Search Results for - Narrowed by: Springer E-Book Collection - Computer Communication Networks. - Data Encryption.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Konu$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300?2024-05-20T00:22:16ZIntroduction to Cyberdeceptionent://SD_ILS/0/SD_ILS:181422024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Rowe, Neil C. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41187-3">http://dx.doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:173242024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Güneysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29078-2">http://dx.doi.org/10.1007/978-3-319-29078-2</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:174282024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186532024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:191842024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Mueller, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2738-3">http://dx.doi.org/10.1007/978-981-10-2738-3</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186172024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49096-9">http://dx.doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186182024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49099-0">http://dx.doi.org/10.1007/978-3-662-49099-0</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176752024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31811-0">http://dx.doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174132024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:178682024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Hoepman, Jaap-Henk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33630-5">http://dx.doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179552024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182822024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Ogawa, Kazuto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44524-3">http://dx.doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182882024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Zikas, Vassilis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44618-9">http://dx.doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedingsent://SD_ILS/0/SD_ILS:175562024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Caballero, Juan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30806-7">http://dx.doi.org/10.1007/978-3-319-30806-7</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:173682024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29485-8">http://dx.doi.org/10.1007/978-3-319-29485-8</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176832024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Kim, Ho-won. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31875-2">http://dx.doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>Security and Resiliency Analytics for Smart Grids Static and Dynamic Approachesent://SD_ILS/0/SD_ILS:177982024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32871-3">http://dx.doi.org/10.1007/978-3-319-32871-3</a><br/>Format: Electronic Resources<br/>Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applicationsent://SD_ILS/0/SD_ILS:182172024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Liu, Wen Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42644-0">http://dx.doi.org/10.1007/978-3-319-42644-0</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Aggregation Techniques for Smart Grid Communicationsent://SD_ILS/0/SD_ILS:178022024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Lu, Rongxing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32899-7">http://dx.doi.org/10.1007/978-3-319-32899-7</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:180062024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183792024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186842024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53140-2">http://dx.doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:177772024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174892024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30303-1">http://dx.doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:177082024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Colbert, Edward J. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32125-7">http://dx.doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Elements of Cloud Computing Security A Survey of Key Practicalitiesent://SD_ILS/0/SD_ILS:181522024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Alani, Mohammed M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41411-9">http://dx.doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182702024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44341-6">http://dx.doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:223232024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedingsent://SD_ILS/0/SD_ILS:224122024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15618-7">http://dx.doi.org/10.1007/978-3-319-15618-7</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228222024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papersent://SD_ILS/0/SD_ILS:225332024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format: Electronic Resources<br/>Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:231822024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:233992024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24837-0">http://dx.doi.org/10.1007/978-3-319-24837-0</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:231432024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21476-4">http://dx.doi.org/10.1007/978-3-319-21476-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236142024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems -- CHES 2015 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedingsent://SD_ILS/0/SD_ILS:248682024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Güneysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48324-4">http://dx.doi.org/10.1007/978-3-662-48324-4</a><br/>Format: Electronic Resources<br/>Accountability and Security in the Cloud First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lecturesent://SD_ILS/0/SD_ILS:226532024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Felici, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17199-9">http://dx.doi.org/10.1007/978-3-319-17199-9</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235462024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format: Electronic Resources<br/>Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:236092024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236262024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Thuraisingham, Bhavani. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28865-9">http://dx.doi.org/10.1007/978-3-319-28865-9</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247652024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248422024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Böhme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47854-7">http://dx.doi.org/10.1007/978-3-662-47854-7</a><br/>Format: Electronic Resources<br/>Secure Wireless Sensor Networks Threats and Solutionsent://SD_ILS/0/SD_ILS:199622024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Conti, Mauro. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3460-7">http://dx.doi.org/10.1007/978-1-4939-3460-7</a><br/>Format: Electronic Resources<br/>Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:225902024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:225302024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Koç, Çetin Kaya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16277-5">http://dx.doi.org/10.1007/978-3-319-16277-5</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:226402024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17127-2">http://dx.doi.org/10.1007/978-3-319-17127-2</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231942024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format: Electronic Resources<br/>Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235542024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235682024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27152-1">http://dx.doi.org/10.1007/978-3-319-27152-1</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:235712024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Bica, Ion. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27179-8">http://dx.doi.org/10.1007/978-3-319-27179-8</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233372024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:233442024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232132024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Tanaka, Keisuke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22425-1">http://dx.doi.org/10.1007/978-3-319-22425-1</a><br/>Format: Electronic Resources<br/>Cyber Warfare Building the Scientific Foundationent://SD_ILS/0/SD_ILS:221772024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:225402024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Eisenbarth, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16363-5">http://dx.doi.org/10.1007/978-3-319-16363-5</a><br/>Format: Electronic Resources<br/>Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234712024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format: Electronic Resources<br/>E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232022024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Haenni, Rolf. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22270-7">http://dx.doi.org/10.1007/978-3-319-22270-7</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:235592024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Huang, Zhiqiu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27051-7">http://dx.doi.org/10.1007/978-3-319-27051-7</a><br/>Format: Electronic Resources<br/>Encrypted Email The History and Technology of Message Privacyent://SD_ILS/0/SD_ILS:231282024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Orman, Hilarie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21344-6">http://dx.doi.org/10.1007/978-3-319-21344-6</a><br/>Format: Electronic Resources<br/>Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235052024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedingsent://SD_ILS/0/SD_ILS:218842024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Schmidt, Kai-Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12325-7">http://dx.doi.org/10.1007/978-3-319-12325-7</a><br/>Format: Electronic Resources<br/>Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:218912024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12400-1">http://dx.doi.org/10.1007/978-3-319-12400-1</a><br/>Format: Electronic Resources<br/>Cyber Defense and Situational Awarenessent://SD_ILS/0/SD_ILS:216972024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Kott, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11391-3">http://dx.doi.org/10.1007/978-3-319-11391-3</a><br/>Format: Electronic Resources<br/>Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedingsent://SD_ILS/0/SD_ILS:221552024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Prakash, Atul. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13841-1">http://dx.doi.org/10.1007/978-3-319-13841-1</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedingsent://SD_ILS/0/SD_ILS:205632024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Jürjens, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04897-0">http://dx.doi.org/10.1007/978-3-319-04897-0</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:218762024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:245732024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44885-4">http://dx.doi.org/10.1007/978-3-662-44885-4</a><br/>Format: Electronic Resources<br/>Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedingsent://SD_ILS/0/SD_ILS:240132024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Martínez Pérez, Gregorio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54525-2">http://dx.doi.org/10.1007/978-3-642-54525-2</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedingsent://SD_ILS/0/SD_ILS:240442024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Abadi, Martín. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54792-8">http://dx.doi.org/10.1007/978-3-642-54792-8</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208072024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:214602024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format: Electronic Resources<br/>Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:246882024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45921-8">http://dx.doi.org/10.1007/978-3-662-45921-8</a><br/>Format: Electronic Resources<br/>Dynamic Secrets in Communication Securityent://SD_ILS/0/SD_ILS:196732024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Xiao, Sheng. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7831-7">http://dx.doi.org/10.1007/978-1-4614-7831-7</a><br/>Format: Electronic Resources<br/>Communication Networks for Smart Grids Making Smart Grid Realent://SD_ILS/0/SD_ILS:195192024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Budka, Kenneth C. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6302-2">http://dx.doi.org/10.1007/978-1-4471-6302-2</a><br/>Format: Electronic Resources<br/>Trustworthy Execution on Mobile Devicesent://SD_ILS/0/SD_ILS:197052024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Vasudevan, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8190-4">http://dx.doi.org/10.1007/978-1-4614-8190-4</a><br/>Format: Electronic Resources<br/>Network Science and Cybersecurityent://SD_ILS/0/SD_ILS:196612024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7597-2">http://dx.doi.org/10.1007/978-1-4614-7597-2</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:220072024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Saxena, Nitesh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13066-8">http://dx.doi.org/10.1007/978-3-319-13066-8</a><br/>Format: Electronic Resources<br/>Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedingsent://SD_ILS/0/SD_ILS:221782024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14054-4">http://dx.doi.org/10.1007/978-3-319-14054-4</a><br/>Format: Electronic Resources<br/>Querying over Encrypted Data in Smart Gridsent://SD_ILS/0/SD_ILS:208142024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Wen, Mi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06355-3">http://dx.doi.org/10.1007/978-3-319-06355-3</a><br/>Format: Electronic Resources<br/>Automated Firewall Analytics Design, Configuration and Optimizationent://SD_ILS/0/SD_ILS:214992024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10371-6">http://dx.doi.org/10.1007/978-3-319-10371-6</a><br/>Format: Electronic Resources<br/>Network and System Security 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:217662024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Au, Man Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11698-3">http://dx.doi.org/10.1007/978-3-319-11698-3</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedingsent://SD_ILS/0/SD_ILS:218412024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12060-7">http://dx.doi.org/10.1007/978-3-319-12060-7</a><br/>Format: Electronic Resources<br/>Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:239442024-05-20T00:22:16Z2024-05-20T00:22:16ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format: Electronic Resources<br/>