Search Results for - Narrowed by: Springer E-Book Collection - Computer science. - Computer security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-05-12T18:54:50Z Big Scientific Data Management First International Conference, BigSDM 2018, Beijing, China, November 30 &ndash; December 1, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427712 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Li, Jianhui. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28061-1">https://doi.org/10.1007/978-3-030-28061-1</a><br/>Format:&#160;Electronic Resources<br/> Open Source Systems 15th IFIP WG 2.13 International Conference, OSS 2019, Montreal, QC, Canada, May 26&ndash;27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427833 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Bordeleau, Francis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20883-7">https://doi.org/10.1007/978-3-030-20883-7</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Software Engineering ent://SD_ILS/0/SD_ILS:428269 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Cha, Sungdeok. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00262-6">https://doi.org/10.1007/978-3-030-00262-6</a><br/>Format:&#160;Electronic Resources<br/> New Trends in Computer Technologies and Applications 23rd International Computer Symposium, ICS 2018, Yunlin, Taiwan, December 20&ndash;22, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428532 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Chang, Chuan-Yu. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9190-3">https://doi.org/10.1007/978-981-13-9190-3</a><br/>Format:&#160;Electronic Resources<br/> IoT as a Service Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20&ndash;22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221499 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lin, Yi-Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00410-1">https://doi.org/10.1007/978-3-030-00410-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2018, Valencia, Spain, September 26&ndash;28, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221970 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Domingo-Ferrer, Josep. editor. (orcid)0000-0001-7213-4962<br/><a href="https://doi.org/10.1007/978-3-319-99771-1">https://doi.org/10.1007/978-3-319-99771-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222387 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Electronic Resources<br/> Automated Technology for Verification and Analysis 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221544 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lahiri, Shuvendu K. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01090-4">https://doi.org/10.1007/978-3-030-01090-4</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Computer Applications Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE ent://SD_ILS/0/SD_ILS:221782 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Alja&rsquo;am, Jihad Mohamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89914-5">https://doi.org/10.1007/978-3-319-89914-5</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity in Germany ent://SD_ILS/0/SD_ILS:221428 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Schallbruch, Martin. author.<br/><a href="https://doi.org/10.1007/978-3-319-90014-8">https://doi.org/10.1007/978-3-319-90014-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XIV 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221820 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99277-8">https://doi.org/10.1007/978-3-319-99277-8</a><br/>Format:&#160;Electronic Resources<br/> From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday ent://SD_ILS/0/SD_ILS:221990 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17&minus;21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA ent://SD_ILS/0/SD_ILS:221156 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes 7th International Provenance and Annotation Workshop, IPAW 2018, London, UK, July 9-10, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221448 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Belhajjame, Khalid. editor. (orcid)0000-0001-6938-0820<br/><a href="https://doi.org/10.1007/978-3-319-98379-0">https://doi.org/10.1007/978-3-319-98379-0</a><br/>Format:&#160;Electronic Resources<br/> Honeypot Frameworks and Their Applications: A New Framework ent://SD_ILS/0/SD_ILS:221443 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format:&#160;Electronic Resources<br/> Secure Networked Inference with Unreliable Data Sources ent://SD_ILS/0/SD_ILS:221829 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221564 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5&ndash;6, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222371 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221859 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/><a href="https://doi.org/10.1007/978-3-030-00305-0">https://doi.org/10.1007/978-3-030-00305-0</a><br/>Format:&#160;Electronic Resources<br/> RoboCup 2017: Robot World Cup XXI ent://SD_ILS/0/SD_ILS:222097 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Akiyama, Hidehisa. editor. (orcid)0000-0002-9793-9123<br/><a href="https://doi.org/10.1007/978-3-030-00308-1">https://doi.org/10.1007/978-3-030-00308-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222274 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222277 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221851 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222189 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format:&#160;Electronic Resources<br/> Symbiotic Interaction 6th International Workshop, Symbiotic 2017, Eindhoven, The Netherlands, December 18&ndash;19, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:224045 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Ham, Jaap. editor. (orcid)0000-0003-1703-5165<br/><a href="https://doi.org/10.1007/978-3-319-91593-7">https://doi.org/10.1007/978-3-319-91593-7</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29&ndash;31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222328 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 14th International Workshop, STM 2018, Barcelona, Spain, September 6&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222749 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-030-01141-3">https://doi.org/10.1007/978-3-030-01141-3</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221645 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Cremers, Cas. editor. (orcid)0000-0003-0322-2293<br/><a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26&ndash;27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224577 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format:&#160;Electronic Resources<br/> Image and Video Technology PSIVT 2017 International Workshops, Wuhan, China, November 20-24, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:224578 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Satoh, Shin'ichi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92753-4">https://doi.org/10.1007/978-3-319-92753-4</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226489 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74860-3">https://doi.org/10.1007/978-3-319-74860-3</a><br/>Format:&#160;Electronic Resources<br/> Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living 16th International Conference, ICOST 2018, Singapore, Singapore, July 10-12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:226419 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Mokhtari, Mounir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94523-1">https://doi.org/10.1007/978-3-319-94523-1</a><br/>Format:&#160;Electronic Resources<br/> Engineering Psychology and Cognitive Ergonomics 15th International Conference, EPCE 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:226776 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Harris, Don. