Search Results for - Narrowed by: Springer E-Book Collection - Data encryption (Computer science).SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?2024-05-05T12:42:31ZDistributed Applications and Interoperable Systems 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17–21, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289832024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Pereira, José. editor. (orcid)0000-0002-3341-9217<br/><a href="https://doi.org/10.1007/978-3-030-22496-7">https://doi.org/10.1007/978-3-030-22496-7</a><br/>Format: Electronic Resources<br/>Cybersecurity and Secure Information Systems Challenges and Solutions in Smart Environmentsent://SD_ILS/0/SD_ILS:4289852024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hassanien, Aboul Ella. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16837-7">https://doi.org/10.1007/978-3-030-16837-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2019 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291832024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35423-7">https://doi.org/10.1007/978-3-030-35423-7</a><br/>Format: Electronic Resources<br/>Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4291932024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Luhach, Ashish Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0111-1">https://doi.org/10.1007/978-981-15-0111-1</a><br/>Format: Electronic Resources<br/>HCI for Cybersecurity, Privacy and Trust First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288972024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Moallem, Abbas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22351-9">https://doi.org/10.1007/978-3-030-22351-9</a><br/>Format: Electronic Resources<br/>Algebra, Codes and Cryptology First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280372024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Gueye, Cheikh Thiecoumba. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36237-9">https://doi.org/10.1007/978-3-030-36237-9</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280462024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Albrecht, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4286442024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Ishai, Yuval. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17659-4">https://doi.org/10.1007/978-3-030-17659-4</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4278042024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283242024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23–24, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4276912024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Renault, Éric. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22885-9">https://doi.org/10.1007/978-3-030-22885-9</a><br/>Format: Electronic Resources<br/>Cryptology and Error Correction An Algebraic Introduction and Real-World Applicationsent://SD_ILS/0/SD_ILS:4282592024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Childs, Lindsay N. author.<br/><a href="https://doi.org/10.1007/978-3-030-15453-0">https://doi.org/10.1007/978-3-030-15453-0</a><br/>Format: Electronic Resources<br/>Provable Security 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276952024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Steinfeld, Ron. editor. (orcid)0000-0003-1745-4183<br/><a href="https://doi.org/10.1007/978-3-030-31919-9">https://doi.org/10.1007/978-3-030-31919-9</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4284402024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Zohar, Aviv. editor.<br/><a href="https://doi.org/10.1007/978-3-662-58820-8">https://doi.org/10.1007/978-3-662-58820-8</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2019 The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285002024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Matsui, Mitsuru. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12612-4">https://doi.org/10.1007/978-3-030-12612-4</a><br/>Format: Electronic Resources<br/>Deep Reinforcement Learning Frontiers of Artificial Intelligenceent://SD_ILS/0/SD_ILS:4291002024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Sewak, Mohit. author.<br/><a href="https://doi.org/10.1007/978-981-13-8285-7">https://doi.org/10.1007/978-981-13-8285-7</a><br/>Format: Electronic Resources<br/>Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287472024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Askarov, Aslan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Cryptography with Shrinking Generators Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimationent://SD_ILS/0/SD_ILS:4287932024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Díaz Cardell, Sara. author.<br/><a href="https://doi.org/10.1007/978-3-030-12850-0">https://doi.org/10.1007/978-3-030-12850-0</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4278992024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Cid, Carlos. editor. (orcid)0000-0001-5761-8694<br/><a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Electronic Resources<br/>Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277612024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hamid, Brahim. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282072024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4279132024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26951-7">https://doi.org/10.1007/978-3-030-26951-7</a><br/>Format: Electronic Resources<br/>Guide to Automotive Connectivity and Cybersecurity Trends, Technologies, Innovations and Applicationsent://SD_ILS/0/SD_ILS:4277712024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Möller, Dietmar P.F. author.<br/><a href="https://doi.org/10.1007/978-3-319-73512-2">https://doi.org/10.1007/978-3-319-73512-2</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4290232024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4290242024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format: Electronic Resources<br/>Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277382024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Zhang, Huanguo. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format: Electronic Resources<br/>Data Science 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4279232024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Cheng, Xiaohui. