Search Results for - Narrowed by: Springer E-Book Collection - Computer science. - TEDU library - Data encryption (Computer science).SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ATEDU$002509TEDU$002blibrary$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?2024-05-24T01:41:23ZAdvances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4285462024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format: Electronic Resources<br/>Blockchain – ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2260242024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Chen, Shiping. editor. (orcid)0000-0002-4603-0024<br/><a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format: Electronic Resources<br/>Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2249002024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222742024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2220762024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03326-2">https://doi.org/10.1007/978-3-030-03326-2</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218282024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2223282024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2228082024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Reconfigurable Cryptographic Processorent://SD_ILS/0/SD_ILS:2231012024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Liu, Leibo. author.<br/><a href="https://doi.org/10.1007/978-981-10-8899-5">https://doi.org/10.1007/978-981-10-8899-5</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2215642024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2245382024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76578-5">https://doi.org/10.1007/978-3-319-76578-5</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2246282024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2232492024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Number-Theoretic Methods in Cryptology First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2251762024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kaczorowski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76620-1">https://doi.org/10.1007/978-3-319-76620-1</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2249892024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2255572024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2221892024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220992024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Camenisch, Jan. editor. (orcid)0000-0001-6654-9459<br/><a href="https://doi.org/10.1007/978-3-030-00434-7">https://doi.org/10.1007/978-3-030-00434-7</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2221372024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Random Numbers and Computersent://SD_ILS/0/SD_ILS:2228492024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kneusel, Ronald T. author.<br/><a href="https://doi.org/10.1007/978-3-319-77697-2">https://doi.org/10.1007/978-3-319-77697-2</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2235162024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Cuppens, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76687-4">https://doi.org/10.1007/978-3-319-76687-4</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2215302024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Capkun, Srdjan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02641-7">https://doi.org/10.1007/978-3-030-02641-7</a><br/>Format: Electronic Resources<br/>Provable Security 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2212392024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Baek, Joonsang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01446-9">https://doi.org/10.1007/978-3-030-01446-9</a><br/>Format: Electronic Resources<br/>Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2216162024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format: Electronic Resources<br/>Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216452024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Cremers, Cas. editor. (orcid)0000-0003-0322-2293<br/><a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2217842024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03332-3">https://doi.org/10.1007/978-3-030-03332-3</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2222772024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2225842024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2225912024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96884-1">https://doi.org/10.1007/978-3-319-96884-1</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2227172024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2228952024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78372-7">https://doi.org/10.1007/978-3-319-78372-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIent://SD_ILS/0/SD_ILS:2228962024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78375-8">https://doi.org/10.1007/978-3-319-78375-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part Ient://SD_ILS/0/SD_ILS:2228972024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78381-9">https://doi.org/10.1007/978-3-319-78381-9</a><br/>Format: Electronic Resources<br/>Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216272024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format: Electronic Resources<br/>From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthdayent://SD_ILS/0/SD_ILS:2219902024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2218882024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96878-0">https://doi.org/10.1007/978-3-319-96878-0</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2223712024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2225942024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Mobile Networks and Management 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2236872024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Hu, Jiankun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90775-8">https://doi.org/10.1007/978-3-319-90775-8</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2252232024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76581-5">https://doi.org/10.1007/978-3-319-76581-5</a><br/>Format: Electronic Resources<br/>Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2255092024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2267982024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2259962024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2261802024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kiayias, Aggelos. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70972-7">https://doi.org/10.1007/978-3-319-70972-7</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2259462024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-60055-0">https://doi.org/10.1007/978-3-319-60055-0</a><br/>Format: Electronic Resources<br/>Information Security 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2265952024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Nguyen, Phong Q. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69659-1">https://doi.org/10.1007/978-3-319-69659-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2264782024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format: Electronic Resources<br/>Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266732024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Rak, Jacek. editor.