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91122-9">https://doi.org/10.1007/978-3-319-91122-9</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16&ndash;18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:226798 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format:&#160;Electronic Resources<br/> Theory and Practice of Model Transformation 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Toulouse, France, June 25&ndash;26, 2018, Proceedings ent://SD_ILS/0/SD_ILS:225554 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Rensink, Arend. editor. (orcid)0000-0002-1714-6319<br/><a href="https://doi.org/10.1007/978-3-319-93317-7">https://doi.org/10.1007/978-3-319-93317-7</a><br/>Format:&#160;Electronic Resources<br/> Data Management Technologies and Applications 6th International Conference, DATA 2017, Madrid, Spain, July 24&ndash;26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226277 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Filipe, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94809-6">https://doi.org/10.1007/978-3-319-94809-6</a><br/>Format:&#160;Electronic Resources<br/> Dynamic Logic. New Trends and Applications First International Workshop, DALI 2017, Brasilia, Brazil, September 23-24, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226189 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Madeira, Alexandre. editor. (orcid)0000-0002-0646-2017<br/><a href="https://doi.org/10.1007/978-3-319-73579-5">https://doi.org/10.1007/978-3-319-73579-5</a><br/>Format:&#160;Electronic Resources<br/> Blockchain &ndash; ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:226024 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Chen, Shiping. editor. (orcid)0000-0002-4603-0024<br/><a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:226788 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92037-5">https://doi.org/10.1007/978-3-319-92037-5</a><br/>Format:&#160;Electronic Resources<br/> Multi-Agent Systems and Agreement Technologies 15th European Conference, EUMAS 2017, and 5th International Conference, AT 2017, Evry, France, December 14-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221241 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Belardinelli, Francesco. editor. (orcid)0000-0002-7768-1794<br/><a href="https://doi.org/10.1007/978-3-030-01713-2">https://doi.org/10.1007/978-3-030-01713-2</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Software &ndash; ICMS 2018 6th International Conference, South Bend, IN, USA, July 24-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222589 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Davenport, James H. editor. (orcid)0000-0002-3982-7545<br/><a href="https://doi.org/10.1007/978-3-319-96418-8">https://doi.org/10.1007/978-3-319-96418-8</a><br/>Format:&#160;Electronic Resources<br/> Image Analysis and Recognition 15th International Conference, ICIAR 2018, P&oacute;voa de Varzim, Portugal, June 27&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224803 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Campilho, Aur&eacute;lio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93000-8">https://doi.org/10.1007/978-3-319-93000-8</a><br/>Format:&#160;Electronic Resources<br/> Smart and Innovative Trends in Next Generation Computing Technologies Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:224646 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Bhattacharyya, Pushpak. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8657-1">https://doi.org/10.1007/978-981-10-8657-1</a><br/>Format:&#160;Electronic Resources<br/> Human-Computer Interaction. Interaction Technologies 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:222247 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Kurosu, Masaaki. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91250-9">https://doi.org/10.1007/978-3-319-91250-9</a><br/>Format:&#160;Electronic Resources<br/> Modeling Decisions for Artificial Intelligence 15th International Conference, MDAI 2018, Mallorca, Spain, October 15&ndash;18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221231 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Torra, Vicen&ccedil;. editor. (orcid)0000-0002-0368-8037<br/><a href="https://doi.org/10.1007/978-3-030-00202-2">https://doi.org/10.1007/978-3-030-00202-2</a><br/>Format:&#160;Electronic Resources<br/> Human-Computer Interaction. Theories, Methods, and Human Issues 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:222365 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Kurosu, Masaaki. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91238-7">https://doi.org/10.1007/978-3-319-91238-7</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222594 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225509 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225515 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Matou&scaron;ek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/> Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:225564 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format:&#160;Electronic Resources<br/> Human Interface and the Management of Information. Information in Applications and Services 20th International Conference, HIMI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:221221 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Yamamoto, Sakae. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92046-7">https://doi.org/10.1007/978-3-319-92046-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222137 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format:&#160;Electronic Resources<br/> Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications 22nd Iberoamerican Congress, CIARP 2017, Valpara&iacute;so, Chile, November 7&ndash;10, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222768 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Mendoza, Marcelo. editor. (orcid)0000-0002-7969-6041<br/><a href="https://doi.org/10.1007/978-3-319-75193-1">https://doi.org/10.1007/978-3-319-75193-1</a><br/>Format:&#160;Electronic Resources<br/> Smart and Innovative Trends in Next Generation Computing Technologies Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:222680 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Bhattacharyya, Pushpak. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8660-1">https://doi.org/10.1007/978-981-10-8660-1</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of IT for the Aged Population. Acceptance, Communication and Participation 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:222602 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92034-4">https://doi.org/10.1007/978-3-319-92034-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222452 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907<br/><a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222483 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222717 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223152 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221627 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3&ndash;5, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:223249 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21&ndash;22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221663 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Dinur, Itai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221247 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Ganapathi, Geetha. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:222444 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:222808 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/> Computational Data and Social Networks 7th International Conference, CSoNet 2018, Shanghai, China, December 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222810 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Chen, Xuemin. editor. (orcid)0000-0003-3820-9195<br/><a href="https://doi.org/10.1007/978-3-030-04648-4">https://doi.org/10.1007/978-3-030-04648-4</a><br/>Format:&#160;Electronic Resources<br/> Internet Science 5th International Conference, INSCI 2018, St. Petersburg, Russia, October 24&ndash;26, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222504 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Bodrunova, Svetlana S. editor. (orcid)0000-0003-0740-561X<br/><a href="https://doi.org/10.1007/978-3-030-01437-7">https://doi.org/10.1007/978-3-030-01437-7</a><br/>Format:&#160;Electronic Resources<br/> Mobile Networks and Management 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223687 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Hu, Jiankun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90775-8">https://doi.org/10.1007/978-3-319-90775-8</a><br/>Format:&#160;Electronic Resources<br/> Human-Computer Interaction. Interaction in Context 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222052 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Kurosu, Masaaki. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91244-8">https://doi.org/10.1007/978-3-319-91244-8</a><br/>Format:&#160;Electronic Resources<br/> Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221616 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224595 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Gaj, Piotr. editor. (orcid)0000-0002-2291-7341<br/><a href="https://doi.org/10.1007/978-3-319-92459-5">https://doi.org/10.1007/978-3-319-92459-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:224900 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:224645 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Mobile Data Privacy ent://SD_ILS/0/SD_ILS:222033 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format:&#160;Electronic Resources<br/> Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection ent://SD_ILS/0/SD_ILS:223022 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Salmani, Hassan. author.