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0118-0">https://doi.org/10.1007/978-981-15-0118-0</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4277782024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4284222024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26948-7">https://doi.org/10.1007/978-3-030-26948-7</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27–29, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4284232024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Karray, Fakhri. editor. (orcid)0000-0002-4217-1372<br/><a href="https://doi.org/10.1007/978-3-030-27202-9">https://doi.org/10.1007/978-3-030-27202-9</a><br/>Format: Electronic Resources<br/>Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajjient://SD_ILS/0/SD_ILS:4279502024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289462024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Mu, Yi. editor. (orcid)0000-0002-1637-845X<br/><a href="https://doi.org/10.1007/978-3-030-31578-8">https://doi.org/10.1007/978-3-030-31578-8</a><br/>Format: Electronic Resources<br/>Electronic Voting 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287662024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-30625-0">https://doi.org/10.1007/978-3-030-30625-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4287782024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Electronic Resources<br/>Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291962024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Liu, Joseph K. editor. (orcid)0000-0001-6656-6240<br/><a href="https://doi.org/10.1007/978-3-030-36938-5">https://doi.org/10.1007/978-3-030-36938-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4278202024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Ishai, Yuval. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17653-2">https://doi.org/10.1007/978-3-030-17653-2</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 15th International Conference, ICDCIT 2019, Bhubaneswar, India, January 10–13, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4277582024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Fahrnberger, Günter. editor. (orcid)0000-0002-2606-3988<br/><a href="https://doi.org/10.1007/978-3-030-05366-6">https://doi.org/10.1007/978-3-030-05366-6</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279432024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Mori, Paolo. editor. (orcid)0000-0002-6618-0388<br/><a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format: Electronic Resources<br/>Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4283282024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349<br/><a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Advances in Cyber Security: Principles, Techniques, and Applicationsent://SD_ILS/0/SD_ILS:4283982024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Li, Kuan-Ching. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1483-4">https://doi.org/10.1007/978-981-13-1483-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4285462024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – LATINCRYPT 2017 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20–22, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4290332024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25283-0">https://doi.org/10.1007/978-3-030-25283-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4284902024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26954-8">https://doi.org/10.1007/978-3-030-26954-8</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284922024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Romanovsky, Alexander. editor. (orcid)0000-0002-4076-3331<br/><a href="https://doi.org/10.1007/978-3-030-26250-1">https://doi.org/10.1007/978-3-030-26250-1</a><br/>Format: Electronic Resources<br/>Ad-Hoc, Mobile, and Wireless Networks 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289142024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Palattella, Maria Rita. editor. (orcid)0000-0002-4945-1406<br/><a href="https://doi.org/10.1007/978-3-030-31831-4">https://doi.org/10.1007/978-3-030-31831-4</a><br/>Format: Electronic Resources<br/>Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4289792024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Yoo, Chang D. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4289962024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Goldberg, Ian. editor.<br/><a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4290402024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format: Electronic Resources<br/>Code-Based Cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4290412024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Baldi, Marco. editor. (orcid)0000-0002-8754-5526<br/><a href="https://doi.org/10.1007/978-3-030-25922-8">https://doi.org/10.1007/978-3-030-25922-8</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4288672024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format: Electronic Resources<br/>Creativity in Intelligent Technologies and Data Science Third Conference, CIT&DS 2019, Volgograd, Russia, September 16–19, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4292442024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kravets, Alla G. editor. (orcid)0000-0003-1675-8652<br/><a href="https://doi.org/10.1007/978-3-030-29743-5">https://doi.org/10.1007/978-3-030-29743-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4280242024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34578-5">https://doi.org/10.1007/978-3-030-34578-5</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286692024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Bilgin, Begül. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15462-2">https://doi.org/10.1007/978-3-030-15462-2</a><br/>Format: Electronic Resources<br/>Ethical and Secure Computing A Concise Moduleent://SD_ILS/0/SD_ILS:4283582024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-030-03937-0">https://doi.org/10.1007/978-3-030-03937-0</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papersent://SD_ILS/0/SD_ILS:4278712024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Ding, Jintai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282832024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Zhou, Jianying. editor. (orcid)0000-0003-0594-0432<br/><a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – LATINCRYPT 2019 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285242024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Schwabe, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30530-7">https://doi.org/10.1007/978-3-030-30530-7</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4281702024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Thampi, Sabu M. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5826-5">https://doi.org/10.1007/978-981-13-5826-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4285372024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34618-8">https://doi.org/10.1007/978-3-030-34618-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4289212024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Ishai, Yuval. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17656-3">https://doi.org/10.1007/978-3-030-17656-3</a><br/>Format: Electronic Resources<br/>Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216272024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2221892024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222742024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2228022024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03329-3">https://doi.org/10.1007/978-3-030-03329-3</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2228082024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2227552024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2252232024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76581-5">https://doi.org/10.1007/978-3-319-76581-5</a><br/>Format: Electronic Resources<br/>Unconventional Computation and Natural Computation 17th International Conference, UCNC 2018, Fontainebleau, France, June 25-29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2260052024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Stepney, Susan. editor. (orcid)0000-0003-3146-5401<br/><a href="https://doi.org/10.1007/978-3-319-92435-9">https://doi.org/10.1007/978-3-319-92435-9</a><br/>Format: Electronic Resources<br/>Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2255092024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format: Electronic Resources<br/>Blockchain – ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2260242024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Chen, Shiping. editor. (orcid)0000-0002-4603-0024<br/><a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2255572024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Provable Security 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2212392024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Baek, Joonsang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01446-9">https://doi.org/10.1007/978-3-030-01446-9</a><br/>Format: Electronic Resources<br/>Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applicationsent://SD_ILS/0/SD_ILS:2215032024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kävrestad, Joakim. author.<br/><a href="https://doi.org/10.1007/978-3-319-96319-8">https://doi.org/10.1007/978-3-319-96319-8</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218282024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Securityent://SD_ILS/0/SD_ILS:2215622024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Baldi, Marco. editor. (orcid)0000-0002-8754-5526<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2215642024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Cellular Automata 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17–21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2219692024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Mauri, Giancarlo. editor. (orcid)0000-0003-3520-4022<br/><a href="https://doi.org/10.1007/978-3-319-99813-8">https://doi.org/10.1007/978-3-319-99813-8</a><br/>Format: Electronic Resources<br/>Soft Computing Systems Second International Conference, ICSCS 2018, Kollam, India, April 19–20, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2219892024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Zelinka, Ivan. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1936-5">https://doi.org/10.1007/978-981-13-1936-5</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2222772024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2223712024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format: Electronic Resources<br/>Smart Secure Systems – IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2226772024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Venkataramani, Guru Prasadh. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2226332024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Chen, Qingfeng. editor.<br/><a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format: Electronic Resources<br/>Reconfigurable Cryptographic Processorent://SD_ILS/0/SD_ILS:2231012024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Liu, Leibo. author.<br/><a href="https://doi.org/10.1007/978-981-10-8899-5">https://doi.org/10.1007/978-981-10-8899-5</a><br/>Format: Electronic Resources<br/>Ubiquitous Communications and Network Computing First International Conference, UBICNET 2017, Bangalore, India, August 3-5, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2261882024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kumar, Navin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73423-1">https://doi.org/10.1007/978-3-319-73423-1</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2260232024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hancke, Gerhard P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2017 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256712024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Adams, Carlisle. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72565-9">https://doi.org/10.1007/978-3-319-72565-9</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2267982024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2218882024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96878-0">https://doi.org/10.1007/978-3-319-96878-0</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2213782024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-79063-3">https://doi.org/10.1007/978-3-319-79063-3</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217712024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Eisenbarth, Thomas. editor. (orcid)0000-0003-1116-6973<br/><a href="https://doi.org/10.1007/978-3-319-75208-2">https://doi.org/10.1007/978-3-319-75208-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2217842024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03332-3">https://doi.org/10.1007/978-3-030-03332-3</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2215302024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Capkun, Srdjan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02641-7">https://doi.org/10.1007/978-3-030-02641-7</a><br/>Format: Electronic Resources<br/>Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28–30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216442024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Traore, Issa. editor. (orcid)0000-0003-2987-8047<br/><a