Search Results for - Narrowed by: Springer E-Book Collection - 2016 - Systems and Data Security. - Computer security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092016$0025092016$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-06-03T15:39:53ZUnderstanding Social Engineering Based Scamsent://SD_ILS/0/SD_ILS:164802024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Jakobsson, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-6457-4">http://dx.doi.org/10.1007/978-1-4939-6457-4</a><br/>Format: Electronic Resources<br/>Secure System Design and Trustable Computingent://SD_ILS/0/SD_ILS:165212024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Chang, Chip-Hong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14971-4">http://dx.doi.org/10.1007/978-3-319-14971-4</a><br/>Format: Electronic Resources<br/>Mobile and Wireless Technologies 2016ent://SD_ILS/0/SD_ILS:191312024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1409-3">http://dx.doi.org/10.1007/978-981-10-1409-3</a><br/>Format: Electronic Resources<br/>Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 2ent://SD_ILS/0/SD_ILS:190762024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0755-2">http://dx.doi.org/10.1007/978-981-10-0755-2</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186382024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49384-7">http://dx.doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Information Science and Applications (ICISA) 2016ent://SD_ILS/0/SD_ILS:190442024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0557-2">http://dx.doi.org/10.1007/978-981-10-0557-2</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174712024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30222-5">http://dx.doi.org/10.1007/978-3-319-30222-5</a><br/>Format: Electronic Resources<br/>Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:173332024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Pasalic, Enes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29172-7">http://dx.doi.org/10.1007/978-3-319-29172-7</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176752024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31811-0">http://dx.doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176942024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31960-5">http://dx.doi.org/10.1007/978-3-319-31960-5</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:178682024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Hoepman, Jaap-Henk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33630-5">http://dx.doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Advances in Neural Networks – ISNN 2016 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:181192024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Cheng, Long. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40663-3">http://dx.doi.org/10.1007/978-3-319-40663-3</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:181722024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Aspinall, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41763-9">http://dx.doi.org/10.1007/978-3-319-41763-9</a><br/>Format: Electronic Resources<br/>Advanced Information Systems Engineering Workshops CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:180072024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Krogstie, John. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39564-7">http://dx.doi.org/10.1007/978-3-319-39564-7</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179412024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38898-4">http://dx.doi.org/10.1007/978-3-319-38898-4</a><br/>Format: Electronic Resources<br/>Cloud Computing 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Proceedingsent://SD_ILS/0/SD_ILS:179432024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Zhang, Yin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38904-2">http://dx.doi.org/10.1007/978-3-319-38904-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186622024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49890-3">http://dx.doi.org/10.1007/978-3-662-49890-3</a><br/>Format: Electronic Resources<br/>Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applicationsent://SD_ILS/0/SD_ILS:182172024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Liu, Wen Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42644-0">http://dx.doi.org/10.1007/978-3-319-42644-0</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183972024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Barthe, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46598-2">http://dx.doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:176182024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Homma, Naofumi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31271-2">http://dx.doi.org/10.1007/978-3-319-31271-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186782024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53008-5">http://dx.doi.org/10.1007/978-3-662-53008-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186802024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53018-4">http://dx.doi.org/10.1007/978-3-662-53018-4</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXVIII Special Issue on Cyberworlds and Cybersecurityent://SD_ILS/0/SD_ILS:186822024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Gavrilova, Marina L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53090-0">http://dx.doi.org/10.1007/978-3-662-53090-0</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186842024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53140-2">http://dx.doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:186872024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Clark, Jeremy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53357-4">http://dx.doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:182362024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Standaert, François-Xavier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43283-0">http://dx.doi.org/10.1007/978-3-319-43283-0</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176362024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Berendt, Bettina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31456-3">http://dx.doi.org/10.1007/978-3-319-31456-3</a><br/>Format: Electronic Resources<br/>Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:172392024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Haltinner, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28313-5">http://dx.doi.org/10.1007/978-3-319-28313-5</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183422024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Monrose, Fabian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45719-2">http://dx.doi.org/10.1007/978-3-319-45719-2</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:183442024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45741-3">http://dx.doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Boolean Functions and Their Applications in Cryptographyent://SD_ILS/0/SD_ILS:186112024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Wu, Chuan-Kun. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48865-2">http://dx.doi.org/10.1007/978-3-662-48865-2</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186172024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49096-9">http://dx.doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186182024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49099-0">http://dx.doi.org/10.1007/978-3-662-49099-0</a><br/>Format: Electronic Resources<br/>Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1ent://SD_ILS/0/SD_ILS:190782024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0767-5">http://dx.doi.org/10.1007/978-981-10-0767-5</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedingsent://SD_ILS/0/SD_ILS:173532024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Takagi, Tsuyoshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29360-8">http://dx.doi.org/10.1007/978-3-319-29360-8</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:172842024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Ganty, Pierre. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28766-9">http://dx.doi.org/10.1007/978-3-319-28766-9</a><br/>Format: Electronic Resources<br/>Cybersecurity Investments Decision Support Under Economic Aspectsent://SD_ILS/0/SD_ILS:175142024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Beissel, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30460-1">http://dx.doi.org/10.1007/978-3-319-30460-1</a><br/>Format: Electronic Resources<br/>Physical and Data-Link Security Techniques for Future Communication Systemsent://SD_ILS/0/SD_ILS:168652024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Baldi, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23609-4">http://dx.doi.org/10.1007/978-3-319-23609-4</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedingsent://SD_ILS/0/SD_ILS:175212024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Karagiannis, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30505-9">http://dx.doi.org/10.1007/978-3-319-30505-9</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:176812024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31863-9">http://dx.doi.org/10.1007/978-3-319-31863-9</a><br/>Format: Electronic Resources<br/>Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:174212024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29883-2">http://dx.doi.org/10.1007/978-3-319-29883-2</a><br/>Format: Electronic Resources<br/>Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:181502024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Habib, Sheikh Mahbub. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41354-9">http://dx.doi.org/10.1007/978-3-319-41354-9</a><br/>Format: Electronic Resources<br/>Security and Resiliency Analytics for Smart Grids Static and Dynamic Approachesent://SD_ILS/0/SD_ILS:177982024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32871-3">http://dx.doi.org/10.1007/978-3-319-32871-3</a><br/>Format: Electronic Resources<br/>Elements of Cloud Computing Security A Survey of Key Practicalitiesent://SD_ILS/0/SD_ILS:181522024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Alani, Mohammed M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41411-9">http://dx.doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Aggregation Techniques for Smart Grid Communicationsent://SD_ILS/0/SD_ILS:178022024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Lu, Rongxing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32899-7">http://dx.doi.org/10.1007/978-3-319-32899-7</a><br/>Format: Electronic Resources<br/>The Quest to Cyber Superiority Cybersecurity Regulations, Frameworks, and Strategies of Major Economiesent://SD_ILS/0/SD_ILS:181062024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Kshetri, Nir. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40554-4">http://dx.doi.org/10.1007/978-3-319-40554-4</a><br/>Format: Electronic Resources<br/>Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:179042024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Lecomte, Thierry. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33951-1">http://dx.doi.org/10.1007/978-3-319-33951-1</a><br/>Format: Electronic Resources<br/>Moving Target Defense for Distributed Systemsent://SD_ILS/0/SD_ILS:175902024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Shetty, Sachin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31032-9">http://dx.doi.org/10.1007/978-3-319-31032-9</a><br/>Format: Electronic Resources<br/>Industrial IoT Technologies and Applications International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:182712024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Wan, Jiafu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44350-8">http://dx.doi.org/10.1007/978-3-319-44350-8</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:182742024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Hartmann, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44403-1">http://dx.doi.org/10.1007/978-3-319-44403-1</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182812024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Aiello, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44482-6">http://dx.doi.org/10.1007/978-3-319-44482-6</a><br/>Format: Electronic Resources<br/>Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:180302024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Badonnel, Rémi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39814-3">http://dx.doi.org/10.1007/978-3-319-39814-3</a><br/>Format: Electronic Resources<br/>Technology and Intimacy: Choice or Coercion 12th IFIP TC 9 International Conference on Human Choice and Computers, HCC12 2016, Salford, UK, September 7-9, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182982024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Kreps, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44805-3">http://dx.doi.org/10.1007/978-3-319-44805-3</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183282024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Skavhaug, Amund. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45477-1">http://dx.doi.org/10.1007/978-3-319-45477-1</a><br/>Format: Electronic Resources<br/>Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183312024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Buccafurri, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45507-5">http://dx.doi.org/10.1007/978-3-319-45507-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 1ent://SD_ILS/0/SD_ILS:187732024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2650-5">http://dx.doi.org/10.1007/978-81-322-2650-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 2ent://SD_ILS/0/SD_ILS:187742024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2653-6">http://dx.doi.org/10.1007/978-81-322-2653-6</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183372024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:176442024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31517-1">http://dx.doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII Selected Papers from FDSE 2014ent://SD_ILS/0/SD_ILS:186252024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49175-1">http://dx.doi.org/10.1007/978-3-662-49175-1</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:191842024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Mueller, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2738-3">http://dx.doi.org/10.1007/978-981-10-2738-3</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179552024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174332024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29968-6">http://dx.doi.org/10.1007/978-3-319-29968-6</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:177772024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:180732024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40253-6">http://dx.doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:177082024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Colbert, Edward J. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32125-7">http://dx.doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:179872024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Tryfonas, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39381-0">http://dx.doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedingsent://SD_ILS/0/SD_ILS:181542024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Ranise, Silvio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41483-6">http://dx.doi.org/10.1007/978-3-319-41483-6</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:180062024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183592024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45931-8">http://dx.doi.org/10.1007/978-3-319-45931-8</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183602024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Li, Wenfeng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45940-0">http://dx.doi.org/10.1007/978-3-319-45940-0</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182702024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44341-6">http://dx.doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Graphical Models for Security Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:183752024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Kordy, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46263-9">http://dx.doi.org/10.1007/978-3-319-46263-9</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:183762024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46279-0">http://dx.doi.org/10.1007/978-3-319-46279-0</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183792024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182822024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Ogawa, Kazuto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44524-3">http://dx.doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182882024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Zikas, Vassilis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44618-9">http://dx.doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182922024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Schiffner, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44760-5">http://dx.doi.org/10.1007/978-3-319-44760-5</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186532024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprisesent://SD_ILS/0/SD_ILS:185322024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Pierer, Markus. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-15046-4">http://dx.doi.org/10.1007/978-3-658-15046-4</a><br/>Format: Electronic Resources<br/>Introduction to Cyberdeceptionent://SD_ILS/0/SD_ILS:181422024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Rowe, Neil C. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41187-3">http://dx.doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN & PDCAT 2015ent://SD_ILS/0/SD_ILS:189652024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Park, James J. (Jong Hyuk). editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0068-3">http://dx.doi.org/10.1007/978-981-10-0068-3</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015ent://SD_ILS/0/SD_ILS:189922024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Senthilkumar, Muthukrishnan. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0251-9">http://dx.doi.org/10.1007/978-981-10-0251-9</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:191852024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Batten, Lynn. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2741-3">http://dx.doi.org/10.1007/978-981-10-2741-3</a><br/>Format: Electronic Resources<br/>Cybersecurity in the European Union Resilience and Adaptability in Governance Policyent://SD_ILS/0/SD_ILS:158012024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Christou, George. author.<br/><a href="http://dx.doi.org/10.1057/9781137400529">http://dx.doi.org/10.1057/9781137400529</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174892024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30303-1">http://dx.doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:172062024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Bjørner, Nikolaj. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28034-9">http://dx.doi.org/10.1007/978-3-319-28034-9</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:176572024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Panayiotou, Christos G. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31664-2">http://dx.doi.org/10.1007/978-3-319-31664-2</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174132024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Trends and Applications in Software Engineering Proceedings of the 4th International Conference on Software Process Improvement CIMPS'2015ent://SD_ILS/0/SD_ILS:170482024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Mejia, Jezreel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26285-7">http://dx.doi.org/10.1007/978-3-319-26285-7</a><br/>Format: Electronic Resources<br/>Recent Advances in Systems Safety and Securityent://SD_ILS/0/SD_ILS:177522024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Pricop, Emil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32525-5">http://dx.doi.org/10.1007/978-3-319-32525-5</a><br/>Format: Electronic Resources<br/>Computer Networks 23rd International Conference, CN 2016, Brunów, Poland, June 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:179702024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Gaj, Piotr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39207-3">http://dx.doi.org/10.1007/978-3-319-39207-3</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:180852024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40367-0">http://dx.doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:180892024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Bécue, Adrien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40385-4">http://dx.doi.org/10.1007/978-3-319-40385-4</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:182752024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Hartmann, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44406-2">http://dx.doi.org/10.1007/978-3-319-44406-2</a><br/>Format: Electronic Resources<br/>Security in Network Codingent://SD_ILS/0/SD_ILS:175962024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Zhang, Peng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31083-1">http://dx.doi.org/10.1007/978-3-319-31083-1</a><br/>Format: Electronic Resources<br/>Security-Aware Device-to-Device Communications Underlaying Cellular Networksent://SD_ILS/0/SD_ILS:177472024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Zhang, Aiqing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32458-6">http://dx.doi.org/10.1007/978-3-319-32458-6</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183802024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Galinina, Olga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46301-8">http://dx.doi.org/10.1007/978-3-319-46301-8</a><br/>Format: Electronic Resources<br/>Information Technology: New Generations 13th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:177482024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Latifi, Shahram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32467-8">http://dx.doi.org/10.1007/978-3-319-32467-8</a><br/>Format: Electronic Resources<br/>Physical-Layer Security for Cooperative Relay Networksent://SD_ILS/0/SD_ILS:176082024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Zou, Yulong. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31174-6">http://dx.doi.org/10.1007/978-3-319-31174-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186632024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49896-5">http://dx.doi.org/10.1007/978-3-662-49896-5</a><br/>Format: Electronic Resources<br/>Autonomous Agents and Multiagent Systems AAMAS 2016 Workshops, Visionary Papers, Singapore, Singapore, May 9-10, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:184072024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Osman, Nardine. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46840-2">http://dx.doi.org/10.1007/978-3-319-46840-2</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:186772024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Peyrin, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-52993-5">http://dx.doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:184132024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Livraga, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47072-6">http://dx.doi.org/10.1007/978-3-319-47072-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:186792024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53015-3">http://dx.doi.org/10.1007/978-3-662-53015-3</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography - SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176232024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Dunkelman, Orr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31301-6">http://dx.doi.org/10.1007/978-3-319-31301-6</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:182312024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43005-8">http://dx.doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183242024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45381-1">http://dx.doi.org/10.1007/978-3-319-45381-1</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:183452024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45744-4">http://dx.doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXVI Special Issue on Cyberworlds and Cybersecurityent://SD_ILS/0/SD_ILS:186312024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Gavrilova, Marina L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49247-5">http://dx.doi.org/10.1007/978-3-662-49247-5</a><br/>Format: Electronic Resources<br/>The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthdayent://SD_ILS/0/SD_ILS:186352024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Ryan, Peter Y. A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49301-4">http://dx.doi.org/10.1007/978-3-662-49301-4</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186392024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49387-8">http://dx.doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Watermarking Securityent://SD_ILS/0/SD_ILS:190352024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Bas, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0506-0">http://dx.doi.org/10.1007/978-981-10-0506-0</a><br/>Format: Electronic Resources<br/>Industrial Espionage and Technical Surveillance Counter Measurersent://SD_ILS/0/SD_ILS:172702024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Androulidakis, Iosif. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28666-2">http://dx.doi.org/10.1007/978-3-319-28666-2</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:173682024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29485-8">http://dx.doi.org/10.1007/978-3-319-29485-8</a><br/>Format: Electronic Resources<br/>Big Data Concepts, Theories, and Applicationsent://SD_ILS/0/SD_ILS:171902024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Yu, Shui. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27763-9">http://dx.doi.org/10.1007/978-3-319-27763-9</a><br/>Format: Electronic Resources<br/>Collaborative Computing: Networking, Applications, and Worksharing 11th International Conference, CollaborateCom 2015, Wuhan, November 10-11, 2015, China. Proceedingsent://SD_ILS/0/SD_ILS:173032024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Guo, Song. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28910-6">http://dx.doi.org/10.1007/978-3-319-28910-6</a><br/>Format: Electronic Resources<br/>VoIP and PBX Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:173992024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29721-7">http://dx.doi.org/10.1007/978-3-319-29721-7</a><br/>Format: Electronic Resources<br/>Mobile Phone Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:174022024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29742-2">http://dx.doi.org/10.1007/978-3-319-29742-2</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:173242024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Güneysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29078-2">http://dx.doi.org/10.1007/978-3-319-29078-2</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176832024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Kim, Ho-won. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31875-2">http://dx.doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:174282024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Building Trust in Information Perspectives on the Frontiers of Provenanceent://SD_ILS/0/SD_ILS:180672024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Lemieux, Victoria L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40226-0">http://dx.doi.org/10.1007/978-3-319-40226-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:175602024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Kwon, Soonhak. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30840-1">http://dx.doi.org/10.1007/978-3-319-30840-1</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:180992024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Mitton, Nathalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40509-4">http://dx.doi.org/10.1007/978-3-319-40509-4</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 13th International Conference, ICIAR 2016, in Memory of Mohamed Kamel, Póvoa de Varzim, Portugal, July 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:181562024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Campilho, Aurélio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41501-7">http://dx.doi.org/10.1007/978-3-319-41501-7</a><br/>Format: Electronic Resources<br/>Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedingsent://SD_ILS/0/SD_ILS:183522024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45871-7">http://dx.doi.org/10.1007/978-3-319-45871-7</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:178372024-06-03T15:39:53Z2024-06-03T15:39:53ZYazar Rome, Erich. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33331-1">http://dx.doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>