<br/><a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2018 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7&ndash;9, 2018, Proceedings ent://SD_ILS/0/SD_ILS:223279 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Joux, Antoine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89339-6">https://doi.org/10.1007/978-3-319-89339-6</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security: Power and Technology ent://SD_ILS/0/SD_ILS:223556 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lehto, Martti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format:&#160;Electronic Resources<br/> Formal Techniques for Distributed Objects, Components, and Systems 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224233 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Baier, Christel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92612-4">https://doi.org/10.1007/978-3-319-92612-4</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224628 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224989 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/> Tests and Proofs 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224920 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Dubois, Catherine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92994-1">https://doi.org/10.1007/978-3-319-92994-1</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224853 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Giuffrida, Cristiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:225557 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Electronic Resources<br/> Designing Usable and Secure Software with IRIS and CAIRIS ent://SD_ILS/0/SD_ILS:225224 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Faily, Shamal. author.<br/><a href="https://doi.org/10.1007/978-3-319-75493-2">https://doi.org/10.1007/978-3-319-75493-2</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225604 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid and Innovative Frontiers in Telecommunications Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:226511 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Chong, Peter Han Joo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94965-9">https://doi.org/10.1007/978-3-319-94965-9</a><br/>Format:&#160;Electronic Resources<br/> Internet of Vehicles. Technologies and Services for Smart Cities 4th International Conference, IOV 2017, Kanazawa, Japan, November 22-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221701 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Peng, Sheng-Lung. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72329-7">https://doi.org/10.1007/978-3-319-72329-7</a><br/>Format:&#160;Electronic Resources<br/> Runtime Verification 17th International Conference, RV 2017, Seattle, WA, USA, September 13-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221164 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lahiri, Shuvendu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67531-2">https://doi.org/10.1007/978-3-319-67531-2</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXXI 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221175 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Livraga, Giovanni. editor. (orcid)0000-0003-2661-8573<br/><a href="https://doi.org/10.1007/978-3-319-61176-1">https://doi.org/10.1007/978-3-319-61176-1</a><br/>Format:&#160;Electronic Resources<br/> Personal Analytics and Privacy. An Individual and Collective Perspective First International Workshop, PAP 2017, Held in Conjunction with ECML PKDD 2017, Skopje, Macedonia, September 18, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221177 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Guidotti, Riccardo. editor. (orcid)0000-0002-2827-7613<br/><a href="https://doi.org/10.1007/978-3-319-71970-2">https://doi.org/10.1007/978-3-319-71970-2</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18&ndash;22, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:221211 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Ceci, Michelangelo. editor. (orcid)0000-0002-6690-7583<br/><a href="https://doi.org/10.1007/978-3-319-71246-8">https://doi.org/10.1007/978-3-319-71246-8</a><br/>Format:&#160;Electronic Resources<br/> Electronic Voting First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:221699 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-319-52240-1">https://doi.org/10.1007/978-3-319-52240-1</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - AFRICACRYPT 2017 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221327 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Joye, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57339-7">https://doi.org/10.1007/978-3-319-57339-7</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221354 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Okamoto, Tatsuaki. editor. (orcid)0000-0002-8145-5474<br/><a href="https://doi.org/10.1007/978-3-319-68637-0">https://doi.org/10.1007/978-3-319-68637-0</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8&ndash;10, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221362 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lipmaa, Helger. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70290-2">https://doi.org/10.1007/978-3-319-70290-2</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning and Knowledge Extraction First IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio, Italy, August 29 &ndash; September 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221750 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Holzinger, Andreas. editor. (orcid)0000-0002-6786-5194<br/><a href="https://doi.org/10.1007/978-3-319-66808-6">https://doi.org/10.1007/978-3-319-66808-6</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8&ndash;9, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221766 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Farshim, Pooya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69284-5">https://doi.org/10.1007/978-3-319-69284-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Neural Networks - ISNN 2017 14th International Symposium, ISNN 2017, Sapporo, Hakodate, and Muroran, Hokkaido, Japan, June 21&ndash;26, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:224011 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Cong, Fengyu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59081-3">https://doi.org/10.1007/978-3-319-59081-3</a><br/>Format:&#160;Electronic Resources<br/> String Analysis for Software Verification and Security ent://SD_ILS/0/SD_ILS:222209 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Bultan, Tevfik. author.<br/><a href="https://doi.org/10.1007/978-3-319-68670-7">https://doi.org/10.1007/978-3-319-68670-7</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Watermarking 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222084 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Kraetzer, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64185-0">https://doi.org/10.1007/978-3-319-64185-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222211 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Chen, Kefei. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54705-3">https://doi.org/10.1007/978-3-319-54705-3</a><br/>Format:&#160;Electronic Resources<br/> Computer Vision &ndash; ACCV 2016 Workshops ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:224062 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Chen, Chu-Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54427-4">https://doi.org/10.1007/978-3-319-54427-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13&ndash;15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222178 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72359-4">https://doi.org/10.1007/978-3-319-72359-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221747 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 &ndash; September 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225140 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Obana, Satoshi. editor. (orcid)0000-0003-4795-4779<br/><a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226478 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format:&#160;Electronic Resources<br/> Database and Expert Systems Applications 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:226620 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Benslimane, Djamal. editor. (orcid)0000-0001-5700-8060<br/><a href="https://doi.org/10.1007/978-3-319-64471-4">https://doi.org/10.1007/978-3-319-64471-4</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXV 25th International Workshop, Cambridge, UK, March 20&ndash;22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226536 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71075-4">https://doi.org/10.1007/978-3-319-71075-4</a><br/>Format:&#160;Electronic Resources<br/> Geometric Science of Information Third International Conference, GSI 2017, Paris, France, November 7-9, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226834 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Nielsen, Frank. editor. (orcid)0000-0001-5728-0726<br/><a href="https://doi.org/10.1007/978-3-319-68445-1">https://doi.org/10.1007/978-3-319-68445-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Neural Networks - ISNN 2017 14th International Symposium, ISNN 2017, Sapporo, Hakodate, and Muroran, Hokkaido, Japan, June 21&ndash;26, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226877 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Cong, Fengyu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59072-1">https://doi.org/10.1007/978-3-319-59072-1</a><br/>Format:&#160;Electronic Resources<br/> BNAIC 2016: Artificial Intelligence 28th Benelux Conference on Artificial Intelligence, Amsterdam, The Netherlands, November 10-11, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226552 