href="https://doi.org/10.1007/978-3-030-03712-3">https://doi.org/10.1007/978-3-030-03712-3</a><br/>Format: Electronic Resources<br/>Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216452024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Cremers, Cas. editor. (orcid)0000-0003-0322-2293<br/><a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format: Electronic Resources<br/>From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthdayent://SD_ILS/0/SD_ILS:2219902024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2220762024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03326-2">https://doi.org/10.1007/978-3-030-03326-2</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220992024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Camenisch, Jan. editor. (orcid)0000-0001-6654-9459<br/><a href="https://doi.org/10.1007/978-3-030-00434-7">https://doi.org/10.1007/978-3-030-00434-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2018 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220482024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Chakraborty, Debrup. editor. (orcid)0000-0001-5179-1971<br/><a href="https://doi.org/10.1007/978-3-030-05378-9">https://doi.org/10.1007/978-3-030-05378-9</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2221372024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2223282024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2223932024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96881-0">https://doi.org/10.1007/978-3-319-96881-0</a><br/>Format: Electronic Resources<br/>Towards Autonomous Robotic Systems 19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2214932024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Giuliani, Manuel. editor. (orcid)0000-0003-3781-7623<br/><a href="https://doi.org/10.1007/978-3-319-96728-8">https://doi.org/10.1007/978-3-319-96728-8</a><br/>Format: Electronic Resources<br/>Interoperability, Safety and Security in IoT Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2216922024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Fortino, Giancarlo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93797-7">https://doi.org/10.1007/978-3-319-93797-7</a><br/>Format: Electronic Resources<br/>Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2216162024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format: Electronic Resources<br/>Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2225842024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2225942024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Algorithms and Architectures for Parallel Processing ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2228112024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hu, Ting. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05234-8">https://doi.org/10.1007/978-3-030-05234-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2228952024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78372-7">https://doi.org/10.1007/978-3-319-78372-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIent://SD_ILS/0/SD_ILS:2228962024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78375-8">https://doi.org/10.1007/978-3-319-78375-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part Ient://SD_ILS/0/SD_ILS:2228972024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78381-9">https://doi.org/10.1007/978-3-319-78381-9</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2249892024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:2249902024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Frontiers in Cyber Security First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2212822024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Li, Fagen. editor. (orcid)0000-0001-6289-1265<br/><a href="https://doi.org/10.1007/978-981-13-3095-7">https://doi.org/10.1007/978-981-13-3095-7</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2223702024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Inomata, Atsuo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2225912024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96884-1">https://doi.org/10.1007/978-3-319-96884-1</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2227172024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 9th International Workshop, COSADE 2018, Singapore, April 23–24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2229062024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Fan, Junfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89641-0">https://doi.org/10.1007/978-3-319-89641-0</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2232802024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>The Hardware Trojan War Attacks, Myths, and Defensesent://SD_ILS/0/SD_ILS:2233192024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Bhunia, Swarup. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2234852024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2235162024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Cuppens, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76687-4">https://doi.org/10.1007/978-3-319-76687-4</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2018 The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2228502024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Smart, Nigel P. editor. (orcid)0000-0003-3567-3304<br/><a href="https://doi.org/10.1007/978-3-319-76953-0">https://doi.org/10.1007/978-3-319-76953-0</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2225452024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Budaghyan, Lilya. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2232492024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2246282024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2245382024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76578-5">https://doi.org/10.1007/978-3-319-76578-5</a><br/>Format: Electronic Resources<br/>Number-Theoretic Methods in Cryptology First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2251762024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kaczorowski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76620-1">https://doi.org/10.1007/978-3-319-76620-1</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IVent://SD_ILS/0/SD_ILS:2218792024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format: Electronic Resources<br/>Random Numbers and Computersent://SD_ILS/0/SD_ILS:2228492024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kneusel, Ronald T. author.