a><br/>Format:&#160;Electronic Resources<br/> Advanced Research on Electronic Commerce, Web Application, and Communication International Conference, ECWAC 2011, Guangzhou, China, April 16-17, 2011. Proceedings, Part I ent://SD_ILS/0/SD_ILS:159599 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Shen, Gang. editor.<br/><a href="https://doi.org/10.1007/978-3-642-20367-1">https://doi.org/10.1007/978-3-642-20367-1</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:174455 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Degano, Pierpaolo. editor.<br/><a href="https://doi.org/10.1007/978-3-642-19751-2">https://doi.org/10.1007/978-3-642-19751-2</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection V 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:175424 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24864-1">https://doi.org/10.1007/978-3-642-24864-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings ent://SD_ILS/0/SD_ILS:176914 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Lai, Xuejia. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24861-0">https://doi.org/10.1007/978-3-642-24861-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security Risk Management Risikomanagement mit ISO/IEC 27001, 27005 und 31010 ent://SD_ILS/0/SD_ILS:179917 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Klipper, Sebastian. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9870-8">https://doi.org/10.1007/978-3-8348-9870-8</a><br/>Format:&#160;Electronic Resources<br/> Apple's iPad im Enterprise-Einsatz Einsatzm&ouml;glichkeiten, Programmierung, Betrieb und Sicherheit im Unternehmen ent://SD_ILS/0/SD_ILS:180552 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Oelmaier, Florian. author.<br/><a href="https://doi.org/10.1007/978-3-642-15437-9">https://doi.org/10.1007/978-3-642-15437-9</a><br/>Format:&#160;Electronic Resources<br/> Metriken - der Schl&uuml;ssel zum erfolgreichen Security und Compliance Monitoring Design, Implementierung und Validierung in der Praxis ent://SD_ILS/0/SD_ILS:180985 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Sowa, Aleksandra. author.<br/><a href="https://doi.org/10.1007/978-3-8348-8194-6">https://doi.org/10.1007/978-3-8348-8194-6</a><br/>Format:&#160;Electronic Resources<br/> IT-Notfallmanagement mit System Notf&auml;lle bei der Informationsverarbeitung sicher beherrschen ent://SD_ILS/0/SD_ILS:187472 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Klett, Gerhard. author.<br/><a href="https://doi.org/10.1007/978-3-8348-8226-4">https://doi.org/10.1007/978-3-8348-8226-4</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheit mit System Integratives IT-Sicherheits-, Kontinuit&auml;ts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung ent://SD_ILS/0/SD_ILS:183917 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;M&uuml;ller, Klaus-Rainer. author.<br/><a href="https://doi.org/10.1007/978-3-8348-8178-6">https://doi.org/10.1007/978-3-8348-8178-6</a><br/>Format:&#160;Electronic Resources<br/> Konzeption eines Systems zur &uuml;berbetrieblichen Sammlung und Nutzung von quantitativen Daten &uuml;ber Informationssicherheitsvorf&auml;lle ent://SD_ILS/0/SD_ILS:183673 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Nowey, Thomas. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9873-9">https://doi.org/10.1007/978-3-8348-9873-9</a><br/>Format:&#160;Electronic Resources<br/> Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats ent://SD_ILS/0/SD_ILS:139753 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-1-4614-0977-9">https://doi.org/10.1007/978-1-4614-0977-9</a><br/>Format:&#160;Electronic Resources<br/> Preserving Privacy in Data Outsourcing ent://SD_ILS/0/SD_ILS:143103 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Foresti, Sara. author.<br/><a href="https://doi.org/10.1007/978-1-4419-7659-8">https://doi.org/10.1007/978-1-4419-7659-8</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems -- CHES 2011 13th International Workshop, Nara, Japan, September 28 -- October 1, 2011, Proceedings ent://SD_ILS/0/SD_ILS:149878 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Preneel, Bart. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23951-9">https://doi.org/10.1007/978-3-642-23951-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks 18th Conference, CN 2011, Ustron, Poland, June 14-18, 2011. Proceedings ent://SD_ILS/0/SD_ILS:151601 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Kwiecien, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-642-21771-5">https://doi.org/10.1007/978-3-642-21771-5</a><br/>Format:&#160;Electronic Resources<br/> Programming Languages and Systems 9th Asian Symposium, APLAS 2011, Kenting, Taiwan, December 5-7, 2011. Proceedings ent://SD_ILS/0/SD_ILS:147481 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Yang, Hongseok. editor.