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Bosse, Tibor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67468-1">https://doi.org/10.1007/978-3-319-67468-1</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18&ndash;22, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:226846 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Altun, Yasemin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71273-4">https://doi.org/10.1007/978-3-319-71273-4</a><br/>Format:&#160;Electronic Resources<br/> Image Analysis and Recognition 14th International Conference, ICIAR 2017, Montreal, QC, Canada, July 5&ndash;7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225425 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Karray, Fakhri. editor. (orcid)0000-0002-4217-1372<br/><a href="https://doi.org/10.1007/978-3-319-59876-5">https://doi.org/10.1007/978-3-319-59876-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225996 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format:&#160;Electronic Resources<br/> Database and Expert Systems Applications 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:224659 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Benslimane, Djamal. editor. (orcid)0000-0001-5700-8060<br/><a href="https://doi.org/10.1007/978-3-319-64468-4">https://doi.org/10.1007/978-3-319-64468-4</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 11th International Conference, CRITIS 2016, Paris, France, October 10&ndash;12, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226108 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Havarneanu, Grigore. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71368-7">https://doi.org/10.1007/978-3-319-71368-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226595 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Nguyen, Phong Q. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69659-1">https://doi.org/10.1007/978-3-319-69659-1</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223963 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks 24th International Conference, CN 2017, LÄ…dek Zdr&oacute;j, Poland, June 20&ndash;23, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225072 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Gaj, Piotr. editor. (orcid)0000-0002-2291-7341<br/><a href="https://doi.org/10.1007/978-3-319-59767-6">https://doi.org/10.1007/978-3-319-59767-6</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of IT for the Aged Population. Applications, Services and Contexts Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225014 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58536-9">https://doi.org/10.1007/978-3-319-58536-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225377 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Watermarking 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225391 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Shi, Yun Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53465-7">https://doi.org/10.1007/978-3-319-53465-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222250 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI Special Issue on Data and Security Engineering ent://SD_ILS/0/SD_ILS:222784 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56266-6">https://doi.org/10.1007/978-3-662-56266-6</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 15th International Conference, CARDIS 2016, Cannes, France, November 7&ndash;9, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222560 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lemke-Rust, Kerstin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54669-8">https://doi.org/10.1007/978-3-319-54669-8</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XI 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222855 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70395-4">https://doi.org/10.1007/978-3-319-70395-4</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Safety and Security 9th International Symposium, CSS 2017, Xi&rsquo;an China, October 23&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223130 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Wen, Sheng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69471-9">https://doi.org/10.1007/978-3-319-69471-9</a><br/>Format:&#160;Electronic Resources<br/> Software Engineering in Health Care 4th International Symposium, FHIES 2014, and 6th International Workshop, SEHC 2014, Washington, DC, USA, July 17-18, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:223789 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Huhn, Michaela. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63194-3">https://doi.org/10.1007/978-3-319-63194-3</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224508 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Polychronakis, Michalis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60876-1">https://doi.org/10.1007/978-3-319-60876-1</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225498 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Brenner, Michael. editor. (orcid)0000-0003-2690-7340<br/><a href="https://doi.org/10.1007/978-3-319-70278-0">https://doi.org/10.1007/978-3-319-70278-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3&ndash;5, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:225946 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-60055-0">https://doi.org/10.1007/978-3-319-60055-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20&ndash;24, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:226241 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63697-9">https://doi.org/10.1007/978-3-319-63697-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226673 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Rak, Jacek. editor.<br/><a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Aspects of Computer and Information Sciences 7th International Conference, MACIS 2017, Vienna, Austria, November 15-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225660 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Bl&ouml;mer, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72453-9">https://doi.org/10.1007/978-3-319-72453-9</a><br/>Format:&#160;Electronic Resources<br/> Information Technology in Disaster Risk Reduction First IFIP TC 5 DCITDRR International Conference, ITDRR 2016, Sofia, Bulgaria, November 16&ndash;18, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226460 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Murayama, Yuko. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68486-4">https://doi.org/10.1007/978-3-319-68486-4</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of IT for the Aged Population. Aging, Design and User Experience Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226633 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58530-7">https://doi.org/10.1007/978-3-319-58530-7</a><br/>Format:&#160;Electronic Resources<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:222151 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Mishra, Prabhat. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXV ent://SD_ILS/0/SD_ILS:223091 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56121-8">https://doi.org/10.1007/978-3-662-56121-8</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223096 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Wang, G. Alan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57463-9">https://doi.org/10.1007/978-3-319-57463-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20&ndash;24, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221654 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63688-7">https://doi.org/10.1007/978-3-319-63688-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:222251 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Science XXX Special Issue on Cyberworlds and Cybersecurity ent://SD_ILS/0/SD_ILS:222783 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;L. Gavrilova, Marina. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56006-8">https://doi.org/10.1007/978-3-662-56006-8</a><br/>Format:&#160;Electronic Resources<br/> Trust Management XI 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225277 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Stegh&ouml;fer, Jan-Philipp. editor. (orcid)0000-0003-1694-0972<br/><a href="https://doi.org/10.1007/978-3-319-59171-1">https://doi.org/10.1007/978-3-319-59171-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3&ndash;5, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225278 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-59870-3">https://doi.org/10.1007/978-3-319-59870-3</a><br/>Format:&#160;Electronic Resources<br/> Neural Information Processing 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:223240 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Liu, Derong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70087-8">https://doi.org/10.1007/978-3-319-70087-8</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18&ndash;22, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:223445 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Ceci, Michelangelo. editor. (orcid)0000-0002-6690-7583<br/><a href="https://doi.org/10.1007/978-3-319-71249-9">https://doi.org/10.1007/978-3-319-71249-9</a><br/>Format:&#160;Electronic Resources<br/> Enhanced Quality of Life and Smart Living 15th International Conference, ICOST 2017, Paris, France, August 29-31, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224154 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Mokhtari, Mounir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66188-9">https://doi.org/10.1007/978-3-319-66188-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings ent://SD_ILS/0/SD_ILS:222763 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Deng, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59608-2">https://doi.org/10.1007/978-3-319-59608-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223104 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Tonetta, Stefano. editor. (orcid)0000-0001-9091-7899<br/><a href="https://doi.org/10.1007/978-3-319-66284-8">https://doi.org/10.1007/978-3-319-66284-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in User Authentication ent://SD_ILS/0/SD_ILS:223574 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Dasgupta, Dipankar. author.