<br/><a href="https://doi.org/10.1007/978-3-319-77697-2">https://doi.org/10.1007/978-3-319-77697-2</a><br/>Format: Electronic Resources<br/>Fault Tolerant Architectures for Cryptography and Hardware Securityent://SD_ILS/0/SD_ILS:2234372024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar PATRANABIS, SIKHAR. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1387-4">https://doi.org/10.1007/978-981-10-1387-4</a><br/>Format: Electronic Resources<br/>Mobile Networks and Management 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2236872024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hu, Jiankun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90775-8">https://doi.org/10.1007/978-3-319-90775-8</a><br/>Format: Electronic Resources<br/>Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2249002024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2248012024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kim, Howon. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - AFRICACRYPT 2017 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213272024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Joye, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57339-7">https://doi.org/10.1007/978-3-319-57339-7</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:2215712024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68542-7">https://doi.org/10.1007/978-3-319-68542-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2216542024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63688-7">https://doi.org/10.1007/978-3-319-63688-7</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing 6th IFIP WG 2.14 European Conference, ESOCC 2017, Oslo, Norway, September 27-29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2217482024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar De Paoli, Flavio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67262-5">https://doi.org/10.1007/978-3-319-67262-5</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2220932024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534<br/><a href="https://doi.org/10.1007/978-3-319-64647-3">https://doi.org/10.1007/978-3-319-64647-3</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221782024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72359-4">https://doi.org/10.1007/978-3-319-72359-4</a><br/>Format: Electronic Resources<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:2221512024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Mishra, Prabhat. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2223892024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Cuppens, Frédéric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51966-1">https://doi.org/10.1007/978-3-319-51966-1</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2259962024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format: Electronic Resources<br/>Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2261582024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Phan, Raphaël C.-W. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61273-7">https://doi.org/10.1007/978-3-319-61273-7</a><br/>Format: Electronic Resources<br/>Data Analytics and Decision Support for Cybersecurity Trends, Methodologies and Applicationsent://SD_ILS/0/SD_ILS:2268042024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Palomares Carrascosa, Iván. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59439-2">https://doi.org/10.1007/978-3-319-59439-2</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification and IoT Security 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 -- December 2, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2268222024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hancke, Gerhard P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62024-4">https://doi.org/10.1007/978-3-319-62024-4</a><br/>Format: Electronic Resources<br/>Risk Assessment and Risk-Driven Quality Assurance 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2269132024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Großmann, Jürgen. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57858-3">https://doi.org/10.1007/978-3-319-57858-3</a><br/>Format: Electronic Resources<br/>Electronic Voting Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2264352024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-319-68687-5">https://doi.org/10.1007/978-3-319-68687-5</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2212962024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hong, Seokhie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53177-9">https://doi.org/10.1007/978-3-319-53177-9</a><br/>Format: Electronic Resources<br/>Smart Computing and Communication First International Conference, SmartCom 2016, Shenzhen, China, December 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2216782024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Qiu, Meikang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52015-5">https://doi.org/10.1007/978-3-319-52015-5</a><br/>Format: Electronic Resources<br/>Ubiquitous Networking Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217582024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Sabir, Essaid. editor. (orcid)0000-0001-9946-5761<br/><a href="https://doi.org/10.1007/978-3-319-68179-5">https://doi.org/10.1007/978-3-319-68179-5</a><br/>Format: Electronic Resources<br/>Digital Forensics and Watermarking 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2220842024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kraetzer, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64185-0">https://doi.org/10.1007/978-3-319-64185-0</a><br/>Format: Electronic Resources<br/>Codes, Cryptology and Information Security Second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carletent://SD_ILS/0/SD_ILS:2222012024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar El Hajji, Said. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55589-8">https://doi.org/10.1007/978-3-319-55589-8</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231052024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Gollmann, Dieter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61204-1">https://doi.org/10.1007/978-3-319-61204-1</a><br/>Format: Electronic Resources<br/>Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266732024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Rak, Jacek. editor.