Search Results for - Narrowed by: Springer E-Book Collection - Computer security. - Computer communication systems. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bcommunication$002bsystems.$002509Computer$002bcommunication$002bsystems.$0026ps$003d300$0026isd$003dtrue? 2024-06-08T14:31:39Z Selected Areas in Cryptography &ndash; SAC 2018 25th International Conference, Calgary, AB, Canada, August 15&ndash;17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427899 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Cid, Carlos. editor. (orcid)0000-0001-5761-8694<br/><a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format:&#160;Electronic Resources<br/> Science of Cyber Security Second International Conference, SciSec 2019, Nanjing, China, August 9&ndash;11, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427837 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34637-9">https://doi.org/10.1007/978-3-030-34637-9</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24&ndash;26, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428102 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Biagioni, Edoardo S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23597-0">https://doi.org/10.1007/978-3-030-23597-0</a><br/>Format:&#160;Electronic Resources<br/> Parallel and Distributed Computing, Applications and Technologies 19th International Conference, PDCAT 2018, Jeju Island, South Korea, August 20-22, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427860 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Park, Jong Hyuk. editor. (orcid)0000-0003-1831-0309<br/><a href="https://doi.org/10.1007/978-981-13-5907-1">https://doi.org/10.1007/978-981-13-5907-1</a><br/>Format:&#160;Electronic Resources<br/> Mobile Web and Intelligent Information Systems 16th International Conference, MobiWIS 2019, Istanbul, Turkey, August 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427682 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Awan, Irfan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27192-3">https://doi.org/10.1007/978-3-030-27192-3</a><br/>Format:&#160;Electronic Resources<br/> Mobile, Secure, and Programmable Networking 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23&ndash;24, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427691 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Renault, &Eacute;ric. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22885-9">https://doi.org/10.1007/978-3-030-22885-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in New Computing Environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13&ndash;14, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427981 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Li, Jin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-21373-2">https://doi.org/10.1007/978-3-030-21373-2</a><br/>Format:&#160;Electronic Resources<br/> Dependability in Sensor, Cloud, and Big Data Systems and Applications 5th International Conference, DependSys 2019, Guangzhou, China, November 12&ndash;15, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428216 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-981-15-1304-6">https://doi.org/10.1007/978-981-15-1304-6</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428324 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Electronic Resources<br/> Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428328 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349<br/><a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Technologies and Applications First International Conference, INTAP 2018, Bahawalpur, Pakistan, October 23-25, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428800 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Bajwa, Imran Sarwar. editor.<br/><a href="https://doi.org/10.1007/978-981-13-6052-7">https://doi.org/10.1007/978-981-13-6052-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computational Intelligence 15th International Work-Conference on Artificial Neural Networks, IWANN 2019, Gran Canaria, Spain, June 12-14, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:428821 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Rojas, Ignacio. editor. (orcid)0000-0002-1033-5635<br/><a href="https://doi.org/10.1007/978-3-030-20518-8">https://doi.org/10.1007/978-3-030-20518-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computational Intelligence 15th International Work-Conference on Artificial Neural Networks, IWANN 2019, Gran Canaria, Spain, June 12-14, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428822 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Rojas, Ignacio. editor. (orcid)0000-0002-1033-5635<br/><a href="https://doi.org/10.1007/978-3-030-20521-8">https://doi.org/10.1007/978-3-030-20521-8</a><br/>Format:&#160;Electronic Resources<br/> Mobile, Secure, and Programmable Networking 4th International Conference, MSPN 2018, Paris, France, June 18-20, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428268 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Renault, &Eacute;ric. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03101-5">https://doi.org/10.1007/978-3-030-03101-5</a><br/>Format:&#160;Electronic Resources<br/> Human Centered Computing 4th International Conference, HCC 2018, M&eacute;rida, Mexico, December, 5&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428270 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Tang, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15127-0">https://doi.org/10.1007/978-3-030-15127-0</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428283 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432<br/><a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies in Computing Second International Conference, iCETiC 2019, London, UK, August 19&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428555 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Miraz, Mahdi H. editor. (orcid)0000-0002-6795-7048<br/><a href="https://doi.org/10.1007/978-3-030-23943-5">https://doi.org/10.1007/978-3-030-23943-5</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications 15th International Joint Conference, ICETE 2018, Porto, Portugal, July 26&ndash;28, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428002 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34866-3">https://doi.org/10.1007/978-3-030-34866-3</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427738 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Zhang, Huanguo. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format:&#160;Electronic Resources<br/> Trust Management XIII 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427756 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-3-030-33716-2">https://doi.org/10.1007/978-3-030-33716-2</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 15th International Conference, ICDCIT 2019, Bhubaneswar, India, January 10&ndash;13, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427758 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Fahrnberger, G&uuml;nter. editor. (orcid)0000-0002-2606-3988<br/><a href="https://doi.org/10.1007/978-3-030-05366-6">https://doi.org/10.1007/978-3-030-05366-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427761 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Hamid, Brahim. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format:&#160;Electronic Resources<br/> Development of Transport by Telematics 19th International Conference on Transport System Telematics, TST 2019, Jaworze, Poland, February 27 &ndash; March 2, 2019, Selected Papers ent://SD_ILS/0/SD_ILS:427642 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mikulski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27547-1">https://doi.org/10.1007/978-3-030-27547-1</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22&ndash;24, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428022 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944<br/><a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Image Processing and Pattern Recognition Second International Conference, RTIP2R 2018, Solapur, India, December 21&ndash;22, 2018, Revised Selected Papers, Part III ent://SD_ILS/0/SD_ILS:427872 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Santosh, K. C. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9187-3">https://doi.org/10.1007/978-981-13-9187-3</a><br/>Format:&#160;Electronic Resources<br/> Algebra, Codes and Cryptology First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428037 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Gueye, Cheikh Thiecoumba. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36237-9">https://doi.org/10.1007/978-3-030-36237-9</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper ent://SD_ILS/0/SD_ILS:428400 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11039-0">https://doi.org/10.1007/978-3-030-11039-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428207 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format:&#160;Electronic Resources<br/> Communication Systems and Networks 10th International Conference, COMSNETS 2018, Bangalore, India, January 3-7, 2018, Extended Selected Papers ent://SD_ILS/0/SD_ILS:428319 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Biswas, Subir. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10659-1">https://doi.org/10.1007/978-3-030-10659-1</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 20th International Conference, PAM 2019, Puerto Varas, Chile, March 27&ndash;29, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428741 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Choffnes, David. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15986-3">https://doi.org/10.1007/978-3-030-15986-3</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428747 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Askarov, Aslan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format:&#160;Electronic Resources<br/> ECML PKDD 2018 Workshops Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September 10-14, 2018, Proceedings ent://SD_ILS/0/SD_ILS:428549 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Alzate, Carlos. editor. (orcid)0000-0003-2434-2534<br/><a href="https://doi.org/10.1007/978-3-030-13453-2">https://doi.org/10.1007/978-3-030-13453-2</a><br/>Format:&#160;Electronic Resources<br/> Policy-Based Autonomic Data Governance ent://SD_ILS/0/SD_ILS:428551 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Calo, Seraphin. editor. (orcid)0000-0003-4668-3989<br/><a href="https://doi.org/10.1007/978-3-030-17277-0">https://doi.org/10.1007/978-3-030-17277-0</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26&ndash;28, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:429024 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computer and Communication Networks 22nd International Conference, DCCN 2019, Moscow, Russia, September 23&ndash;27, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:429157 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Vishnevskiy, Vladimir M. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36625-4">https://doi.org/10.1007/978-3-030-36625-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12&ndash;13, 2019, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:427894 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9942-8">https://doi.org/10.1007/978-981-13-9942-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28&ndash;30, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428129 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751<br/><a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428513 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Lin, Zhiqiang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format:&#160;Electronic Resources<br/> High-Performance Computing Applications in Numerical Simulation and Edge Computing ACM ICS 2018 International Workshops, HPCMS and HiDEC, Beijing, China, June 12, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428234 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Hu, Changjun. editor.<br/><a href="https://doi.org/10.1007/978-981-32-9987-0">https://doi.org/10.1007/978-981-32-9987-0</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11&ndash;12, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428266 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2019 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9&ndash;11, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428825 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Buchmann, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23696-0">https://doi.org/10.1007/978-3-030-23696-0</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428289 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Luiijf, Eric. editor. (orcid)0000-0002-1821-9890<br/><a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format:&#160;Electronic Resources<br/> Green, Pervasive, and Cloud Computing 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428291 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Li, Shijian. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15093-8">https://doi.org/10.1007/978-3-030-15093-8</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 &ndash; November 1, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428464 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Alpcan, Tansu. editor. (orcid)0000-0002-7434-3239<br/><a href="https://doi.org/10.1007/978-3-030-32430-8">https://doi.org/10.1007/978-3-030-32430-8</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XLII ent://SD_ILS/0/SD_ILS:428583 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-60531-8">https://doi.org/10.1007/978-3-662-60531-8</a><br/>Format:&#160;Electronic Resources<br/> Communication Technologies for Vehicles 14th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2019, Colmar, France, May 16&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:429030 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Hilt, Beno&icirc;t. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25529-9">https://doi.org/10.1007/978-3-030-25529-9</a><br/>Format:&#160;Electronic Resources<br/> Design, User Experience, and Usability. Practice and Case Studies 8th International Conference, DUXU 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26&ndash;31, 2019, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:428875 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Marcus, Aaron. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23535-2">https://doi.org/10.1007/978-3-030-23535-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Analysis of Images and Patterns 18th International Conference, CAIP 2019, Salerno, Italy, September 3&ndash;5, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:428196 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Vento, Mario. editor. (orcid)0000-0002-2948-741X<br/><a href="https://doi.org/10.1007/978-3-030-29891-3">https://doi.org/10.1007/978-3-030-29891-3</a><br/>Format:&#160;Electronic Resources<br/> Economics of Grids, Clouds, Systems, and Services 15th International Conference, GECON 2018, Pisa, Italy, September 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:428668 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Coppola, Massimo. editor. (orcid)0000-0002-7937-4157<br/><a href="https://doi.org/10.1007/978-3-030-13342-9">https://doi.org/10.1007/978-3-030-13342-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10&ndash;11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428414 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Blazy, Olivier. editor. (orcid)0000-0001-6205-8249<br/><a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8&ndash;9, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:429008 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941<br/><a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Vision &ndash; ECCV 2018 Workshops Munich, Germany, September 8-14, 2018, Proceedings, Part V ent://SD_ILS/0/SD_ILS:429201 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Leal-Taix&eacute;, Laura. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11021-5">https://doi.org/10.1007/978-3-030-11021-5</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26&ndash;28, 2019, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:429023 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format:&#160;Electronic Resources<br/> Green, Pervasive, and Cloud Computing 14th International Conference, GPC 2019, Uberl&acirc;ndia, Brazil, May 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428854 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Miani, Rodrigo. editor. (orcid)0000-0002-8176-8040<br/><a href="https://doi.org/10.1007/978-3-030-19223-5">https://doi.org/10.1007/978-3-030-19223-5</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428856 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Shen, Bazhong. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format:&#160;Electronic Resources<br/> Biomedical Engineering Systems and Technologies 11th International Joint Conference, BIOSTEC 2018, Funchal, Madeira, Portugal, January 19&ndash;21, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428173 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Cliquet Jr., Alberto. editor.<br/><a href="https://doi.org/10.1007/978-3-030-29196-9">https://doi.org/10.1007/978-3-030-29196-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Vision &ndash; ECCV 2018 Workshops Munich, Germany, September 8-14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:428180 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Leal-Taix&eacute;, Laura. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11012-3">https://doi.org/10.1007/978-3-030-11012-3</a><br/>Format:&#160;Electronic Resources<br/> Creativity in Intelligent Technologies and Data Science Third Conference, CIT&amp;DS 2019, Volgograd, Russia, September 16&ndash;19, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:429244 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Kravets, Alla G. editor. (orcid)0000-0003-1675-8652<br/><a href="https://doi.org/10.1007/978-3-030-29743-5">https://doi.org/10.1007/978-3-030-29743-5</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Trust in the IoT Environment ent://SD_ILS/0/SD_ILS:428626 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-030-18075-1">https://doi.org/10.1007/978-3-030-18075-1</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:427804 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:429140 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24274-9">https://doi.org/10.1007/978-3-030-24274-9</a><br/>Format:&#160;Electronic Resources<br/> Smart City and Informatization 7th International Conference, iSCI 2019, Guangzhou, China, November 12&ndash;15, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428776 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-981-15-1301-5">https://doi.org/10.1007/978-981-15-1301-5</a><br/>Format:&#160;Electronic Resources<br/> Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15&ndash;16, 2019, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:429193 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Luhach, Ashish Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0111-1">https://doi.org/10.1007/978-981-15-0111-1</a><br/>Format:&#160;Electronic Resources<br/> Web Services &ndash; ICWS 2019 26th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25&ndash;30, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428992 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Miller, John. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23499-7">https://doi.org/10.1007/978-3-030-23499-7</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies ent://SD_ILS/0/SD_ILS:428348 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Gritzalis, Dimitris. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Intelligent Surveillance Surveillance Data Capture, Transmission, and Analytics ent://SD_ILS/0/SD_ILS:428240 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Yan, Wei Qi. author.<br/><a href="https://doi.org/10.1007/978-3-030-10713-0">https://doi.org/10.1007/978-3-030-10713-0</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428867 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks 26th International Conference, CN 2019, Kamień Śląski, Poland, June 25&ndash;27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:429134 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Gaj, Piotr. editor. (orcid)0000-0002-2291-7341<br/><a href="https://doi.org/10.1007/978-3-030-21952-9">https://doi.org/10.1007/978-3-030-21952-9</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19&ndash;22, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428170 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Thampi, Sabu M. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5826-5">https://doi.org/10.1007/978-981-13-5826-5</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2019 20th International Conference on Cryptology in India, Hyderabad, India, December 15&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:429183 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Hao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35423-7">https://doi.org/10.1007/978-3-030-35423-7</a><br/>Format:&#160;Electronic Resources<br/> Distributed Applications and Interoperable Systems 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17&ndash;21, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428983 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Pereira, Jos&eacute;. editor. (orcid)0000-0002-3341-9217<br/><a href="https://doi.org/10.1007/978-3-030-22496-7">https://doi.org/10.1007/978-3-030-22496-7</a><br/>Format:&#160;Electronic Resources<br/> Big Data Concepts, Theories, and Applications ent://SD_ILS/0/SD_ILS:17190 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Yu, Shui. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27763-9">http://dx.doi.org/10.1007/978-3-319-27763-9</a><br/>Format:&#160;Electronic Resources<br/> Elements of Cloud Computing Security A Survey of Key Practicalities ent://SD_ILS/0/SD_ILS:18152 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Alani, Mohammed M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41411-9">http://dx.doi.org/10.1007/978-3-319-41411-9</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:17428 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10&ndash;11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17324 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;G&uuml;neysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29078-2">http://dx.doi.org/10.1007/978-3-319-29078-2</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18006 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Security-Aware Device-to-Device Communications Underlaying Cellular Networks ent://SD_ILS/0/SD_ILS:17747 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Zhang, Aiqing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32458-6">http://dx.doi.org/10.1007/978-3-319-32458-6</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18270 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44341-6">http://dx.doi.org/10.1007/978-3-319-44341-6</a><br/>Format:&#160;Electronic Resources<br/> Physical-Layer Security for Cooperative Relay Networks ent://SD_ILS/0/SD_ILS:17608 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Zou, Yulong. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31174-6">http://dx.doi.org/10.1007/978-3-319-31174-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks 23rd International Conference, CN 2016, Brun&oacute;w, Poland, June 14-17, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17970 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Gaj, Piotr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39207-3">http://dx.doi.org/10.1007/978-3-319-39207-3</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications 12th International Joint Conference, ICETE 2015, Colmar, France, July 20&ndash;22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17471 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30222-5">http://dx.doi.org/10.1007/978-3-319-30222-5</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18360 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Li, Wenfeng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45940-0">http://dx.doi.org/10.1007/978-3-319-45940-0</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cyberdeception ent://SD_ILS/0/SD_ILS:18142 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Rowe, Neil C. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41187-3">http://dx.doi.org/10.1007/978-3-319-41187-3</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17368 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29485-8">http://dx.doi.org/10.1007/978-3-319-29485-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17683 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Kim, Ho-won. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31875-2">http://dx.doi.org/10.1007/978-3-319-31875-2</a><br/>Format:&#160;Electronic Resources<br/> Collaborative Computing: Networking, Applications, and Worksharing 11th International Conference, CollaborateCom 2015, Wuhan, November 10-11, 2015, China. Proceedings ent://SD_ILS/0/SD_ILS:17303 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Guo, Song. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28910-6">http://dx.doi.org/10.1007/978-3-319-28910-6</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17868 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Hoepman, Jaap-Henk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33630-5">http://dx.doi.org/10.1007/978-3-319-33630-5</a><br/>Format:&#160;Electronic Resources<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:17708 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Colbert, Edward J. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32125-7">http://dx.doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Enhancing Aggregation Techniques for Smart Grid Communications ent://SD_ILS/0/SD_ILS:17802 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Lu, Rongxing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32899-7">http://dx.doi.org/10.1007/978-3-319-32899-7</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17955 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17489 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30303-1">http://dx.doi.org/10.1007/978-3-319-30303-1</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings ent://SD_ILS/0/SD_ILS:19184 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mueller, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2738-3">http://dx.doi.org/10.1007/978-981-10-2738-3</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17413 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applications ent://SD_ILS/0/SD_ILS:18217 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Liu, Wen Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42644-0">http://dx.doi.org/10.1007/978-3-319-42644-0</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18375 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Kordy, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46263-9">http://dx.doi.org/10.1007/978-3-319-46263-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18282 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Ogawa, Kazuto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44524-3">http://dx.doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings ent://SD_ILS/0/SD_ILS:17521 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Karagiannis, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30505-9">http://dx.doi.org/10.1007/978-3-319-30505-9</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17657 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Panayiotou, Christos G. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31664-2">http://dx.doi.org/10.1007/978-3-319-31664-2</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17675 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31811-0">http://dx.doi.org/10.1007/978-3-319-31811-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN &amp; PDCAT 2015 ent://SD_ILS/0/SD_ILS:18965 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0068-3">http://dx.doi.org/10.1007/978-981-10-0068-3</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18618 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49099-0">http://dx.doi.org/10.1007/978-3-662-49099-0</a><br/>Format:&#160;Electronic Resources<br/> Security in Network Coding ent://SD_ILS/0/SD_ILS:17596 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Zhang, Peng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31083-1">http://dx.doi.org/10.1007/978-3-319-31083-1</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17206 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Bj&oslash;rner, Nikolaj. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28034-9">http://dx.doi.org/10.1007/978-3-319-28034-9</a><br/>Format:&#160;Electronic Resources<br/> Moving Target Defense for Distributed Systems ent://SD_ILS/0/SD_ILS:17590 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Shetty, Sachin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31032-9">http://dx.doi.org/10.1007/978-3-319-31032-9</a><br/>Format:&#160;Electronic Resources<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:17777 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/> Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches ent://SD_ILS/0/SD_ILS:17798 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32871-3">http://dx.doi.org/10.1007/978-3-319-32871-3</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17433 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29968-6">http://dx.doi.org/10.1007/978-3-319-29968-6</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17837 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Rome, Erich. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33331-1">http://dx.doi.org/10.1007/978-3-319-33331-1</a><br/>Format:&#160;Electronic Resources<br/> Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18030 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Badonnel, R&eacute;mi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39814-3">http://dx.doi.org/10.1007/978-3-319-39814-3</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18653 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18379 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 &ndash; September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18288 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Zikas, Vassilis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44618-9">http://dx.doi.org/10.1007/978-3-319-44618-9</a><br/>Format:&#160;Electronic Resources<br/> Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17904 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Lecomte, Thierry. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33951-1">http://dx.doi.org/10.1007/978-3-319-33951-1</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18342 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Monrose, Fabian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45719-2">http://dx.doi.org/10.1007/978-3-319-45719-2</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile, and Wireless Networks 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18099 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mitton, Nathalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40509-4">http://dx.doi.org/10.1007/978-3-319-40509-4</a><br/>Format:&#160;Electronic Resources<br/> Industrial IoT Technologies and Applications International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18271 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Wan, Jiafu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44350-8">http://dx.doi.org/10.1007/978-3-319-44350-8</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18380 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Galinina, Olga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46301-8">http://dx.doi.org/10.1007/978-3-319-46301-8</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18684 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53140-2">http://dx.doi.org/10.1007/978-3-662-53140-2</a><br/>Format:&#160;Electronic Resources<br/> Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprises ent://SD_ILS/0/SD_ILS:18532 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Pierer, Markus. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-15046-4">http://dx.doi.org/10.1007/978-3-658-15046-4</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18617 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49096-9">http://dx.doi.org/10.1007/978-3-662-49096-9</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Proceedings ent://SD_ILS/0/SD_ILS:17943 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Zhang, Yin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38904-2">http://dx.doi.org/10.1007/978-3-319-38904-2</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23158 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Pelc, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21741-3">http://dx.doi.org/10.1007/978-3-319-21741-3</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23554 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23468 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Khouzani, MHR. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25594-1">http://dx.doi.org/10.1007/978-3-319-25594-1</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23568 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27152-1">http://dx.doi.org/10.1007/978-3-319-27152-1</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23143 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21476-4">http://dx.doi.org/10.1007/978-3-319-21476-4</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23497 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25915-4">http://dx.doi.org/10.1007/978-3-319-25915-4</a><br/>Format:&#160;Electronic Resources<br/> Guide to Security Assurance for Cloud Computing ent://SD_ILS/0/SD_ILS:23502 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Zhu, Shao Ying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25988-8">http://dx.doi.org/10.1007/978-3-319-25988-8</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23505 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format:&#160;Electronic Resources<br/> E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23202 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Haenni, Rolf. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22270-7">http://dx.doi.org/10.1007/978-3-319-22270-7</a><br/>Format:&#160;Electronic Resources<br/> Risk Assessment and Risk-Driven Testing Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23524 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Seehusen, Fredrik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26416-5">http://dx.doi.org/10.1007/978-3-319-26416-5</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23248 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Fischer-H&uuml;bner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22906-5">http://dx.doi.org/10.1007/978-3-319-22906-5</a><br/>Format:&#160;Electronic Resources<br/> Understanding Network Hacks Attack and Defense with Python ent://SD_ILS/0/SD_ILS:24499 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Ballmann, Bastian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44437-5">http://dx.doi.org/10.1007/978-3-662-44437-5</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florian&oacute;polis, Brazil, September 17&ndash;19, 2014 Revised Selected Papers ent://SD_ILS/0/SD_ILS:22533 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format:&#160;Electronic Resources<br/> Encrypted Email The History and Technology of Message Privacy ent://SD_ILS/0/SD_ILS:23128 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Orman, Hilarie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21344-6">http://dx.doi.org/10.1007/978-3-319-21344-6</a><br/>Format:&#160;Electronic Resources<br/> Mobile, Secure, and Programmable Networking First International Conference, MSPN 2015, Paris, France, June 15-17, 2015, Selected Papers ent://SD_ILS/0/SD_ILS:23476 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Boumerdassi, Selma. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25744-0">http://dx.doi.org/10.1007/978-3-319-25744-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy for Mobile Healthcare Networks ent://SD_ILS/0/SD_ILS:23391 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Zhang, Kuan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24717-5">http://dx.doi.org/10.1007/978-3-319-24717-5</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23571 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Bica, Ion. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27179-8">http://dx.doi.org/10.1007/978-3-319-27179-8</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23399 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24837-0">http://dx.doi.org/10.1007/978-3-319-24837-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23213 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Tanaka, Keisuke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22425-1">http://dx.doi.org/10.1007/978-3-319-22425-1</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23249 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Abawajy, Jemal H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22915-7">http://dx.doi.org/10.1007/978-3-319-22915-7</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24765 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22386 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mirkovic, Jelena. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15509-8">http://dx.doi.org/10.1007/978-3-319-15509-8</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash;- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22590 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format:&#160;Electronic Resources<br/> Information and Communication Technology Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23360 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Khalil, Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24315-3">http://dx.doi.org/10.1007/978-3-319-24315-3</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 8th International Conference, IDCS 2015, Windsor, UK, September 2-4, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23280 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Di Fatta, Giuseppe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23237-9">http://dx.doi.org/10.1007/978-3-319-23237-9</a><br/>Format:&#160;Electronic Resources<br/> Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications ent://SD_ILS/0/SD_ILS:23285 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Lu, Zhou. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23288-1">http://dx.doi.org/10.1007/978-3-319-23288-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23337 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22640 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17127-2">http://dx.doi.org/10.1007/978-3-319-17127-2</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22819 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18455-5">http://dx.doi.org/10.1007/978-3-319-18455-5</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22822 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22540 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Eisenbarth, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16363-5">http://dx.doi.org/10.1007/978-3-319-16363-5</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXIX 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23076 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Samarati, Pierangela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20810-7">http://dx.doi.org/10.1007/978-3-319-20810-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22830 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18500-2">http://dx.doi.org/10.1007/978-3-319-18500-2</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23471 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Mechanisms for Network Configuration and Security 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23009 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Latr&eacute;, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20034-7">http://dx.doi.org/10.1007/978-3-319-20034-7</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23182 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22908 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Doss, Robin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19210-9">http://dx.doi.org/10.1007/978-3-319-19210-9</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23194 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and Privacy 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23445 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25360-2">http://dx.doi.org/10.1007/978-3-319-25360-2</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23546 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23626 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Thuraisingham, Bhavani. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28865-9">http://dx.doi.org/10.1007/978-3-319-28865-9</a><br/>Format:&#160;Electronic Resources<br/> Secure Wireless Sensor Networks Threats and Solutions ent://SD_ILS/0/SD_ILS:19962 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Conti, Mauro. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3460-7">http://dx.doi.org/10.1007/978-1-4939-3460-7</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23419 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mitton, Nathalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25067-0">http://dx.doi.org/10.1007/978-3-319-25067-0</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23520 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Bos, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26362-5">http://dx.doi.org/10.1007/978-3-319-26362-5</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Internet Technologies Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24784 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Zhang, Shiyong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46826-5">http://dx.doi.org/10.1007/978-3-662-46826-5</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23344 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24842 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;B&ouml;hme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47854-7">http://dx.doi.org/10.1007/978-3-662-47854-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science and Ubiquitous Computing CSA &amp; CUTE ent://SD_ILS/0/SD_ILS:25835 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Park, Doo-Soon. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0281-6">http://dx.doi.org/10.1007/978-981-10-0281-6</a><br/>Format:&#160;Electronic Resources<br/> Cyber Warfare Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:22177 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22310 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Natarajan, Raja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14977-6">http://dx.doi.org/10.1007/978-3-319-14977-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:22323 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format:&#160;Electronic Resources<br/> Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23609 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23614 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format:&#160;Electronic Resources<br/> Distributed Denial of Service Attack and Defense ent://SD_ILS/0/SD_ILS:19790 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Yu, Shui. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9491-1">http://dx.doi.org/10.1007/978-1-4614-9491-1</a><br/>Format:&#160;Electronic Resources<br/> Virtualization Techniques for Mobile Systems ent://SD_ILS/0/SD_ILS:20715 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Jaramillo, David. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05741-5">http://dx.doi.org/10.1007/978-3-319-05741-5</a><br/>Format:&#160;Electronic Resources<br/> Continued Rise of the Cloud Advances and Trends in Cloud Computing ent://SD_ILS/0/SD_ILS:19539 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6452-4">http://dx.doi.org/10.1007/978-1-4471-6452-4</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20867 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06677-6">http://dx.doi.org/10.1007/978-3-319-06677-6</a><br/>Format:&#160;Electronic Resources<br/> Network Science and Cybersecurity ent://SD_ILS/0/SD_ILS:19661 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7597-2">http://dx.doi.org/10.1007/978-1-4614-7597-2</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:20414 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Sherif, Mostafa Hashem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04105-6">http://dx.doi.org/10.1007/978-3-319-04105-6</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21918 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12574-9">http://dx.doi.org/10.1007/978-3-319-12574-9</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21922 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12601-2">http://dx.doi.org/10.1007/978-3-319-12601-2</a><br/>Format:&#160;Electronic Resources<br/> Trusted Cloud Computing ent://SD_ILS/0/SD_ILS:21947 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Krcmar, Helmut. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12718-7">http://dx.doi.org/10.1007/978-3-319-12718-7</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 8th International Conference, NSS 2014, Xi&rsquo;an, China, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:21766 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Au, Man Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11698-3">http://dx.doi.org/10.1007/978-3-319-11698-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21876 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21841 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12060-7">http://dx.doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings ent://SD_ILS/0/SD_ILS:24013 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mart&iacute;nez P&eacute;rez, Gregorio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54525-2">http://dx.doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24688 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45921-8">http://dx.doi.org/10.1007/978-3-662-45921-8</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24573 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44885-4">http://dx.doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:20567 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Faloutsos, Michalis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04918-2">http://dx.doi.org/10.1007/978-3-319-04918-2</a><br/>Format:&#160;Electronic Resources<br/> Cyberpatterns Unifying Design Patterns with Security and Attack Patterns ent://SD_ILS/0/SD_ILS:20477 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Blackwell, Clive. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04447-7">http://dx.doi.org/10.1007/978-3-319-04447-7</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20482 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Natarajan, Raja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04483-5">http://dx.doi.org/10.1007/978-3-319-04483-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20807 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Wireless Environments: Detecting and Localizing User Spoofing ent://SD_ILS/0/SD_ILS:20983 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Yang, Jie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07356-9">http://dx.doi.org/10.1007/978-3-319-07356-9</a><br/>Format:&#160;Electronic Resources<br/> e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21166 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Bissyand&eacute;, Tegawend&eacute; F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08368-1">http://dx.doi.org/10.1007/978-3-319-08368-1</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 12th International Conference, WWIC 2014, Paris, France, May 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:22029 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mellouk, Abdelhamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13174-0">http://dx.doi.org/10.1007/978-3-319-13174-0</a><br/>Format:&#160;Electronic Resources<br/> Information and Communication Technology Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24081 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Linawati. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55032-4">http://dx.doi.org/10.1007/978-3-642-55032-4</a><br/>Format:&#160;Electronic Resources<br/> Querying over Encrypted Data in Smart Grids ent://SD_ILS/0/SD_ILS:20814 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Wen, Mi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06355-3">http://dx.doi.org/10.1007/978-3-319-06355-3</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:21460 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions and Defenses 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21695 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Stavrou, Angelos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11379-1">http://dx.doi.org/10.1007/978-3-319-11379-1</a><br/>Format:&#160;Electronic Resources<br/> Cyber Defense and Situational Awareness ent://SD_ILS/0/SD_ILS:21697 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Kott, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11391-3">http://dx.doi.org/10.1007/978-3-319-11391-3</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 &ndash; October 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21782 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Felber, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11764-5">http://dx.doi.org/10.1007/978-3-319-11764-5</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21891 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12400-1">http://dx.doi.org/10.1007/978-3-319-12400-1</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings ent://SD_ILS/0/SD_ILS:22155 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Prakash, Atul. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13841-1">http://dx.doi.org/10.1007/978-3-319-13841-1</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:22178 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14054-4">http://dx.doi.org/10.1007/978-3-319-14054-4</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Challenges, Limitations and R&amp;D Solutions ent://SD_ILS/0/SD_ILS:21531 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10530-7">http://dx.doi.org/10.1007/978-3-319-10530-7</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24585 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mauri, Jaime Lloret. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44966-0">http://dx.doi.org/10.1007/978-3-662-44966-0</a><br/>Format:&#160;Electronic Resources<br/> Secure Cloud Computing ent://SD_ILS/0/SD_ILS:19766 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9278-8">http://dx.doi.org/10.1007/978-1-4614-9278-8</a><br/>Format:&#160;Electronic Resources<br/> Dynamic Secrets in Communication Security ent://SD_ILS/0/SD_ILS:19673 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Xiao, Sheng. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7831-7">http://dx.doi.org/10.1007/978-1-4614-7831-7</a><br/>Format:&#160;Electronic Resources<br/> Cyberterrorism Understanding, Assessment, and Response ent://SD_ILS/0/SD_ILS:19896 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Chen, Thomas M. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0962-9">http://dx.doi.org/10.1007/978-1-4939-0962-9</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Execution on Mobile Devices ent://SD_ILS/0/SD_ILS:19705 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Vasudevan, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8190-4">http://dx.doi.org/10.1007/978-1-4614-8190-4</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22064 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Mitton, Natalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13329-4">http://dx.doi.org/10.1007/978-3-319-13329-4</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Networking 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014. Proceedings ent://SD_ILS/0/SD_ILS:23900 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Chatterjee, Mainak. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45249-9">http://dx.doi.org/10.1007/978-3-642-45249-9</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:24044 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Abadi, Mart&iacute;n. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54792-8">http://dx.doi.org/10.1007/978-3-642-54792-8</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23944 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24557 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44788-8">http://dx.doi.org/10.1007/978-3-662-44788-8</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24558 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44791-8">http://dx.doi.org/10.1007/978-3-662-44791-8</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24122 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Cuppens-Boulahia, Nora. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55415-5">http://dx.doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/> Network Hardening An Automated Approach to Improving Network Security ent://SD_ILS/0/SD_ILS:20506 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04612-9">http://dx.doi.org/10.1007/978-3-319-04612-9</a><br/>Format:&#160;Electronic Resources<br/> Secure and Trustworthy Service Composition The Aniketos Approach ent://SD_ILS/0/SD_ILS:22098 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Brucker, Achim D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13518-2">http://dx.doi.org/10.1007/978-3-319-13518-2</a><br/>Format:&#160;Electronic Resources<br/> Automated Firewall Analytics Design, Configuration and Optimization ent://SD_ILS/0/SD_ILS:21499 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10371-6">http://dx.doi.org/10.1007/978-3-319-10371-6</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Systems for Human Cognition Augmentation ent://SD_ILS/0/SD_ILS:21500 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10374-7">http://dx.doi.org/10.1007/978-3-319-10374-7</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 7th International Conference, IDCS 2014, Calabria, Italy, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21764 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Fortino, Giancarlo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11692-1">http://dx.doi.org/10.1007/978-3-319-11692-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks and Distributed Systems International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21604 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Jahangir, Amir Hossein. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10903-9">http://dx.doi.org/10.1007/978-3-319-10903-9</a><br/>Format:&#160;Electronic Resources<br/> Web Technologies and Applications APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21640 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Han, Weihong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11119-3">http://dx.doi.org/10.1007/978-3-319-11119-3</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22007 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Saxena, Nitesh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13066-8">http://dx.doi.org/10.1007/978-3-319-13066-8</a><br/>Format:&#160;Electronic Resources<br/> Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 &ndash; July 3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24431 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Sperotto, Anna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43862-6">http://dx.doi.org/10.1007/978-3-662-43862-6</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24446 2024-06-08T14:31:39Z 2024-06-08T14:31:39Z Yazar&#160;Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43936-4">http://dx.doi.org/10.1007/978-3-662-43936-4</a><br/>Format:&#160;Electronic Resources<br/>