<br/><a href="https://doi.org/10.1007/978-3-319-58808-7">https://doi.org/10.1007/978-3-319-58808-7</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 &ndash; December 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223507 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70004-5">https://doi.org/10.1007/978-3-319-70004-5</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 17th International Conference, NEW2AN 2017, 10th Conference, ruSMART 2017, Third Workshop NsCC 2017, St. Petersburg, Russia, August 28&ndash;30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223724 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Galinina, Olga. editor. (orcid)0000-0002-5386-1061<br/><a href="https://doi.org/10.1007/978-3-319-67380-6">https://doi.org/10.1007/978-3-319-67380-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 13th International Workshop, STM 2017, Oslo, Norway, September 14&ndash;15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224140 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Livraga, Giovanni. editor. (orcid)0000-0003-2661-8573<br/><a href="https://doi.org/10.1007/978-3-319-68063-7">https://doi.org/10.1007/978-3-319-68063-7</a><br/>Format:&#160;Electronic Resources<br/> Biometric Security and Privacy Opportunities &amp; Challenges in The Big Data Era ent://SD_ILS/0/SD_ILS:224261 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Jiang, Richard. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47301-7">https://doi.org/10.1007/978-3-319-47301-7</a><br/>Format:&#160;Electronic Resources<br/> Computer Vision &ndash; ACCV 2016 Workshops ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:224700 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Chen, Chu-Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54407-6">https://doi.org/10.1007/978-3-319-54407-6</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Science XXIX ent://SD_ILS/0/SD_ILS:224347 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54563-8">https://doi.org/10.1007/978-3-662-54563-8</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224736 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;De Capitani di Vimercati, Sabrina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58469-0">https://doi.org/10.1007/978-3-319-58469-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224857 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Tonetta, Stefano. editor. (orcid)0000-0001-9091-7899<br/><a href="https://doi.org/10.1007/978-3-319-66266-4">https://doi.org/10.1007/978-3-319-66266-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Vision &ndash; ACCV 2016 Workshops ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part III ent://SD_ILS/0/SD_ILS:223655 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Chen, Chu-Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54526-4">https://doi.org/10.1007/978-3-319-54526-4</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:225929 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Kalai, Yael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70500-2">https://doi.org/10.1007/978-3-319-70500-2</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 10th International Conference, ICITS 2017, Hong Kong, China, November 29 &ndash; December 2, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226112 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Shikata, Junji. editor. (orcid)0000-0003-2861-359X<br/><a href="https://doi.org/10.1007/978-3-319-72089-0">https://doi.org/10.1007/978-3-319-72089-0</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 16th IFIP WG 8.5 International Conference, EGOV 2017, St. Petersburg, Russia, September 4-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226156 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Janssen, Marijn. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64677-0">https://doi.org/10.1007/978-3-319-64677-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226635 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Schweighofer, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67280-9">https://doi.org/10.1007/978-3-319-67280-9</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications 12th International Joint Conference, ICETE 2015, Colmar, France, July 20&ndash;22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17471 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30222-5">http://dx.doi.org/10.1007/978-3-319-30222-5</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17489 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30303-1">http://dx.doi.org/10.1007/978-3-319-30303-1</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10&ndash;11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17324 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;G&uuml;neysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29078-2">http://dx.doi.org/10.1007/978-3-319-29078-2</a><br/>Format:&#160;Electronic Resources<br/> Security in Network Coding ent://SD_ILS/0/SD_ILS:17596 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Zhang, Peng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31083-1">http://dx.doi.org/10.1007/978-3-319-31083-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:17618 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Homma, Naofumi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31271-2">http://dx.doi.org/10.1007/978-3-319-31271-2</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17644 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31517-1">http://dx.doi.org/10.1007/978-3-319-31517-1</a><br/>Format:&#160;Electronic Resources<br/> Big Data Concepts, Theories, and Applications ent://SD_ILS/0/SD_ILS:17190 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Yu, Shui. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27763-9">http://dx.doi.org/10.1007/978-3-319-27763-9</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17206 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Bj&oslash;rner, Nikolaj. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28034-9">http://dx.doi.org/10.1007/978-3-319-28034-9</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17239 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Haltinner, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28313-5">http://dx.doi.org/10.1007/978-3-319-28313-5</a><br/>Format:&#160;Electronic Resources<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:17777 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/> Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches ent://SD_ILS/0/SD_ILS:17798 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32871-3">http://dx.doi.org/10.1007/978-3-319-32871-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Enhancing Aggregation Techniques for Smart Grid Communications ent://SD_ILS/0/SD_ILS:17802 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lu, Rongxing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32899-7">http://dx.doi.org/10.1007/978-3-319-32899-7</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17433 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29968-6">http://dx.doi.org/10.1007/978-3-319-29968-6</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17868 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Hoepman, Jaap-Henk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33630-5">http://dx.doi.org/10.1007/978-3-319-33630-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks 23rd International Conference, CN 2016, Brun&oacute;w, Poland, June 14-17, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17970 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Gaj, Piotr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39207-3">http://dx.doi.org/10.1007/978-3-319-39207-3</a><br/>Format:&#160;Electronic Resources<br/> Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17904 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lecomte, Thierry. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33951-1">http://dx.doi.org/10.1007/978-3-319-33951-1</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17987 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Tryfonas, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39381-0">http://dx.doi.org/10.1007/978-3-319-39381-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18073 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40253-6">http://dx.doi.org/10.1007/978-3-319-40253-6</a><br/>Format:&#160;Electronic Resources<br/> Image Analysis and Recognition 13th International Conference, ICIAR 2016, in Memory of Mohamed Kamel, P&oacute;voa de Varzim, Portugal, July 13-15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18156 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Campilho, Aur&eacute;lio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41501-7">http://dx.doi.org/10.1007/978-3-319-41501-7</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18006 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17941 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38898-4">http://dx.doi.org/10.1007/978-3-319-38898-4</a><br/>Format:&#160;Electronic Resources<br/> Understanding Social Engineering Based Scams ent://SD_ILS/0/SD_ILS:16480 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Jakobsson, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-6457-4">http://dx.doi.org/10.1007/978-1-4939-6457-4</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17694 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31960-5">http://dx.doi.org/10.1007/978-3-319-31960-5</a><br/>Format:&#160;Electronic Resources<br/> Physical-Layer Security for Cooperative Relay Networks ent://SD_ILS/0/SD_ILS:17608 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Zou, Yulong. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31174-6">http://dx.doi.org/10.1007/978-3-319-31174-6</a><br/>Format:&#160;Electronic Resources<br/> Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18150 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Habib, Sheikh Mahbub. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41354-9">http://dx.doi.org/10.1007/978-3-319-41354-9</a><br/>Format:&#160;Electronic Resources<br/> Elements of Cloud Computing Security A Survey of Key Practicalities ent://SD_ILS/0/SD_ILS:18152 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Alani, Mohammed M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41411-9">http://dx.doi.org/10.1007/978-3-319-41411-9</a><br/>Format:&#160;Electronic Resources<br/> Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21&ndash;22, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:18089 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;B&eacute;cue, Adrien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40385-4">http://dx.doi.org/10.1007/978-3-319-40385-4</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18172 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Aspinall, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41763-9">http://dx.doi.org/10.1007/978-3-319-41763-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Neural Networks &ndash; ISNN 2016 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18119 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Cheng, Long. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40663-3">http://dx.doi.org/10.1007/978-3-319-40663-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26&ndash;27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18359 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45931-8">http://dx.doi.org/10.1007/978-3-319-45931-8</a><br/>Format:&#160;Electronic Resources<br/> Technology and Intimacy: Choice or Coercion 12th IFIP TC 9 International Conference on Human Choice and Computers, HCC12 2016, Salford, UK, September 7-9, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18298 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Kreps, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44805-3">http://dx.doi.org/10.1007/978-3-319-44805-3</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18380 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Galinina, Olga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46301-8">http://dx.doi.org/10.1007/978-3-319-46301-8</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18342 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Monrose, Fabian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45719-2">http://dx.doi.org/10.1007/978-3-319-45719-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18662 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49890-3">http://dx.doi.org/10.1007/978-3-662-49890-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18663 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49896-5">http://dx.doi.org/10.1007/978-3-662-49896-5</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18687 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Clark, Jeremy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53357-4">http://dx.doi.org/10.1007/978-3-662-53357-4</a><br/>Format:&#160;Electronic Resources<br/> Collaborative Computing: Networking, Applications, and Worksharing 11th International Conference, CollaborateCom 2015, Wuhan, November 10-11, 2015, China. Proceedings ent://SD_ILS/0/SD_ILS:17303 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Guo, Song. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28910-6">http://dx.doi.org/10.1007/978-3-319-28910-6</a><br/>Format:&#160;Electronic Resources<br/> Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applications ent://SD_ILS/0/SD_ILS:18217 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Liu, Wen Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42644-0">http://dx.doi.org/10.1007/978-3-319-42644-0</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 &ndash; September 1, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:17284 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Ganty, Pierre. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28766-9">http://dx.doi.org/10.1007/978-3-319-28766-9</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17368 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29485-8">http://dx.doi.org/10.1007/978-3-319-29485-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17560 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Kwon, Soonhak. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30840-1">http://dx.doi.org/10.1007/978-3-319-30840-1</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17681 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31863-9">http://dx.doi.org/10.1007/978-3-319-31863-9</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Proceedings ent://SD_ILS/0/SD_ILS:17943 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Zhang, Yin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38904-2">http://dx.doi.org/10.1007/978-3-319-38904-2</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18270 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44341-6">http://dx.doi.org/10.1007/978-3-319-44341-6</a><br/>Format:&#160;Electronic Resources<br/> Industrial IoT Technologies and Applications International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18271 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Wan, Jiafu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44350-8">http://dx.doi.org/10.1007/978-3-319-44350-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18352 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45871-7">http://dx.doi.org/10.1007/978-3-319-45871-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18292 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Schiffner, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44760-5">http://dx.doi.org/10.1007/978-3-319-44760-5</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18375 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Kordy, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46263-9">http://dx.doi.org/10.1007/978-3-319-46263-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18397 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Barthe, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46598-2">http://dx.doi.org/10.1007/978-3-319-46598-2</a><br/>Format:&#160;Electronic Resources<br/> Boolean Functions and Their Applications in Cryptography ent://SD_ILS/0/SD_ILS:18611 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Wu, Chuan-Kun. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48865-2">http://dx.doi.org/10.1007/978-3-662-48865-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18678 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53008-5">http://dx.doi.org/10.1007/978-3-662-53008-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III ent://SD_ILS/0/SD_ILS:18679 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53015-3">http://dx.doi.org/10.1007/978-3-662-53015-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18680 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53018-4">http://dx.doi.org/10.1007/978-3-662-53018-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18684 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53140-2">http://dx.doi.org/10.1007/978-3-662-53140-2</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17353 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29360-8">http://dx.doi.org/10.1007/978-3-319-29360-8</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17657 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Panayiotou, Christos G. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31664-2">http://dx.doi.org/10.1007/978-3-319-31664-2</a><br/>Format:&#160;Electronic Resources<br/> Trends and Applications in Software Engineering Proceedings of the 4th International Conference on Software Process Improvement CIMPS'2015 ent://SD_ILS/0/SD_ILS:17048 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Mejia, Jezreel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26285-7">http://dx.doi.org/10.1007/978-3-319-26285-7</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings ent://SD_ILS/0/SD_ILS:17521 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Karagiannis, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30505-9">http://dx.doi.org/10.1007/978-3-319-30505-9</a><br/>Format:&#160;Electronic Resources<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:17708 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Colbert, Edward J. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32125-7">http://dx.doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography - SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17623 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Dunkelman, Orr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31301-6">http://dx.doi.org/10.1007/978-3-319-31301-6</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17636 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Berendt, Bettina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31456-3">http://dx.doi.org/10.1007/978-3-319-31456-3</a><br/>Format:&#160;Electronic Resources<br/> Security-Aware Device-to-Device Communications Underlaying Cellular Networks ent://SD_ILS/0/SD_ILS:17747 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Zhang, Aiqing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32458-6">http://dx.doi.org/10.1007/978-3-319-32458-6</a><br/>Format:&#160;Electronic Resources<br/> Information Technology: New Generations 13th International Conference on Information Technology ent://SD_ILS/0/SD_ILS:17748 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Latifi, Shahram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32467-8">http://dx.doi.org/10.1007/978-3-319-32467-8</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:17421 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29883-2">http://dx.doi.org/10.1007/978-3-319-29883-2</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17837 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Rome, Erich. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33331-1">http://dx.doi.org/10.1007/978-3-319-33331-1</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:17428 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17955 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18275 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Hartmann, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44406-2">http://dx.doi.org/10.1007/978-3-319-44406-2</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18360 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Li, Wenfeng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45940-0">http://dx.doi.org/10.1007/978-3-319-45940-0</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18281 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Aiello, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44482-6">http://dx.doi.org/10.1007/978-3-319-44482-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18282 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Ogawa, Kazuto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44524-3">http://dx.doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/> Autonomous Agents and Multiagent Systems AAMAS 2016 Workshops, Visionary Papers, Singapore, Singapore, May 9-10, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18407 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Osman, Nardine. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46840-2">http://dx.doi.org/10.1007/978-3-319-46840-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18328 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Skavhaug, Amund. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45477-1">http://dx.doi.org/10.1007/978-3-319-45477-1</a><br/>Format:&#160;Electronic Resources<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18331 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Buccafurri, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45507-5">http://dx.doi.org/10.1007/978-3-319-45507-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18345 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45744-4">http://dx.doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/> Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprises ent://SD_ILS/0/SD_ILS:18532 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Pierer, Markus. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-15046-4">http://dx.doi.org/10.1007/978-3-658-15046-4</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18618 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49099-0">http://dx.doi.org/10.1007/978-3-662-49099-0</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Science XXVIII Special Issue on Cyberworlds and Cybersecurity ent://SD_ILS/0/SD_ILS:18682 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Gavrilova, Marina L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53090-0">http://dx.doi.org/10.1007/978-3-662-53090-0</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII Selected Papers from FDSE 2014 ent://SD_ILS/0/SD_ILS:18625 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49175-1">http://dx.doi.org/10.1007/978-3-662-49175-1</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Science XXVI Special Issue on Cyberworlds and Cybersecurity ent://SD_ILS/0/SD_ILS:18631 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Gavrilova, Marina L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49247-5">http://dx.doi.org/10.1007/978-3-662-49247-5</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18638 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49384-7">http://dx.doi.org/10.1007/978-3-662-49384-7</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18639 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49387-8">http://dx.doi.org/10.1007/978-3-662-49387-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN &amp; PDCAT 2015 ent://SD_ILS/0/SD_ILS:18965 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0068-3">http://dx.doi.org/10.1007/978-981-10-0068-3</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:19185 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Batten, Lynn. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2741-3">http://dx.doi.org/10.1007/978-981-10-2741-3</a><br/>Format:&#160;Electronic Resources<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18274 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Hartmann, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44403-1">http://dx.doi.org/10.1007/978-3-319-44403-1</a><br/>Format:&#160;Electronic Resources<br/> Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18030 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Badonnel, R&eacute;mi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39814-3">http://dx.doi.org/10.1007/978-3-319-39814-3</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 &ndash; September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18288 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Zikas, Vassilis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44618-9">http://dx.doi.org/10.1007/978-3-319-44618-9</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18413 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Livraga, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47072-6">http://dx.doi.org/10.1007/978-3-319-47072-6</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18337 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18617 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49096-9">http://dx.doi.org/10.1007/978-3-662-49096-9</a><br/>Format:&#160;Electronic Resources<br/> The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday ent://SD_ILS/0/SD_ILS:18635 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Ryan, Peter Y. A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49301-4">http://dx.doi.org/10.1007/978-3-662-49301-4</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings ent://SD_ILS/0/SD_ILS:19184 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Mueller, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2738-3">http://dx.doi.org/10.1007/978-981-10-2738-3</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17675 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31811-0">http://dx.doi.org/10.1007/978-3-319-31811-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17683 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Kim, Ho-won. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31875-2">http://dx.doi.org/10.1007/978-3-319-31875-2</a><br/>Format:&#160;Electronic Resources<br/> Moving Target Defense for Distributed Systems ent://SD_ILS/0/SD_ILS:17590 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Shetty, Sachin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31032-9">http://dx.doi.org/10.1007/978-3-319-31032-9</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17413 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17333 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Pasalic, Enes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29172-7">http://dx.doi.org/10.1007/978-3-319-29172-7</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18154 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Ranise, Silvio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41483-6">http://dx.doi.org/10.1007/978-3-319-41483-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18085 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40367-0">http://dx.doi.org/10.1007/978-3-319-40367-0</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile, and Wireless Networks 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18099 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Mitton, Nathalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40509-4">http://dx.doi.org/10.1007/978-3-319-40509-4</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cyberdeception ent://SD_ILS/0/SD_ILS:18142 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Rowe, Neil C. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41187-3">http://dx.doi.org/10.1007/978-3-319-41187-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18376 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46279-0">http://dx.doi.org/10.1007/978-3-319-46279-0</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18379 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18324 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45381-1">http://dx.doi.org/10.1007/978-3-319-45381-1</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18653 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18344 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45741-3">http://dx.doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18677 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Peyrin, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-52993-5">http://dx.doi.org/10.1007/978-3-662-52993-5</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:18231 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43005-8">http://dx.doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18236 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Standaert, Fran&ccedil;ois-Xavier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43283-0">http://dx.doi.org/10.1007/978-3-319-43283-0</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Computing and Services International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers ent://SD_ILS/0/SD_ILS:24825 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Yueming, Lu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47401-3">http://dx.doi.org/10.1007/978-3-662-47401-3</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24842 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;B&ouml;hme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47854-7">http://dx.doi.org/10.1007/978-3-662-47854-7</a><br/>Format:&#160;Electronic Resources<br/> Handbook on Data Centers ent://SD_ILS/0/SD_ILS:19934 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Khan, Samee U. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-2092-1">http://dx.doi.org/10.1007/978-1-4939-2092-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid Security ent://SD_ILS/0/SD_ILS:19566 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Goel, Sanjay. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6663-4">http://dx.doi.org/10.1007/978-1-4471-6663-4</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Biometrics ent://SD_ILS/0/SD_ILS:19833 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Li, Stan Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4899-7488-4">http://dx.doi.org/10.1007/978-1-4899-7488-4</a><br/>Format:&#160;Electronic Resources<br/> Security Planning An Applied Approach ent://SD_ILS/0/SD_ILS:22481 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lincke, Susan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16027-6">http://dx.doi.org/10.1007/978-3-319-16027-6</a><br/>Format:&#160;Electronic Resources<br/> Counterterrorism and Cybersecurity Total Information Awareness ent://SD_ILS/0/SD_ILS:22657 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lee, Newton. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17244-6">http://dx.doi.org/10.1007/978-3-319-17244-6</a><br/>Format:&#160;Electronic Resources<br/> Aspect-Oriented Security Hardening of UML Design Models ent://SD_ILS/0/SD_ILS:22493 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Mouheb, Djedjiga. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16106-8">http://dx.doi.org/10.1007/978-3-319-16106-8</a><br/>Format:&#160;Electronic Resources<br/> Protecting Privacy in Data Release ent://SD_ILS/0/SD_ILS:22494 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Livraga, Giovanni. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16109-9">http://dx.doi.org/10.1007/978-3-319-16109-9</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Mechanisms for Network Configuration and Security 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23009 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Latr&eacute;, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20034-7">http://dx.doi.org/10.1007/978-3-319-20034-7</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22640 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17127-2">http://dx.doi.org/10.1007/978-3-319-17127-2</a><br/>Format:&#160;Electronic Resources<br/> Leakage Resilient Password Systems ent://SD_ILS/0/SD_ILS:22699 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:22924 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format:&#160;Electronic Resources<br/> E-Democracy &ndash; Citizen Rights in the World of the New Computing Paradigms 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23570 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27164-4">http://dx.doi.org/10.1007/978-3-319-27164-4</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23571 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Bica, Ion. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27179-8">http://dx.doi.org/10.1007/978-3-319-27179-8</a><br/>Format:&#160;Electronic Resources<br/> Evolution of Cyber Technologies and Operations to 2035 ent://SD_ILS/0/SD_ILS:23303 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Blowers, Misty. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23585-1">http://dx.doi.org/10.1007/978-3-319-23585-1</a><br/>Format:&#160;Electronic Resources<br/> Medical Data Privacy Handbook ent://SD_ILS/0/SD_ILS:23304 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Gkoulalas-Divanis, Aris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23633-9">http://dx.doi.org/10.1007/978-3-319-23633-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23400 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24858-5">http://dx.doi.org/10.1007/978-3-319-24858-5</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23592 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27668-7">http://dx.doi.org/10.1007/978-3-319-27668-7</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23505 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23508 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26135-5">http://dx.doi.org/10.1007/978-3-319-26135-5</a><br/>Format:&#160;Electronic Resources<br/> On the Move to Meaningful Internet Systems: OTM 2015 Conferences Confederated International Conferences: CoopIS, ODBASE, and C&amp;TC 2015, Rhodes, Greece, October 26-30, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23511 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Debruyne, Christophe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26148-5">http://dx.doi.org/10.1007/978-3-319-26148-5</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23520 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Bos, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26362-5">http://dx.doi.org/10.1007/978-3-319-26362-5</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Communications, Services and Security 8th International Conference, MCSS 2015, Krak&oacute;w, Poland, November 24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23522 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Dziech, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26404-2">http://dx.doi.org/10.1007/978-3-319-26404-2</a><br/>Format:&#160;Electronic Resources<br/> Risk Assessment and Risk-Driven Testing Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23524 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Seehusen, Fredrik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26416-5">http://dx.doi.org/10.1007/978-3-319-26416-5</a><br/>Format:&#160;Electronic Resources<br/> Interactive Theorem Proving 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23192 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Urban, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22102-1">http://dx.doi.org/10.1007/978-3-319-22102-1</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23194 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24885 2024-05-12T18:54:50Z 2024-05-12T18:54:50Z Yazar&#160;Niu, Wenjia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48683-2">http://dx.doi.org/10.1007/978-3-662-48683-2</a><br/>Format:&#160;Electronic Resources<br/>