<br/><a href="https://doi.org/10.1007/978-3-642-25318-8">https://doi.org/10.1007/978-3-642-25318-8</a><br/>Format:&#160;Electronic Resources<br/> Quantitative Security Risk Assessment of Enterprise Networks ent://SD_ILS/0/SD_ILS:147171 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Ou, Xinming. author.<br/><a href="https://doi.org/10.1007/978-1-4614-1860-3">https://doi.org/10.1007/978-1-4614-1860-3</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 12th International Conference, ICDCN 2011, Bangalore, India, January 2-5, 2011, Proceedings ent://SD_ILS/0/SD_ILS:148381 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Aguilera, Marcos K. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17679-1">https://doi.org/10.1007/978-3-642-17679-1</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings ent://SD_ILS/0/SD_ILS:135005 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Alcaraz Calero, Jose M. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23496-5">https://doi.org/10.1007/978-3-642-23496-5</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Internet ent://SD_ILS/0/SD_ILS:135192 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Blefari-Melazzi, Nicola. editor.<br/><a href="https://doi.org/10.1007/978-88-470-1818-1">https://doi.org/10.1007/978-88-470-1818-1</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170048 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11207-2">https://doi.org/10.1007/978-3-642-11207-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings ent://SD_ILS/0/SD_ILS:169505 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Echizen, Isao. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16825-3">https://doi.org/10.1007/978-3-642-16825-3</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170378 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Degano, Pierpaolo. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12459-4">https://doi.org/10.1007/978-3-642-12459-4</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 8th International Conference, WWIC 2010, Lulea, Sweden, June 1-3, 2010. Proceedings ent://SD_ILS/0/SD_ILS:169754 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Osipov, Evgeny. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13315-2">https://doi.org/10.1007/978-3-642-13315-2</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170352 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Ors Yalcin, Siddika Berna. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16822-2">https://doi.org/10.1007/978-3-642-16822-2</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - AFRICACRYPT 2010 Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings ent://SD_ILS/0/SD_ILS:170703 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bernstein, Daniel J. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12678-9">https://doi.org/10.1007/978-3-642-12678-9</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems -- CHES 2010 12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings ent://SD_ILS/0/SD_ILS:171379 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Mangard, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-15031-9">https://doi.org/10.1007/978-3-642-15031-9</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings ent://SD_ILS/0/SD_ILS:171129 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Sendrier, Nicolas. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12929-2">https://doi.org/10.1007/978-3-642-12929-2</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers ent://SD_ILS/0/SD_ILS:172087 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Hong, Seokhie. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13858-4">https://doi.org/10.1007/978-3-642-13858-4</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedings ent://SD_ILS/0/SD_ILS:172346 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Kant, Krishna. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11322-2">https://doi.org/10.1007/978-3-642-11322-2</a><br/>Format:&#160;Electronic Resources<br/> Understanding Cryptography A Textbook for Students and Practitioners ent://SD_ILS/0/SD_ILS:172745 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Paar, Christof. author.<br/><a href="https://doi.org/10.1007/978-3-642-04101-3">https://doi.org/10.1007/978-3-642-04101-3</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security V ent://SD_ILS/0/SD_ILS:173538 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Shi, Yun Q. editor.<br/><a href="https://doi.org/10.1007/978-3-642-14298-7">https://doi.org/10.1007/978-3-642-14298-7</a><br/>Format:&#160;Electronic Resources<br/> Electronic Healthcare Information Security ent://SD_ILS/0/SD_ILS:154165 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Shoniregun, Charles A. author.<br/><a href="https://doi.org/10.1007/978-0-387-84919-5">https://doi.org/10.1007/978-0-387-84919-5</a><br/>Format:&#160;Electronic Resources<br/> Network Intrusion Detection and Prevention Concepts and Techniques ent://SD_ILS/0/SD_ILS:154248 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Ghorbani, Ali A. author.