<br/><a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2262412024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63697-9">https://doi.org/10.1007/978-3-319-63697-9</a><br/>Format: Electronic Resources<br/>Security Protocols XXV 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2265362024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71075-4">https://doi.org/10.1007/978-3-319-71075-4</a><br/>Format: Electronic Resources<br/>Digital Forensics and Watermarking 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2253912024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Shi, Yun Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53465-7">https://doi.org/10.1007/978-3-319-53465-7</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:2254082024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68505-2">https://doi.org/10.1007/978-3-319-68505-2</a><br/>Format: Electronic Resources<br/>Digital Forensics and Watermarking 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2220842024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kraetzer, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64185-0">https://doi.org/10.1007/978-3-319-64185-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2222112024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Chen, Kefei. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54705-3">https://doi.org/10.1007/978-3-319-54705-3</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2239632024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2252782024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-59870-3">https://doi.org/10.1007/978-3-319-59870-3</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2253772024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245082024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Polychronakis, Michalis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60876-1">https://doi.org/10.1007/978-3-319-60876-1</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2251402024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Obana, Satoshi. editor. (orcid)0000-0003-4795-4779<br/><a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2254982024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Brenner, Michael. editor. (orcid)0000-0003-2690-7340<br/><a href="https://doi.org/10.1007/978-3-319-70278-0">https://doi.org/10.1007/978-3-319-70278-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2259292024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kalai, Yael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70500-2">https://doi.org/10.1007/978-3-319-70500-2</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221782024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72359-4">https://doi.org/10.1007/978-3-319-72359-4</a><br/>Format: Electronic Resources<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:2221512024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Mishra, Prabhat. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI Special Issue on Data and Security Engineeringent://SD_ILS/0/SD_ILS:2227842024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56266-6">https://doi.org/10.1007/978-3-662-56266-6</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2235072024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70004-5">https://doi.org/10.1007/978-3-319-70004-5</a><br/>Format: Electronic Resources<br/>Provable Security 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213542024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Okamoto, Tatsuaki. editor. (orcid)0000-0002-8145-5474<br/><a href="https://doi.org/10.1007/978-3-319-68637-0">https://doi.org/10.1007/978-3-319-68637-0</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:2215712024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68542-7">https://doi.org/10.1007/978-3-319-68542-7</a><br/>Format: Electronic Resources<br/>Electronic Voting First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2216992024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-319-52240-1">https://doi.org/10.1007/978-3-319-52240-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2216542024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63688-7">https://doi.org/10.1007/978-3-319-63688-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - AFRICACRYPT 2017 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213272024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Joye, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57339-7">https://doi.org/10.1007/978-3-319-57339-7</a><br/>Format: Electronic Resources<br/>Smart Computing and Communication First International Conference, SmartCom 2016, Shenzhen, China, December 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2216782024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Qiu, Meikang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52015-5">https://doi.org/10.1007/978-3-319-52015-5</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2217472024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231302024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Wen, Sheng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69471-9">https://doi.org/10.1007/978-3-319-69471-9</a><br/>Format: Electronic Resources<br/>Hardware Protection through Obfuscationent://SD_ILS/0/SD_ILS:2236982024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Forte, Domenic. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49019-9">https://doi.org/10.1007/978-3-319-49019-9</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2225602024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lemke-Rust, Kerstin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54669-8">https://doi.org/10.1007/978-3-319-54669-8</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2227632024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Deng, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59608-2">https://doi.org/10.1007/978-3-319-59608-2</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXI 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2211752024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Livraga, Giovanni. editor. (orcid)0000-0003-2661-8573<br/><a href="https://doi.org/10.1007/978-3-319-61176-1">https://doi.org/10.1007/978-3-319-61176-1</a><br/>Format: Electronic Resources<br/>Secure IT Systems 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213622024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lipmaa, Helger. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70290-2">https://doi.org/10.1007/978-3-319-70290-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222502024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2222512024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format: Electronic Resources<br/>Ethical and Social Issues in the Information Ageent://SD_ILS/0/SD_ILS:2228402024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-319-70712-9">https://doi.org/10.1007/978-3-319-70712-9</a><br/>Format: Electronic Resources<br/>Feistel Ciphers Security Proofs and Cryptanalysisent://SD_ILS/0/SD_ILS:2247202024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Nachef, Valerie. author.