Search Results for - Narrowed by: Springer E-Book Collection - Cryptology. - Data encryption (Computer science).SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Cryptology.$002509Cryptology.$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300$0026isd$003dtrue?2024-06-26T13:59:51ZSelected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4278992024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Cid, Carlos. editor. (orcid)0000-0001-5761-8694<br/><a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papersent://SD_ILS/0/SD_ILS:4278712024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Ding, Jintai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format: Electronic Resources<br/>Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282072024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4284402024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Zohar, Aviv. editor.<br/><a href="https://doi.org/10.1007/978-3-662-58820-8">https://doi.org/10.1007/978-3-662-58820-8</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2019 The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285002024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Matsui, Mitsuru. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12612-4">https://doi.org/10.1007/978-3-030-12612-4</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 15th International Conference, ICDCIT 2019, Bhubaneswar, India, January 10–13, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4277582024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Fahrnberger, Günter. editor. (orcid)0000-0002-2606-3988<br/><a href="https://doi.org/10.1007/978-3-030-05366-6">https://doi.org/10.1007/978-3-030-05366-6</a><br/>Format: Electronic Resources<br/>Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277612024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Hamid, Brahim. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format: Electronic Resources<br/>Guide to Automotive Connectivity and Cybersecurity Trends, Technologies, Innovations and Applicationsent://SD_ILS/0/SD_ILS:4277712024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Möller, Dietmar P.F. author.<br/><a href="https://doi.org/10.1007/978-3-319-73512-2">https://doi.org/10.1007/978-3-319-73512-2</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – LATINCRYPT 2019 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285242024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Schwabe, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30530-7">https://doi.org/10.1007/978-3-030-30530-7</a><br/>Format: Electronic Resources<br/>Ethical and Secure Computing A Concise Moduleent://SD_ILS/0/SD_ILS:4283582024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-030-03937-0">https://doi.org/10.1007/978-3-030-03937-0</a><br/>Format: Electronic Resources<br/>Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287472024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Askarov, Aslan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – LATINCRYPT 2017 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20–22, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4290332024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25283-0">https://doi.org/10.1007/978-3-030-25283-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4288672024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format: Electronic Resources<br/>Creativity in Intelligent Technologies and Data Science Third Conference, CIT&DS 2019, Volgograd, Russia, September 16–19, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4292442024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kravets, Alla G. editor. (orcid)0000-0003-1675-8652<br/><a href="https://doi.org/10.1007/978-3-030-29743-5">https://doi.org/10.1007/978-3-030-29743-5</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4290232024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4290242024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4289212024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Ishai, Yuval. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17656-3">https://doi.org/10.1007/978-3-030-17656-3</a><br/>Format: Electronic Resources<br/>Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291962024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Liu, Joseph K. editor. (orcid)0000-0001-6656-6240<br/><a href="https://doi.org/10.1007/978-3-030-36938-5">https://doi.org/10.1007/978-3-030-36938-5</a><br/>Format: Electronic Resources<br/>HCI for Cybersecurity, Privacy and Trust First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288972024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Moallem, Abbas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22351-9">https://doi.org/10.1007/978-3-030-22351-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4280242024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34578-5">https://doi.org/10.1007/978-3-030-34578-5</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289462024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Mu, Yi. editor. (orcid)0000-0002-1637-845X<br/><a href="https://doi.org/10.1007/978-3-030-31578-8">https://doi.org/10.1007/978-3-030-31578-8</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4289962024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Goldberg, Ian. editor.<br/><a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279432024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Mori, Paolo. editor. (orcid)0000-0002-6618-0388<br/><a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format: Electronic Resources<br/>Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277382024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Zhang, Huanguo. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4284222024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26948-7">https://doi.org/10.1007/978-3-030-26948-7</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27–29, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4284232024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Karray, Fakhri. editor. (orcid)0000-0002-4217-1372<br/><a href="https://doi.org/10.1007/978-3-030-27202-9">https://doi.org/10.1007/978-3-030-27202-9</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280462024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Albrecht, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format: Electronic Resources<br/>Cryptology and Error Correction An Algebraic Introduction and Real-World Applicationsent://SD_ILS/0/SD_ILS:4282592024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Childs, Lindsay N. author.