<br/><a href="https://doi.org/10.1007/978-0-387-88771-5">https://doi.org/10.1007/978-0-387-88771-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:157941 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Weerasinghe, Dasun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11530-1">https://doi.org/10.1007/978-3-642-11530-1</a><br/>Format:&#160;Electronic Resources<br/> Security for Web Services and Service-Oriented Architectures ent://SD_ILS/0/SD_ILS:165166 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bertino, Elisa. author.<br/><a href="https://doi.org/10.1007/978-3-540-87742-4">https://doi.org/10.1007/978-3-540-87742-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks 17th Conference, CN 2010, Ustron, Poland, June 15-19, 2010. Proceedings ent://SD_ILS/0/SD_ILS:165205 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Kwiecien, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-642-13861-4">https://doi.org/10.1007/978-3-642-13861-4</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Anonymity in Information Management Systems New Techniques for New Practical Problems ent://SD_ILS/0/SD_ILS:165910 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Nin, Jordi. editor.<br/><a href="https://doi.org/10.1007/978-1-84996-238-4">https://doi.org/10.1007/978-1-84996-238-4</a><br/>Format:&#160;Electronic Resources<br/> sicher &amp; mobil Sicherheit in der drahtlosen Kommunikation ent://SD_ILS/0/SD_ILS:179262 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Osterhage, Wolfgang W. author.<br/><a href="https://doi.org/10.1007/978-3-642-03083-3">https://doi.org/10.1007/978-3-642-03083-3</a><br/>Format:&#160;Electronic Resources<br/> Security in Embedded Devices ent://SD_ILS/0/SD_ILS:137997 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Gebotys, Catherine H. author.<br/><a href="https://doi.org/10.1007/978-1-4419-1530-6">https://doi.org/10.1007/978-1-4419-1530-6</a><br/>Format:&#160;Electronic Resources<br/> Cyber Situational Awareness Issues and Research ent://SD_ILS/0/SD_ILS:137951 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-0140-8">https://doi.org/10.1007/978-1-4419-0140-8</a><br/>Format:&#160;Electronic Resources<br/> Open Source Software for Digital Forensics ent://SD_ILS/0/SD_ILS:138227 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Huebner, Ewa. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-5803-7">https://doi.org/10.1007/978-1-4419-5803-7</a><br/>Format:&#160;Electronic Resources<br/> Insider Threats in Cyber Security ent://SD_ILS/0/SD_ILS:138404 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Probst, Christian W. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-7133-3">https://doi.org/10.1007/978-1-4419-7133-3</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedings ent://SD_ILS/0/SD_ILS:140545 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Xie, Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16576-4">https://doi.org/10.1007/978-3-642-16576-4</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning and Systems Engineering ent://SD_ILS/0/SD_ILS:150201 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Ao, Sio-Iong. editor.<br/><a href="https://doi.org/10.1007/978-90-481-9419-3">https://doi.org/10.1007/978-90-481-9419-3</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings ent://SD_ILS/0/SD_ILS:150451 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Kurosawa, Kaoru. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16280-0">https://doi.org/10.1007/978-3-642-16280-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2010, Corfu, Greece, September 22-24, 2010, Proceedings ent://SD_ILS/0/SD_ILS:147282 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-642-15838-4">https://doi.org/10.1007/978-3-642-15838-4</a><br/>Format:&#160;Electronic Resources<br/> Making Systems Safer Proceedings of the Eighteenth Safety-Critical Systems Symposium, Bristol, UK, 9-11th February 2010 ent://SD_ILS/0/SD_ILS:147994 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Dale, Chris. editor.<br/><a href="https://doi.org/10.1007/978-1-84996-086-1">https://doi.org/10.1007/978-1-84996-086-1</a><br/>Format:&#160;Electronic Resources<br/> Programming Languages and Systems 8th Asian Symposium, APLAS 2010, Shanghai, China, November 28 - December 1, 2010 Proceedings ent://SD_ILS/0/SD_ILS:147823 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Ueda, Kazunori. editor.<br/><a href="https://doi.org/10.1007/978-3-642-17164-2">https://doi.org/10.1007/978-3-642-17164-2</a><br/>Format:&#160;Electronic Resources<br/> I contenuti digitali tecnologie, diritti e libert&agrave; ent://SD_ILS/0/SD_ILS:135223 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Lucchi, Nicola. author.