Search Results for - Narrowed by: Springer E-Book Collection - 2014 - Management of Computing and Information Systems. - Systems and Data Security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092014$0025092014$0026qf$003dSUBJECT$002509Konu$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300$0026isd$003dtrue? 2024-06-25T14:51:35Z Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:21157 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Francillon, Aur&eacute;lien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08302-5">http://dx.doi.org/10.1007/978-3-319-08302-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21162 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08344-5">http://dx.doi.org/10.1007/978-3-319-08344-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21185 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08506-7">http://dx.doi.org/10.1007/978-3-319-08506-7</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 &ndash; July 2, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21199 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21756 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Mosca, Michele. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11659-4">http://dx.doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 8th International Conference, NSS 2014, Xi&rsquo;an, China, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:21766 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Au, Man Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11698-3">http://dx.doi.org/10.1007/978-3-319-11698-3</a><br/>Format:&#160;Electronic Resources<br/> E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21769 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Sideridis, Alexander B. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11710-2">http://dx.doi.org/10.1007/978-3-319-11710-2</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21891 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12400-1">http://dx.doi.org/10.1007/978-3-319-12400-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24097 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Hansen, Marit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55137-6">http://dx.doi.org/10.1007/978-3-642-55137-6</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24122 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Cuppens-Boulahia, Nora. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55415-5">http://dx.doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/> Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 &ndash; July 3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24431 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Sperotto, Anna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43862-6">http://dx.doi.org/10.1007/978-3-662-43862-6</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:24445 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Moriai, Shiho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43933-3">http://dx.doi.org/10.1007/978-3-662-43933-3</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24446 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43936-4">http://dx.doi.org/10.1007/978-3-662-43936-4</a><br/>Format:&#160;Electronic Resources<br/> ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 &ndash; August 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24476 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Kimppa, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44208-1">http://dx.doi.org/10.1007/978-3-662-44208-1</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented and Cloud Computing Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24572 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Villari, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44879-3">http://dx.doi.org/10.1007/978-3-662-44879-3</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24573 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44885-4">http://dx.doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24688 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45921-8">http://dx.doi.org/10.1007/978-3-662-45921-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24653 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:24654 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24621 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45355-1">http://dx.doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24018 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54568-9">http://dx.doi.org/10.1007/978-3-642-54568-9</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:24044 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Abadi, Mart&iacute;n. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54792-8">http://dx.doi.org/10.1007/978-3-642-54792-8</a><br/>Format:&#160;Electronic Resources<br/> Risk Assessment and Risk-Driven Testing First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:20937 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Bauer, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07076-6">http://dx.doi.org/10.1007/978-3-319-07076-6</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Future Internet Services and Systems Current Research ent://SD_ILS/0/SD_ILS:21004 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Heisel, Maritta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07452-8">http://dx.doi.org/10.1007/978-3-319-07452-8</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21186 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08509-8">http://dx.doi.org/10.1007/978-3-319-08509-8</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21384 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Eckert, Claudia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09770-1">http://dx.doi.org/10.1007/978-3-319-09770-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21491 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10329-7">http://dx.doi.org/10.1007/978-3-319-10329-7</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VII FOSAD 2012/2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:21446 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10082-1">http://dx.doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:21656 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11203-9">http://dx.doi.org/10.1007/978-3-319-11203-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:21659 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11212-1">http://dx.doi.org/10.1007/978-3-319-11212-1</a><br/>Format:&#160;Electronic Resources<br/> Web Technologies and Applications APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21640 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Han, Weihong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11119-3">http://dx.doi.org/10.1007/978-3-319-11119-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21857 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Lee, Hyang-Sook. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12160-4">http://dx.doi.org/10.1007/978-3-319-12160-4</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions and Defenses 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21695 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Stavrou, Angelos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11379-1">http://dx.doi.org/10.1007/978-3-319-11379-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21876 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21803 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11851-2">http://dx.doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23944 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:20448 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Padr&oacute;, Carles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04268-8">http://dx.doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20807 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20875 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06734-6">http://dx.doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21043 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Tryfonas, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07620-1">http://dx.doi.org/10.1007/978-3-319-07620-1</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:21460 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21598 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10879-7">http://dx.doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Challenges, Limitations and R&amp;D Solutions ent://SD_ILS/0/SD_ILS:21531 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10530-7">http://dx.doi.org/10.1007/978-3-319-10530-7</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21902 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12475-9">http://dx.doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21922 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12601-2">http://dx.doi.org/10.1007/978-3-319-12601-2</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:21959 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12778-1">http://dx.doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21841 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12060-7">http://dx.doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22219 2024-06-25T14:51:35Z 2024-06-25T14:51:35Z Yazar&#160;Gladyshev, Pavel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14289-0">http://dx.doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/>