<br/><a href="https://doi.org/10.1007/978-3-030-15453-0">https://doi.org/10.1007/978-3-030-15453-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4286442024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Ishai, Yuval. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17659-4">https://doi.org/10.1007/978-3-030-17659-4</a><br/>Format: Electronic Resources<br/>Deep Reinforcement Learning Frontiers of Artificial Intelligenceent://SD_ILS/0/SD_ILS:4291002024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Sewak, Mohit. author.<br/><a href="https://doi.org/10.1007/978-981-13-8285-7">https://doi.org/10.1007/978-981-13-8285-7</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4278042024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4279132024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26951-7">https://doi.org/10.1007/978-3-030-26951-7</a><br/>Format: Electronic Resources<br/>Data Science 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4279232024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Cheng, Xiaohui. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0118-0">https://doi.org/10.1007/978-981-15-0118-0</a><br/>Format: Electronic Resources<br/>Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajjient://SD_ILS/0/SD_ILS:4279502024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4277782024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4285462024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format: Electronic Resources<br/>Ad-Hoc, Mobile, and Wireless Networks 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289142024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Palattella, Maria Rita. editor. (orcid)0000-0002-4945-1406<br/><a href="https://doi.org/10.1007/978-3-030-31831-4">https://doi.org/10.1007/978-3-030-31831-4</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286692024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Bilgin, Begül. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15462-2">https://doi.org/10.1007/978-3-030-15462-2</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4287782024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Electronic Resources<br/>Algebra, Codes and Cryptology First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280372024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Gueye, Cheikh Thiecoumba. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36237-9">https://doi.org/10.1007/978-3-030-36237-9</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23–24, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4276912024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Renault, Éric. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22885-9">https://doi.org/10.1007/978-3-030-22885-9</a><br/>Format: Electronic Resources<br/>Provable Security 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276952024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Steinfeld, Ron. editor. (orcid)0000-0003-1745-4183<br/><a href="https://doi.org/10.1007/978-3-030-31919-9">https://doi.org/10.1007/978-3-030-31919-9</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283242024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4283282024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349<br/><a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4281702024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Thampi, Sabu M. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5826-5">https://doi.org/10.1007/978-981-13-5826-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4285372024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34618-8">https://doi.org/10.1007/978-3-030-34618-8</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282832024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Zhou, Jianying. editor. (orcid)0000-0003-0594-0432<br/><a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4289792024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Yoo, Chang D. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format: Electronic Resources<br/>Distributed Applications and Interoperable Systems 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17–21, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289832024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Pereira, José. editor. (orcid)0000-0002-3341-9217<br/><a href="https://doi.org/10.1007/978-3-030-22496-7">https://doi.org/10.1007/978-3-030-22496-7</a><br/>Format: Electronic Resources<br/>Cybersecurity and Secure Information Systems Challenges and Solutions in Smart Environmentsent://SD_ILS/0/SD_ILS:4289852024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Hassanien, Aboul Ella. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16837-7">https://doi.org/10.1007/978-3-030-16837-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4278202024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Ishai, Yuval. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17653-2">https://doi.org/10.1007/978-3-030-17653-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4284902024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26954-8">https://doi.org/10.1007/978-3-030-26954-8</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284922024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Romanovsky, Alexander. editor. (orcid)0000-0002-4076-3331<br/><a href="https://doi.org/10.1007/978-3-030-26250-1">https://doi.org/10.1007/978-3-030-26250-1</a><br/>Format: Electronic Resources<br/>Electronic Voting 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287662024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-30625-0">https://doi.org/10.1007/978-3-030-30625-0</a><br/>Format: Electronic Resources<br/>Advances in Cyber Security: Principles, Techniques, and Applicationsent://SD_ILS/0/SD_ILS:4283982024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Li, Kuan-Ching. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1483-4">https://doi.org/10.1007/978-981-13-1483-4</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4290402024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format: Electronic Resources<br/>Code-Based Cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4290412024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Baldi, Marco. editor. (orcid)0000-0002-8754-5526<br/><a href="https://doi.org/10.1007/978-3-030-25922-8">https://doi.org/10.1007/978-3-030-25922-8</a><br/>Format: Electronic Resources<br/>Cryptography with Shrinking Generators Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimationent://SD_ILS/0/SD_ILS:4287932024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Díaz Cardell, Sara. author.<br/><a href="https://doi.org/10.1007/978-3-030-12850-0">https://doi.org/10.1007/978-3-030-12850-0</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2019 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291832024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Hao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35423-7">https://doi.org/10.1007/978-3-030-35423-7</a><br/>Format: Electronic Resources<br/>Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4291932024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Luhach, Ashish Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0111-1">https://doi.org/10.1007/978-981-15-0111-1</a><br/>Format: Electronic Resources<br/>Interoperability, Safety and Security in IoT Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2216922024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Fortino, Giancarlo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93797-7">https://doi.org/10.1007/978-3-319-93797-7</a><br/>Format: Electronic Resources<br/>Provable Security 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2212392024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Baek, Joonsang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01446-9">https://doi.org/10.1007/978-3-030-01446-9</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2215642024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2221892024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2225842024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2245382024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76578-5">https://doi.org/10.1007/978-3-319-76578-5</a><br/>Format: Electronic Resources<br/>Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2249002024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2252232024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76581-5">https://doi.org/10.1007/978-3-319-76581-5</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2017 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256712024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Adams, Carlisle. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72565-9">https://doi.org/10.1007/978-3-319-72565-9</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2255572024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Frontiers in Cyber Security First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2212822024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Li, Fagen. editor. (orcid)0000-0001-6289-1265<br/><a href="https://doi.org/10.1007/978-981-13-3095-7">https://doi.org/10.1007/978-981-13-3095-7</a><br/>Format: Electronic Resources<br/>Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applicationsent://SD_ILS/0/SD_ILS:2215032024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kävrestad, Joakim. author.<br/><a href="https://doi.org/10.1007/978-3-319-96319-8">https://doi.org/10.1007/978-3-319-96319-8</a><br/>Format: Electronic Resources<br/>Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216272024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2267982024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2225942024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2234852024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Mobile Networks and Management 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2236872024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Hu, Jiankun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90775-8">https://doi.org/10.1007/978-3-319-90775-8</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 9th International Workshop, COSADE 2018, Singapore, April 23–24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2229062024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Fan, Junfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89641-0">https://doi.org/10.1007/978-3-319-89641-0</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2260232024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Hancke, Gerhard P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format: Electronic Resources<br/>Blockchain – ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2260242024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Chen, Shiping. editor. (orcid)0000-0002-4603-0024<br/><a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format: Electronic Resources<br/>Smart Secure Systems – IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2226772024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Venkataramani, Guru Prasadh. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2225452024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Budaghyan, Lilya. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2225912024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96884-1">https://doi.org/10.1007/978-3-319-96884-1</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2227552024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Reconfigurable Cryptographic Processorent://SD_ILS/0/SD_ILS:2231012024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Liu, Leibo. author.<br/><a href="https://doi.org/10.1007/978-981-10-8899-5">https://doi.org/10.1007/978-981-10-8899-5</a><br/>Format: Electronic Resources<br/>Random Numbers and Computersent://SD_ILS/0/SD_ILS:2228492024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kneusel, Ronald T. author.<br/><a href="https://doi.org/10.1007/978-3-319-77697-2">https://doi.org/10.1007/978-3-319-77697-2</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2018 The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2228502024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Smart, Nigel P. editor. (orcid)0000-0003-3567-3304<br/><a href="https://doi.org/10.1007/978-3-319-76953-0">https://doi.org/10.1007/978-3-319-76953-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2232492024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Fault Tolerant Architectures for Cryptography and Hardware Securityent://SD_ILS/0/SD_ILS:2234372024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar PATRANABIS, SIKHAR. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1387-4">https://doi.org/10.1007/978-981-10-1387-4</a><br/>Format: Electronic Resources<br/>Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28–30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216442024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Traore, Issa. editor. (orcid)0000-0003-2987-8047<br/><a href="https://doi.org/10.1007/978-3-030-03712-3">https://doi.org/10.1007/978-3-030-03712-3</a><br/>Format: Electronic Resources<br/>Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216452024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Cremers, Cas. editor. (orcid)0000-0003-0322-2293<br/><a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2217842024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03332-3">https://doi.org/10.1007/978-3-030-03332-3</a><br/>Format: Electronic Resources<br/>Cellular Automata 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17–21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2219692024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Mauri, Giancarlo. editor. (orcid)0000-0003-3520-4022<br/><a href="https://doi.org/10.1007/978-3-319-99813-8">https://doi.org/10.1007/978-3-319-99813-8</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220992024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Camenisch, Jan. editor. (orcid)0000-0001-6654-9459<br/><a href="https://doi.org/10.1007/978-3-030-00434-7">https://doi.org/10.1007/978-3-030-00434-7</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2223702024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Inomata, Atsuo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2223712024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222742024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2222772024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2018 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220482024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Chakraborty, Debrup. editor. (orcid)0000-0001-5179-1971<br/><a href="https://doi.org/10.1007/978-3-030-05378-9">https://doi.org/10.1007/978-3-030-05378-9</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2221372024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2228952024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78372-7">https://doi.org/10.1007/978-3-319-78372-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIent://SD_ILS/0/SD_ILS:2228962024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78375-8">https://doi.org/10.1007/978-3-319-78375-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part Ient://SD_ILS/0/SD_ILS:2228972024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78381-9">https://doi.org/10.1007/978-3-319-78381-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2228022024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03329-3">https://doi.org/10.1007/978-3-030-03329-3</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2228082024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Algorithms and Architectures for Parallel Processing ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2228112024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Hu, Ting. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05234-8">https://doi.org/10.1007/978-3-030-05234-8</a><br/>Format: Electronic Resources<br/>Ubiquitous Communications and Network Computing First International Conference, UBICNET 2017, Bangalore, India, August 3-5, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2261882024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kumar, Navin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73423-1">https://doi.org/10.1007/978-3-319-73423-1</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2235162024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Cuppens, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76687-4">https://doi.org/10.1007/978-3-319-76687-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2246282024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2255092024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2220762024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03326-2">https://doi.org/10.1007/978-3-030-03326-2</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2223282024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2227172024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2232802024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2226332024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Chen, Qingfeng. editor.<br/><a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2249892024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:2249902024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2213782024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-79063-3">https://doi.org/10.1007/978-3-319-79063-3</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2215302024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Capkun, Srdjan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02641-7">https://doi.org/10.1007/978-3-030-02641-7</a><br/>Format: Electronic Resources<br/>Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Securityent://SD_ILS/0/SD_ILS:2215622024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Baldi, Marco. editor. (orcid)0000-0002-8754-5526<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218282024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Towards Autonomous Robotic Systems 19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2214932024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Giuliani, Manuel. editor. (orcid)0000-0003-3781-7623<br/><a href="https://doi.org/10.1007/978-3-319-96728-8">https://doi.org/10.1007/978-3-319-96728-8</a><br/>Format: Electronic Resources<br/>Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2216162024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217712024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Eisenbarth, Thomas. editor. (orcid)0000-0003-1116-6973<br/><a href="https://doi.org/10.1007/978-3-319-75208-2">https://doi.org/10.1007/978-3-319-75208-2</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IVent://SD_ILS/0/SD_ILS:2218792024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2218882024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96878-0">https://doi.org/10.1007/978-3-319-96878-0</a><br/>Format: Electronic Resources<br/>Soft Computing Systems Second International Conference, ICSCS 2018, Kollam, India, April 19–20, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2219892024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Zelinka, Ivan. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1936-5">https://doi.org/10.1007/978-981-13-1936-5</a><br/>Format: Electronic Resources<br/>From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthdayent://SD_ILS/0/SD_ILS:2219902024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format: Electronic Resources<br/>The Hardware Trojan War Attacks, Myths, and Defensesent://SD_ILS/0/SD_ILS:2233192024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Bhunia, Swarup. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2223932024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96881-0">https://doi.org/10.1007/978-3-319-96881-0</a><br/>Format: Electronic Resources<br/>Number-Theoretic Methods in Cryptology First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2251762024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kaczorowski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76620-1">https://doi.org/10.1007/978-3-319-76620-1</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2248012024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kim, Howon. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format: Electronic Resources<br/>Unconventional Computation and Natural Computation 17th International Conference, UCNC 2018, Fontainebleau, France, June 25-29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2260052024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Stepney, Susan. editor. (orcid)0000-0003-3146-5401<br/><a href="https://doi.org/10.1007/978-3-319-92435-9">https://doi.org/10.1007/978-3-319-92435-9</a><br/>Format: Electronic Resources<br/>Digital Watermarking Techniques and Trendsent://SD_ILS/0/SD_ILS:2212042024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Nematollahi, Mohammad Ali. author.<br/><a href="https://doi.org/10.1007/978-981-10-2095-7">https://doi.org/10.1007/978-981-10-2095-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - AFRICACRYPT 2017 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213272024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Joye, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57339-7">https://doi.org/10.1007/978-3-319-57339-7</a><br/>Format: Electronic Resources<br/>Ubiquitous Networking Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217582024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Sabir, Essaid. editor. (orcid)0000-0001-9946-5761<br/><a href="https://doi.org/10.1007/978-3-319-68179-5">https://doi.org/10.1007/978-3-319-68179-5</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221782024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72359-4">https://doi.org/10.1007/978-3-319-72359-4</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2247362024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar De Capitani di Vimercati, Sabrina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58469-0">https://doi.org/10.1007/978-3-319-58469-0</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2253772024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format: Electronic Resources<br/>Guide to Security in SDN and NFV Challenges, Opportunities, and Applicationsent://SD_ILS/0/SD_ILS:2256122024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Zhu, Shao Ying. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2254402024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format: Electronic Resources<br/>Information Security 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2265952024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Nguyen, Phong Q. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69659-1">https://doi.org/10.1007/978-3-319-69659-1</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2268812024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67816-0">https://doi.org/10.1007/978-3-319-67816-0</a><br/>Format: Electronic Resources<br/>Smart Computing and Communication First International Conference, SmartCom 2016, Shenzhen, China, December 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2216782024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Qiu, Meikang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52015-5">https://doi.org/10.1007/978-3-319-52015-5</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:2215712024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68542-7">https://doi.org/10.1007/978-3-319-68542-7</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2217472024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing 6th IFIP WG 2.14 European Conference, ESOCC 2017, Oslo, Norway, September 27-29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2217482024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar De Paoli, Flavio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67262-5">https://doi.org/10.1007/978-3-319-67262-5</a><br/>Format: Electronic Resources<br/>Animal Biometrics Techniques and Applicationsent://SD_ILS/0/SD_ILS:2248412024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kumar, Santosh. author.<br/><a href="https://doi.org/10.1007/978-981-10-7956-6">https://doi.org/10.1007/978-981-10-7956-6</a><br/>Format: Electronic Resources<br/>Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2261582024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Phan, Raphaël C.-W. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61273-7">https://doi.org/10.1007/978-3-319-61273-7</a><br/>Format: Electronic Resources<br/>Data Analytics and Decision Support for Cybersecurity Trends, Methodologies and Applicationsent://SD_ILS/0/SD_ILS:2268042024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Palomares Carrascosa, Iván. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59439-2">https://doi.org/10.1007/978-3-319-59439-2</a><br/>Format: Electronic Resources<br/>Electronic Voting Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2264352024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-319-68687-5">https://doi.org/10.1007/978-3-319-68687-5</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266552024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Cuppens, Frédéric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54876-0">https://doi.org/10.1007/978-3-319-54876-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222502024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2222512024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2235072024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70004-5">https://doi.org/10.1007/978-3-319-70004-5</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2017 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2238422024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Fischer, Wieland. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66787-4">https://doi.org/10.1007/978-3-319-66787-4</a><br/>Format: Electronic Resources<br/>Information Security Applications 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2238442024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Choi, Dooho. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56549-1">https://doi.org/10.1007/978-3-319-56549-1</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2223892024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Cuppens, Frédéric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51966-1">https://doi.org/10.1007/978-3-319-51966-1</a><br/>Format: Electronic Resources<br/>Guide to Digital Forensics A Concise and Practical Introductionent://SD_ILS/0/SD_ILS:2258832024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kävrestad, Joakim. author.<br/><a href="https://doi.org/10.1007/978-3-319-67450-6">https://doi.org/10.1007/978-3-319-67450-6</a><br/>Format: Electronic Resources<br/>On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Gridsent://SD_ILS/0/SD_ILS:2244092024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Borges de Oliveira, Fábio. author.<br/><a href="https://doi.org/10.1007/978-3-319-40718-0">https://doi.org/10.1007/978-3-319-40718-0</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245082024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Polychronakis, Michalis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60876-1">https://doi.org/10.1007/978-3-319-60876-1</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2235642024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64483-7">https://doi.org/10.1007/978-3-319-64483-7</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2254982024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Brenner, Michael. editor. (orcid)0000-0003-2690-7340<br/><a href="https://doi.org/10.1007/978-3-319-70278-0">https://doi.org/10.1007/978-3-319-70278-0</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2251402024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Obana, Satoshi. editor. (orcid)0000-0003-4795-4779<br/><a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2253022024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Cuppens-Boulahia, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61437-3">https://doi.org/10.1007/978-3-319-61437-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2257952024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63715-0">https://doi.org/10.1007/978-3-319-63715-0</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2259962024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format: Electronic Resources<br/>Network Security Metricsent://SD_ILS/0/SD_ILS:2257102024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Wang, Lingyu. author.<br/><a href="https://doi.org/10.1007/978-3-319-66505-4">https://doi.org/10.1007/978-3-319-66505-4</a><br/>Format: Electronic Resources<br/>Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266732024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Rak, Jacek. editor.<br/><a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266162024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Bodden, Eric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62105-0">https://doi.org/10.1007/978-3-319-62105-0</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231052024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Gollmann, Dieter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61204-1">https://doi.org/10.1007/978-3-319-61204-1</a><br/>Format: Electronic Resources<br/>Codes, Cryptology and Information Security Second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carletent://SD_ILS/0/SD_ILS:2222012024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar El Hajji, Said. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55589-8">https://doi.org/10.1007/978-3-319-55589-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2222112024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Chen, Kefei. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54705-3">https://doi.org/10.1007/978-3-319-54705-3</a><br/>Format: Electronic Resources<br/>Ethical and Social Issues in the Information Ageent://SD_ILS/0/SD_ILS:2228402024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-319-70712-9">https://doi.org/10.1007/978-3-319-70712-9</a><br/>Format: Electronic Resources<br/>Theory and Models for Cyber Situation Awarenessent://SD_ILS/0/SD_ILS:2238302024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61152-5">https://doi.org/10.1007/978-3-319-61152-5</a><br/>Format: Electronic Resources<br/>Secure and Privacy-Preserving Data Communication in Internet of Thingsent://SD_ILS/0/SD_ILS:2240012024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Zhu, Liehuang. author.<br/><a href="https://doi.org/10.1007/978-981-10-3235-6">https://doi.org/10.1007/978-981-10-3235-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2216542024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63688-7">https://doi.org/10.1007/978-3-319-63688-7</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2220932024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534<br/><a href="https://doi.org/10.1007/978-3-319-64647-3">https://doi.org/10.1007/978-3-319-64647-3</a><br/>Format: Electronic Resources<br/>Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2228852024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Xu, Ming. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7080-8">https://doi.org/10.1007/978-981-10-7080-8</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2227632024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Deng, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59608-2">https://doi.org/10.1007/978-3-319-59608-2</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231302024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Wen, Sheng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69471-9">https://doi.org/10.1007/978-3-319-69471-9</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231312024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Ali, Sk Subidh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71501-8">https://doi.org/10.1007/978-3-319-71501-8</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI Special Issue on Data and Security Engineeringent://SD_ILS/0/SD_ILS:2261472024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54173-9">https://doi.org/10.1007/978-3-662-54173-9</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2265872024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59879-6">https://doi.org/10.1007/978-3-319-59879-6</a><br/>Format: Electronic Resources<br/>Enterprise Security Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266192024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Chang, Victor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54380-2">https://doi.org/10.1007/978-3-319-54380-2</a><br/>Format: Electronic Resources<br/>Network and System Security 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2269002024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Yan, Zheng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64701-2">https://doi.org/10.1007/978-3-319-64701-2</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking Third International Conference, MSPN 2017, Paris, France, June 29-30, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2265512024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Bouzefrane, Samia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67807-8">https://doi.org/10.1007/978-3-319-67807-8</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2244262024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54388-7">https://doi.org/10.1007/978-3-662-54388-7</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2245122024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Bogdanov, Andrey. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55714-4">https://doi.org/10.1007/978-3-319-55714-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2242592024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Coron, Jean-Sébastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56620-7">https://doi.org/10.1007/978-3-319-56620-7</a><br/>Format: Electronic Resources<br/>Feistel Ciphers Security Proofs and Cryptanalysisent://SD_ILS/0/SD_ILS:2247202024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Nachef, Valerie. author.<br/><a href="https://doi.org/10.1007/978-3-319-49530-9">https://doi.org/10.1007/978-3-319-49530-9</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2017 The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2249732024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Handschuh, Helena. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52153-4">https://doi.org/10.1007/978-3-319-52153-4</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245432024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Dacier, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66332-6">https://doi.org/10.1007/978-3-319-66332-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2252782024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-59870-3">https://doi.org/10.1007/978-3-319-59870-3</a><br/>Format: Electronic Resources<br/>Digital Forensics and Watermarking 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2253912024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Shi, Yun Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53465-7">https://doi.org/10.1007/978-3-319-53465-7</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:2254082024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68505-2">https://doi.org/10.1007/978-3-319-68505-2</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2016 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2254212024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Avanzi, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69453-5">https://doi.org/10.1007/978-3-319-69453-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2262412024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63697-9">https://doi.org/10.1007/978-3-319-63697-9</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification and IoT Security 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 -- December 2, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2268222024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Hancke, Gerhard P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62024-4">https://doi.org/10.1007/978-3-319-62024-4</a><br/>Format: Electronic Resources<br/>Risk Assessment and Risk-Driven Quality Assurance 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2269132024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Großmann, Jürgen. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57858-3">https://doi.org/10.1007/978-3-319-57858-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2264782024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format: Electronic Resources<br/>Digital Forensics and Watermarking 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2220842024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kraetzer, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64185-0">https://doi.org/10.1007/978-3-319-64185-0</a><br/>Format: Electronic Resources<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:2221512024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Mishra, Prabhat. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2225602024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Lemke-Rust, Kerstin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54669-8">https://doi.org/10.1007/978-3-319-54669-8</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI Special Issue on Data and Security Engineeringent://SD_ILS/0/SD_ILS:2227842024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56266-6">https://doi.org/10.1007/978-3-662-56266-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2259292024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kalai, Yael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70500-2">https://doi.org/10.1007/978-3-319-70500-2</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2259302024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kalai, Yael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70503-3">https://doi.org/10.1007/978-3-319-70503-3</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2259462024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-60055-0">https://doi.org/10.1007/978-3-319-60055-0</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2246922024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar O'Neill, Máire. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71045-7">https://doi.org/10.1007/978-3-319-71045-7</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2248682024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Grossklags, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54970-4">https://doi.org/10.1007/978-3-662-54970-4</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2239632024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format: Electronic Resources<br/>Secure and Trustworthy Transportation Cyber-Physical Systemsent://SD_ILS/0/SD_ILS:2248202024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Sun, Yunchuan. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3892-1">https://doi.org/10.1007/978-981-10-3892-1</a><br/>Format: Electronic Resources<br/>Electronic Voting First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2216992024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-319-52240-1">https://doi.org/10.1007/978-3-319-52240-1</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213722024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/><a href="https://doi.org/10.1007/978-981-10-5421-1">https://doi.org/10.1007/978-981-10-5421-1</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2212962024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Hong, Seokhie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53177-9">https://doi.org/10.1007/978-3-319-53177-9</a><br/>Format: Electronic Resources<br/>Secure IT Systems 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213622024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Lipmaa, Helger. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70290-2">https://doi.org/10.1007/978-3-319-70290-2</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213652024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72395-2">https://doi.org/10.1007/978-3-319-72395-2</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221132024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72389-1">https://doi.org/10.1007/978-3-319-72389-1</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2017 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231322024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Patra, Arpita. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71667-1">https://doi.org/10.1007/978-3-319-71667-1</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXI 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2211752024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Livraga, Giovanni. editor. (orcid)0000-0003-2661-8573<br/><a href="https://doi.org/10.1007/978-3-319-61176-1">https://doi.org/10.1007/978-3-319-61176-1</a><br/>Format: Electronic Resources<br/>Security Protocols XXIV 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217382024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Anderson, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62033-6">https://doi.org/10.1007/978-3-319-62033-6</a><br/>Format: Electronic Resources<br/>Provable Security 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213542024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Okamoto, Tatsuaki. editor. (orcid)0000-0002-8145-5474<br/><a href="https://doi.org/10.1007/978-3-319-68637-0">https://doi.org/10.1007/978-3-319-68637-0</a><br/>Format: Electronic Resources<br/>Hardware Protection through Obfuscationent://SD_ILS/0/SD_ILS:2236982024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Forte, Domenic. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49019-9">https://doi.org/10.1007/978-3-319-49019-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2238032024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Coron, Jean-Sébastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56614-6">https://doi.org/10.1007/978-3-319-56614-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2248972024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Coron, Jean-Sébastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56617-7">https://doi.org/10.1007/978-3-319-56617-7</a><br/>Format: Electronic Resources<br/>Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications 5th International Symposium, CompIMAGE 2016, Niagara Falls, NY, USA, September 21-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2252602024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Barneva, Reneta P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54609-4">https://doi.org/10.1007/978-3-319-54609-4</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2261802024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Kiayias, Aggelos. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70972-7">https://doi.org/10.1007/978-3-319-70972-7</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256562024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Camp, Olivier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54433-5">https://doi.org/10.1007/978-3-319-54433-5</a><br/>Format: Electronic Resources<br/>Security Protocols XXV 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2265362024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71075-4">https://doi.org/10.1007/978-3-319-71075-4</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2269352024-06-26T13:59:51Z2024-06-26T13:59:51ZYazar Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54365-8">https://doi.org/10.1007/978-3-662-54365-8</a><br/>Format: Electronic Resources<br/>