<br/><a href="https://doi.org/10.1007/978-88-470-1399-5">https://doi.org/10.1007/978-88-470-1399-5</a><br/>Format:&#160;Electronic Resources<br/> Security Informatics ent://SD_ILS/0/SD_ILS:135552 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Yang, Christopher C. editor.<br/><a href="https://doi.org/10.1007/978-1-4419-1325-8">https://doi.org/10.1007/978-1-4419-1325-8</a><br/>Format:&#160;Electronic Resources<br/> Secure Integrated Circuits and Systems ent://SD_ILS/0/SD_ILS:136495 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Verbauwhede, Ingrid M.R. editor.<br/><a href="https://doi.org/10.1007/978-0-387-71829-3">https://doi.org/10.1007/978-0-387-71829-3</a><br/>Format:&#160;Electronic Resources<br/> Handbuch Unternehmenssicherheit Umfassendes Sicherheits-, Kontinuit&auml;ts- und Risikomanagement mit System ent://SD_ILS/0/SD_ILS:192677 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;M&uuml;ller, Klaus-Rainer. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9772-5">https://doi.org/10.1007/978-3-8348-9772-5</a><br/>Format:&#160;Electronic Resources<br/> Protecting Privacy in Video Surveillance ent://SD_ILS/0/SD_ILS:169205 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Senior, Andrew. editor.<br/><a href="https://doi.org/10.1007/978-1-84882-301-3">https://doi.org/10.1007/978-1-84882-301-3</a><br/>Format:&#160;Electronic Resources<br/> Active and Programmable Networks IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005, Revised Papers ent://SD_ILS/0/SD_ILS:169792 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Hutchison, David. editor.<br/><a href="https://doi.org/10.1007/978-3-642-00972-3">https://doi.org/10.1007/978-3-642-00972-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings ent://SD_ILS/0/SD_ILS:169884 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04846-3">https://doi.org/10.1007/978-3-642-04846-3</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings ent://SD_ILS/0/SD_ILS:170115 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Buth, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04468-7">https://doi.org/10.1007/978-3-642-04468-7</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings ent://SD_ILS/0/SD_ILS:170143 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Gonz&aacute;lez Nieto, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02704-8">https://doi.org/10.1007/978-3-642-02704-8</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 7th International Conference, WWIC 2009, Enschede, The Netherlands, May 27-29 2009, Proceedings ent://SD_ILS/0/SD_ILS:170245 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;van den Berg, Hans. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02118-3">https://doi.org/10.1007/978-3-642-02118-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:172486 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Park, James (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-3-642-02617-1">https://doi.org/10.1007/978-3-642-02617-1</a><br/>Format:&#160;Electronic Resources<br/> On the Move to Meaningful Internet Systems: OTM 2009 Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II ent://SD_ILS/0/SD_ILS:172506 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Meersman, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-05151-7">https://doi.org/10.1007/978-3-642-05151-7</a><br/>Format:&#160;Electronic Resources<br/> Programming Languages and Systems 7th Asian Symposium, APLAS 2009, Seoul, Korea, December 14-16, 2009, Proceedings ent://SD_ILS/0/SD_ILS:170366 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Hu, Zhenjiang. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10672-9">https://doi.org/10.1007/978-3-642-10672-9</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings ent://SD_ILS/0/SD_ILS:171193 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Abdalla, Michel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01957-9">https://doi.org/10.1007/978-3-642-01957-9</a><br/>Format:&#160;Electronic Resources<br/> Integrated Management of Systems, Services, Processes and People in IT 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2009, Venice, Italy, October 27-28, 2009, Proceedings ent://SD_ILS/0/SD_ILS:170875 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Bartolini, Claudio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04989-7">https://doi.org/10.1007/978-3-642-04989-7</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ent://SD_ILS/0/SD_ILS:171359 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Setola, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03552-4">https://doi.org/10.1007/978-3-642-03552-4</a><br/>Format:&#160;Electronic Resources<br/> Future Generation Information Technology First International Conference, FGIT 2009, Jeju Island, Korea, December 10-12,2009, Proceedings ent://SD_ILS/0/SD_ILS:172124 2025-02-07T07:01:39Z 2025-02-07T07:01:39Z by&#160;Lee, Young Hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10509-8">https://doi.org/10.1007/978-3-642-10509-8</a><br/>Format:&#160;Electronic Resources<br/>