<br/><a href="https://doi.org/10.1007/978-3-319-49530-9">https://doi.org/10.1007/978-3-319-49530-9</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2247362024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar De Capitani di Vimercati, Sabrina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58469-0">https://doi.org/10.1007/978-3-319-58469-0</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182882024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Zikas, Vassilis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44618-9">http://dx.doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183972024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Barthe, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46598-2">http://dx.doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186782024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53008-5">http://dx.doi.org/10.1007/978-3-662-53008-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:186792024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53015-3">http://dx.doi.org/10.1007/978-3-662-53015-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186802024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53018-4">http://dx.doi.org/10.1007/978-3-662-53018-4</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186842024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53140-2">http://dx.doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:186872024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Clark, Jeremy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53357-4">http://dx.doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:177772024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186392024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49387-8">http://dx.doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedingsent://SD_ILS/0/SD_ILS:175562024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Caballero, Juan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30806-7">http://dx.doi.org/10.1007/978-3-319-30806-7</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:173242024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Güneysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29078-2">http://dx.doi.org/10.1007/978-3-319-29078-2</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:176182024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Homma, Naofumi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31271-2">http://dx.doi.org/10.1007/978-3-319-31271-2</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography - SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176232024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Dunkelman, Orr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31301-6">http://dx.doi.org/10.1007/978-3-319-31301-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:180732024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40253-6">http://dx.doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182702024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44341-6">http://dx.doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedingsent://SD_ILS/0/SD_ILS:183522024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45871-7">http://dx.doi.org/10.1007/978-3-319-45871-7</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183592024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45931-8">http://dx.doi.org/10.1007/978-3-319-45931-8</a><br/>Format: Electronic Resources<br/>The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthdayent://SD_ILS/0/SD_ILS:186352024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Ryan, Peter Y. A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49301-4">http://dx.doi.org/10.1007/978-3-662-49301-4</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186382024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49384-7">http://dx.doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:191842024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Mueller, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2738-3">http://dx.doi.org/10.1007/978-981-10-2738-3</a><br/>Format: Electronic Resources<br/>Introduction to Cyberdeceptionent://SD_ILS/0/SD_ILS:181422024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Rowe, Neil C. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41187-3">http://dx.doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Elements of Cloud Computing Security A Survey of Key Practicalitiesent://SD_ILS/0/SD_ILS:181522024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Alani, Mohammed M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41411-9">http://dx.doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176942024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31960-5">http://dx.doi.org/10.1007/978-3-319-31960-5</a><br/>Format: Electronic Resources<br/>Electronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182642024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kő, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44159-7">http://dx.doi.org/10.1007/978-3-319-44159-7</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:180062024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:180892024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Bécue, Adrien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40385-4">http://dx.doi.org/10.1007/978-3-319-40385-4</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182822024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Ogawa, Kazuto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44524-3">http://dx.doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179412024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38898-4">http://dx.doi.org/10.1007/978-3-319-38898-4</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186532024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183372024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:186772024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Peyrin, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-52993-5">http://dx.doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:183442024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45741-3">http://dx.doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:183452024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45744-4">http://dx.doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>SOFSEM 2016: Theory and Practice of Computer Science 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186272024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Freivalds, Rūsiņš Mārtiņš. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49192-8">http://dx.doi.org/10.1007/978-3-662-49192-8</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Aggregation Techniques for Smart Grid Communicationsent://SD_ILS/0/SD_ILS:178022024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lu, Rongxing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32899-7">http://dx.doi.org/10.1007/978-3-319-32899-7</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:191852024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Batten, Lynn. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2741-3">http://dx.doi.org/10.1007/978-981-10-2741-3</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedingsent://SD_ILS/0/SD_ILS:173532024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Takagi, Tsuyoshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29360-8">http://dx.doi.org/10.1007/978-3-319-29360-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:175602024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kwon, Soonhak. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30840-1">http://dx.doi.org/10.1007/978-3-319-30840-1</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:174282024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:173332024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Pasalic, Enes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29172-7">http://dx.doi.org/10.1007/978-3-319-29172-7</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176752024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31811-0">http://dx.doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:176442024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31517-1">http://dx.doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:177082024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Colbert, Edward J. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32125-7">http://dx.doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183242024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45381-1">http://dx.doi.org/10.1007/978-3-319-45381-1</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:184132024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Livraga, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47072-6">http://dx.doi.org/10.1007/978-3-319-47072-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186622024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49890-3">http://dx.doi.org/10.1007/978-3-662-49890-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186632024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49896-5">http://dx.doi.org/10.1007/978-3-662-49896-5</a><br/>Format: Electronic Resources<br/>Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183312024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Buccafurri, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45507-5">http://dx.doi.org/10.1007/978-3-319-45507-5</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186172024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49096-9">http://dx.doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186182024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49099-0">http://dx.doi.org/10.1007/978-3-662-49099-0</a><br/>Format: Electronic Resources<br/>Security and Resiliency Analytics for Smart Grids Static and Dynamic Approachesent://SD_ILS/0/SD_ILS:177982024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32871-3">http://dx.doi.org/10.1007/978-3-319-32871-3</a><br/>Format: Electronic Resources<br/>Digital Watermarking Techniques in Curvelet and Ridgelet Domainent://SD_ILS/0/SD_ILS:178072024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Rao, Channapragada Rama Seshagiri. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32951-2">http://dx.doi.org/10.1007/978-3-319-32951-2</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179552024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176832024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kim, Ho-won. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31875-2">http://dx.doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:178682024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Hoepman, Jaap-Henk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33630-5">http://dx.doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:182742024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Hartmann, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44403-1">http://dx.doi.org/10.1007/978-3-319-44403-1</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:183762024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46279-0">http://dx.doi.org/10.1007/978-3-319-46279-0</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183792024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applicationsent://SD_ILS/0/SD_ILS:182172024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Liu, Wen Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42644-0">http://dx.doi.org/10.1007/978-3-319-42644-0</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:182312024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43005-8">http://dx.doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:182362024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Standaert, François-Xavier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43283-0">http://dx.doi.org/10.1007/978-3-319-43283-0</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedingsent://SD_ILS/0/SD_ILS:181542024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Ranise, Silvio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41483-6">http://dx.doi.org/10.1007/978-3-319-41483-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:180852024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40367-0">http://dx.doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:182752024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Hartmann, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44406-2">http://dx.doi.org/10.1007/978-3-319-44406-2</a><br/>Format: Electronic Resources<br/>Understanding Social Engineering Based Scamsent://SD_ILS/0/SD_ILS:164802024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Jakobsson, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-6457-4">http://dx.doi.org/10.1007/978-1-4939-6457-4</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:173682024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29485-8">http://dx.doi.org/10.1007/978-3-319-29485-8</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174892024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30303-1">http://dx.doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174132024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:174212024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29883-2">http://dx.doi.org/10.1007/978-3-319-29883-2</a><br/>Format: Electronic Resources<br/>Ethics in Computing A Concise Moduleent://SD_ILS/0/SD_ILS:173272024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29106-2">http://dx.doi.org/10.1007/978-3-319-29106-2</a><br/>Format: Electronic Resources<br/>SOFSEM 2015: Theory and Practice of Computer Science 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sněžkou, Czech Republic, January 24-29, 2015. Proceedingsent://SD_ILS/0/SD_ILS:247012024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Italiano, Giuseppe F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46078-8">http://dx.doi.org/10.1007/978-3-662-46078-8</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248422024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Böhme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47854-7">http://dx.doi.org/10.1007/978-3-662-47854-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247352024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:247432024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46494-6">http://dx.doi.org/10.1007/978-3-662-46494-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:247442024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46497-7">http://dx.doi.org/10.1007/978-3-662-46497-7</a><br/>Format: Electronic Resources<br/>Secure Wireless Sensor Networks Threats and Solutionsent://SD_ILS/0/SD_ILS:199622024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Conti, Mauro. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3460-7">http://dx.doi.org/10.1007/978-1-4939-3460-7</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:230042024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Foo, Ernest. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19962-7">http://dx.doi.org/10.1007/978-3-319-19962-7</a><br/>Format: Electronic Resources<br/>Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:225902024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:225922024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16745-9">http://dx.doi.org/10.1007/978-3-319-16745-9</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:226232024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17016-9">http://dx.doi.org/10.1007/978-3-319-17016-9</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:226262024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Cuppens, Frédéric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17040-4">http://dx.doi.org/10.1007/978-3-319-17040-4</a><br/>Format: Electronic Resources<br/>Diffusion in Social Networksent://SD_ILS/0/SD_ILS:232602024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Shakarian, Paulo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23105-1">http://dx.doi.org/10.1007/978-3-319-23105-1</a><br/>Format: Electronic Resources<br/>Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:231822024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format: Electronic Resources<br/>Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235542024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format: Electronic Resources<br/>Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234712024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236142024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:233442024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format: Electronic Resources<br/>Cyber Warfare Building the Scientific Foundationent://SD_ILS/0/SD_ILS:221772024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:224692024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lee, Jooyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15943-0">http://dx.doi.org/10.1007/978-3-319-15943-0</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:225302024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Koç, Çetin Kaya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16277-5">http://dx.doi.org/10.1007/978-3-319-16277-5</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:226402024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17127-2">http://dx.doi.org/10.1007/978-3-319-17127-2</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedingsent://SD_ILS/0/SD_ILS:226922024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lehmann, Anja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17470-9">http://dx.doi.org/10.1007/978-3-319-17470-9</a><br/>Format: Electronic Resources<br/>Leakage Resilient Password Systemsent://SD_ILS/0/SD_ILS:226992024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedingsent://SD_ILS/0/SD_ILS:227062024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17533-1">http://dx.doi.org/10.1007/978-3-319-17533-1</a><br/>Format: Electronic Resources<br/>Algebraic Informatics 6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232572024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Maletti, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23021-4">http://dx.doi.org/10.1007/978-3-319-23021-4</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:229242024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format: Electronic Resources<br/>E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232022024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Haenni, Rolf. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22270-7">http://dx.doi.org/10.1007/978-3-319-22270-7</a><br/>Format: Electronic Resources<br/>Smart TV Security Media Playback and Digital Video Broadcastent://SD_ILS/0/SD_ILS:231012024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Michéle, Benjamin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20994-4">http://dx.doi.org/10.1007/978-3-319-20994-4</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:235592024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Huang, Zhiqiu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27051-7">http://dx.doi.org/10.1007/978-3-319-27051-7</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235682024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27152-1">http://dx.doi.org/10.1007/978-3-319-27152-1</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:235712024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Bica, Ion. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27179-8">http://dx.doi.org/10.1007/978-3-319-27179-8</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235762024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format: Electronic Resources<br/>Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defenseent://SD_ILS/0/SD_ILS:234242024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Heckman, Kristin E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25133-2">http://dx.doi.org/10.1007/978-3-319-25133-2</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:225942024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Joye, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16763-3">http://dx.doi.org/10.1007/978-3-319-16763-3</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papersent://SD_ILS/0/SD_ILS:225332024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:225402024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Eisenbarth, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16363-5">http://dx.doi.org/10.1007/978-3-319-16363-5</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228222024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231942024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format: Electronic Resources<br/>Internet of Vehicles - Safe and Intelligent Mobility Second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235802024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Hsu, Ching-Hsien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27293-1">http://dx.doi.org/10.1007/978-3-319-27293-1</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232382024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:231432024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21476-4">http://dx.doi.org/10.1007/978-3-319-21476-4</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XI 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:233362024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24123-4">http://dx.doi.org/10.1007/978-3-319-24123-4</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235462024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format: Electronic Resources<br/>Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:223232024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems -- CHES 2015 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedingsent://SD_ILS/0/SD_ILS:248682024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Güneysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48324-4">http://dx.doi.org/10.1007/978-3-662-48324-4</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247652024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:247722024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security Xent://SD_ILS/0/SD_ILS:247752024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:247792024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46800-5">http://dx.doi.org/10.1007/978-3-662-46800-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:247802024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46803-6">http://dx.doi.org/10.1007/978-3-662-46803-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:248862024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:248872024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235082024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26135-5">http://dx.doi.org/10.1007/978-3-319-26135-5</a><br/>Format: Electronic Resources<br/>Secure IT Systems 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19–21, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235302024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Buchegger, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26502-5">http://dx.doi.org/10.1007/978-3-319-26502-5</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- INDOCRYPT 2015 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235402024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26617-6">http://dx.doi.org/10.1007/978-3-319-26617-6</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedingsent://SD_ILS/0/SD_ILS:224122024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15618-7">http://dx.doi.org/10.1007/978-3-319-15618-7</a><br/>Format: Electronic Resources<br/>Accountability and Security in the Cloud First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lecturesent://SD_ILS/0/SD_ILS:226532024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Felici, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17199-9">http://dx.doi.org/10.1007/978-3-319-17199-9</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:233422024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:233432024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236262024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Thuraisingham, Bhavani. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28865-9">http://dx.doi.org/10.1007/978-3-319-28865-9</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedingsent://SD_ILS/0/SD_ILS:248852024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Niu, Wenjia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48683-2">http://dx.doi.org/10.1007/978-3-662-48683-2</a><br/>Format: Electronic Resources<br/>Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedingsent://SD_ILS/0/SD_ILS:234962024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format: Electronic Resources<br/>Provable Security 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235042024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Au, Man-Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26059-4">http://dx.doi.org/10.1007/978-3-319-26059-4</a><br/>Format: Electronic Resources<br/>Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235052024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format: Electronic Resources<br/>Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Bergerent://SD_ILS/0/SD_ILS:228452024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar El Hajji, Said. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18681-8">http://dx.doi.org/10.1007/978-3-319-18681-8</a><br/>Format: Electronic Resources<br/>Quantum Computational Number Theoryent://SD_ILS/0/SD_ILS:234882024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:248502024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48000-7">http://dx.doi.org/10.1007/978-3-662-48000-7</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248522024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Brenner, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48051-9">http://dx.doi.org/10.1007/978-3-662-48051-9</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248572024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:248482024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47989-6">http://dx.doi.org/10.1007/978-3-662-47989-6</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232132024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Tanaka, Keisuke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22425-1">http://dx.doi.org/10.1007/978-3-319-22425-1</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:233992024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24837-0">http://dx.doi.org/10.1007/978-3-319-24837-0</a><br/>Format: Electronic Resources<br/>Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234002024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24858-5">http://dx.doi.org/10.1007/978-3-319-24858-5</a><br/>Format: Electronic Resources<br/>Encrypted Email The History and Technology of Message Privacyent://SD_ILS/0/SD_ILS:231282024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Orman, Hilarie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21344-6">http://dx.doi.org/10.1007/978-3-319-21344-6</a><br/>Format: Electronic Resources<br/>Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:231292024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Ors, Berna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21356-9">http://dx.doi.org/10.1007/978-3-319-21356-9</a><br/>Format: Electronic Resources<br/>Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:236092024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedingsent://SD_ILS/0/SD_ILS:233272024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Akram, Raja Naeem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24018-3">http://dx.doi.org/10.1007/978-3-319-24018-3</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233372024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format: Electronic Resources<br/>Communication Networks for Smart Grids Making Smart Grid Realent://SD_ILS/0/SD_ILS:195192024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Budka, Kenneth C. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6302-2">http://dx.doi.org/10.1007/978-1-4471-6302-2</a><br/>Format: Electronic Resources<br/>Trustworthy Execution on Mobile Devicesent://SD_ILS/0/SD_ILS:197052024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Vasudevan, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8190-4">http://dx.doi.org/10.1007/978-1-4614-8190-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208752024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06734-6">http://dx.doi.org/10.1007/978-3-319-06734-6</a><br/>Format: Electronic Resources<br/>Querying over Encrypted Data in Smart Gridsent://SD_ILS/0/SD_ILS:208142024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Wen, Mi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06355-3">http://dx.doi.org/10.1007/978-3-319-06355-3</a><br/>Format: Electronic Resources<br/>Code Breaking in the Pacificent://SD_ILS/0/SD_ILS:211522024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Donovan, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08278-3">http://dx.doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:206432024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Danger, Jean Luc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05302-8">http://dx.doi.org/10.1007/978-3-319-05302-8</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedingsent://SD_ILS/0/SD_ILS:211852024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08506-7">http://dx.doi.org/10.1007/978-3-319-08506-7</a><br/>Format: Electronic Resources<br/>Secure Information Management Using Linguistic Threshold Approachent://SD_ILS/0/SD_ILS:194682024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Ogiela, Marek R. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-5016-9">http://dx.doi.org/10.1007/978-1-4471-5016-9</a><br/>Format: Electronic Resources<br/>Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedingsent://SD_ILS/0/SD_ILS:240132024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Martínez Pérez, Gregorio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54525-2">http://dx.doi.org/10.1007/978-3-642-54525-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedingsent://SD_ILS/0/SD_ILS:241052024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55220-5">http://dx.doi.org/10.1007/978-3-642-55220-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:246532024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part Ient://SD_ILS/0/SD_ILS:246542024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 – July 2, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244262024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Naccache, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43826-8">http://dx.doi.org/10.1007/978-3-662-43826-8</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:245422024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Batina, Lejla. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44709-3">http://dx.doi.org/10.1007/978-3-662-44709-3</a><br/>Format: Electronic Resources<br/>Network Science and Cybersecurityent://SD_ILS/0/SD_ILS:196612024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7597-2">http://dx.doi.org/10.1007/978-1-4614-7597-2</a><br/>Format: Electronic Resources<br/>Dynamic Secrets in Communication Securityent://SD_ILS/0/SD_ILS:196732024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Xiao, Sheng. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7831-7">http://dx.doi.org/10.1007/978-1-4614-7831-7</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2014 The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:205572024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Benaloh, Josh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04852-9">http://dx.doi.org/10.1007/978-3-319-04852-9</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:205592024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:204482024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Padró, Carles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04268-8">http://dx.doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:214602024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part Ient://SD_ILS/0/SD_ILS:216562024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11203-9">http://dx.doi.org/10.1007/978-3-319-11203-9</a><br/>Format: Electronic Resources<br/>Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:213842024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Eckert, Claudia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09770-1">http://dx.doi.org/10.1007/978-3-319-09770-1</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part IIent://SD_ILS/0/SD_ILS:216592024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11212-1">http://dx.doi.org/10.1007/978-3-319-11212-1</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:217562024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Mosca, Michele. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11659-4">http://dx.doi.org/10.1007/978-3-319-11659-4</a><br/>Format: Electronic Resources<br/>Automated Firewall Analytics Design, Configuration and Optimizationent://SD_ILS/0/SD_ILS:214992024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10371-6">http://dx.doi.org/10.1007/978-3-319-10371-6</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:218572024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lee, Hyang-Sook. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12160-4">http://dx.doi.org/10.1007/978-3-319-12160-4</a><br/>Format: Electronic Resources<br/>Network and System Security 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:217662024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Au, Man Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11698-3">http://dx.doi.org/10.1007/978-3-319-11698-3</a><br/>Format: Electronic Resources<br/>Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedingsent://SD_ILS/0/SD_ILS:221552024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Prakash, Atul. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13841-1">http://dx.doi.org/10.1007/978-3-319-13841-1</a><br/>Format: Electronic Resources<br/>Security for Cloud Storage Systemsent://SD_ILS/0/SD_ILS:196762024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Yang, Kan. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7873-7">http://dx.doi.org/10.1007/978-1-4614-7873-7</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedingsent://SD_ILS/0/SD_ILS:205632024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Jürjens, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04897-0">http://dx.doi.org/10.1007/978-3-319-04897-0</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208072024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:211572024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Francillon, Aurélien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08302-5">http://dx.doi.org/10.1007/978-3-319-08302-5</a><br/>Format: Electronic Resources<br/>Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:208902024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06811-4">http://dx.doi.org/10.1007/978-3-319-06811-4</a><br/>Format: Electronic Resources<br/>Engineering Secure Future Internet Services and Systems Current Researchent://SD_ILS/0/SD_ILS:210042024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Heisel, Maritta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07452-8">http://dx.doi.org/10.1007/978-3-319-07452-8</a><br/>Format: Electronic Resources<br/>Cyber Defense and Situational Awarenessent://SD_ILS/0/SD_ILS:216972024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kott, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11391-3">http://dx.doi.org/10.1007/978-3-319-11391-3</a><br/>Format: Electronic Resources<br/>Trusted Computing Platforms TPM2.0 in Contextent://SD_ILS/0/SD_ILS:212292024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Proudler, Graeme. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08744-3">http://dx.doi.org/10.1007/978-3-319-08744-3</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:220072024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Saxena, Nitesh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13066-8">http://dx.doi.org/10.1007/978-3-319-13066-8</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 – July 2, 2014. Proceedingsent://SD_ILS/0/SD_ILS:211992024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedingsent://SD_ILS/0/SD_ILS:213952024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Yoshida, Maki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09843-2">http://dx.doi.org/10.1007/978-3-319-09843-2</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedingsent://SD_ILS/0/SD_ILS:210272024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Boureanu, Ioana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07536-5">http://dx.doi.org/10.1007/978-3-319-07536-5</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptographyent://SD_ILS/0/SD_ILS:240842024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55046-1">http://dx.doi.org/10.1007/978-3-642-55046-1</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:240222024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Krawczyk, Hugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54631-0">http://dx.doi.org/10.1007/978-3-642-54631-0</a><br/>Format: Electronic Resources<br/>Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:206132024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kim, Yongdae. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05149-9">http://dx.doi.org/10.1007/978-3-319-05149-9</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VII FOSAD 2012/2013 Tutorial Lecturesent://SD_ILS/0/SD_ILS:214462024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10082-1">http://dx.doi.org/10.1007/978-3-319-10082-1</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedingsent://SD_ILS/0/SD_ILS:219592024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12778-1">http://dx.doi.org/10.1007/978-3-319-12778-1</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:220042024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Meier, Willi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13039-2">http://dx.doi.org/10.1007/978-3-319-13039-2</a><br/>Format: Electronic Resources<br/>Homomorphic Encryption and Applicationsent://SD_ILS/0/SD_ILS:218672024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Yi, Xun. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12229-8">http://dx.doi.org/10.1007/978-3-319-12229-8</a><br/>Format: Electronic Resources<br/>What Is Computer Science? An Information Security Perspectiveent://SD_ILS/0/SD_ILS:204052024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Page, Daniel. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04042-4">http://dx.doi.org/10.1007/978-3-319-04042-4</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedingsent://SD_ILS/0/SD_ILS:211622024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08344-5">http://dx.doi.org/10.1007/978-3-319-08344-5</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedingsent://SD_ILS/0/SD_ILS:216702024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11257-2">http://dx.doi.org/10.1007/978-3-319-11257-2</a><br/>Format: Electronic Resources<br/>Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedingsent://SD_ILS/0/SD_ILS:218032024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11851-2">http://dx.doi.org/10.1007/978-3-319-11851-2</a><br/>Format: Electronic Resources<br/>Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedingsent://SD_ILS/0/SD_ILS:221782024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14054-4">http://dx.doi.org/10.1007/978-3-319-14054-4</a><br/>Format: Electronic Resources<br/>Secure IT Systems 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:217422024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Bernsmed, Karin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11599-3">http://dx.doi.org/10.1007/978-3-319-11599-3</a><br/>Format: Electronic Resources<br/>Construction and Analysis of Cryptographic Functionsent://SD_ILS/0/SD_ILS:219962024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Budaghyan, Lilya. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12991-4">http://dx.doi.org/10.1007/978-3-319-12991-4</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:218462024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12087-4">http://dx.doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:218762024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:239752024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lindell, Yehuda. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54242-8">http://dx.doi.org/10.1007/978-3-642-54242-8</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:244372024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43886-2">http://dx.doi.org/10.1007/978-3-662-43886-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part Ient://SD_ILS/0/SD_ILS:244922024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44371-2">http://dx.doi.org/10.1007/978-3-662-44371-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:244932024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44381-1">http://dx.doi.org/10.1007/978-3-662-44381-1</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:220052024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Joux, Antoine. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13051-4">http://dx.doi.org/10.1007/978-3-319-13051-4</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedingsent://SD_ILS/0/SD_ILS:218412024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12060-7">http://dx.doi.org/10.1007/978-3-319-12060-7</a><br/>Format: Electronic Resources<br/>Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedingsent://SD_ILS/0/SD_ILS:220472024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13257-0">http://dx.doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:240182024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54568-9">http://dx.doi.org/10.1007/978-3-642-54568-9</a><br/>Format: Electronic Resources<br/>Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:239442024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:245732024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44885-4">http://dx.doi.org/10.1007/978-3-662-44885-4</a><br/>Format: Electronic Resources<br/>Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:245742024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Kotulski, Zbigniew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44893-9">http://dx.doi.org/10.1007/978-3-662-44893-9</a><br/>Format: Electronic Resources<br/>Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:246882024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45921-8">http://dx.doi.org/10.1007/978-3-662-45921-8</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:243902024-05-24T01:41:23Z2024-05-24T01:41:23ZYazar Lange, Tanja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43414-7">http://dx.doi.org/10.1007/978-3-662-43414-7</a><br/>Format: Electronic Resources<br/>