<br/><a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI Special Issue on Data and Security Engineeringent://SD_ILS/0/SD_ILS:2261472024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54173-9">https://doi.org/10.1007/978-3-662-54173-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2262412024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63697-9">https://doi.org/10.1007/978-3-319-63697-9</a><br/>Format: Electronic Resources<br/>Network and System Security 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2269002024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Yan, Zheng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64701-2">https://doi.org/10.1007/978-3-319-64701-2</a><br/>Format: Electronic Resources<br/>Ethical and Social Issues in the Information Ageent://SD_ILS/0/SD_ILS:2228402024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-319-70712-9">https://doi.org/10.1007/978-3-319-70712-9</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2235072024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70004-5">https://doi.org/10.1007/978-3-319-70004-5</a><br/>Format: Electronic Resources<br/>Theory and Models for Cyber Situation Awarenessent://SD_ILS/0/SD_ILS:2238302024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61152-5">https://doi.org/10.1007/978-3-319-61152-5</a><br/>Format: Electronic Resources<br/>Secure and Privacy-Preserving Data Communication in Internet of Thingsent://SD_ILS/0/SD_ILS:2240012024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Zhu, Liehuang. author.<br/><a href="https://doi.org/10.1007/978-981-10-3235-6">https://doi.org/10.1007/978-981-10-3235-6</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2246922024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar O'Neill, Máire. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71045-7">https://doi.org/10.1007/978-3-319-71045-7</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:2254082024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68505-2">https://doi.org/10.1007/978-3-319-68505-2</a><br/>Format: Electronic Resources<br/>Guide to Security in SDN and NFV Challenges, Opportunities, and Applicationsent://SD_ILS/0/SD_ILS:2256122024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Zhu, Shao Ying. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format: Electronic Resources<br/>Network Security Metricsent://SD_ILS/0/SD_ILS:2257102024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Wang, Lingyu. author.<br/><a href="https://doi.org/10.1007/978-3-319-66505-4">https://doi.org/10.1007/978-3-319-66505-4</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266552024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Cuppens, Frédéric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54876-0">https://doi.org/10.1007/978-3-319-54876-0</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266162024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Bodden, Eric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62105-0">https://doi.org/10.1007/978-3-319-62105-0</a><br/>Format: Electronic Resources<br/>Provable Security 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213542024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Okamoto, Tatsuaki. editor. (orcid)0000-0002-8145-5474<br/><a href="https://doi.org/10.1007/978-3-319-68637-0">https://doi.org/10.1007/978-3-319-68637-0</a><br/>Format: Electronic Resources<br/>Security Protocols XXIV 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217382024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Anderson, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62033-6">https://doi.org/10.1007/978-3-319-62033-6</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2217472024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221132024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72389-1">https://doi.org/10.1007/978-3-319-72389-1</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXI 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2211752024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Livraga, Giovanni. editor. (orcid)0000-0003-2661-8573<br/><a href="https://doi.org/10.1007/978-3-319-61176-1">https://doi.org/10.1007/978-3-319-61176-1</a><br/>Format: Electronic Resources<br/>Digital Watermarking Techniques and Trendsent://SD_ILS/0/SD_ILS:2212042024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Nematollahi, Mohammad Ali. author.<br/><a href="https://doi.org/10.1007/978-981-10-2095-7">https://doi.org/10.1007/978-981-10-2095-7</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213722024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/><a href="https://doi.org/10.1007/978-981-10-5421-1">https://doi.org/10.1007/978-981-10-5421-1</a><br/>Format: Electronic Resources<br/>Secure IT Systems 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213622024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lipmaa, Helger. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70290-2">https://doi.org/10.1007/978-3-319-70290-2</a><br/>Format: Electronic Resources<br/>Electronic Voting First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2216992024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-319-52240-1">https://doi.org/10.1007/978-3-319-52240-1</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213652024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72395-2">https://doi.org/10.1007/978-3-319-72395-2</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2222112024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Chen, Kefei. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54705-3">https://doi.org/10.1007/978-3-319-54705-3</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI Special Issue on Data and Security Engineeringent://SD_ILS/0/SD_ILS:2227842024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56266-6">https://doi.org/10.1007/978-3-662-56266-6</a><br/>Format: Electronic Resources<br/>Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2228852024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Xu, Ming. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7080-8">https://doi.org/10.1007/978-981-10-7080-8</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231302024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Wen, Sheng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69471-9">https://doi.org/10.1007/978-3-319-69471-9</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231312024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Ali, Sk Subidh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71501-8">https://doi.org/10.1007/978-3-319-71501-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2017 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231322024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Patra, Arpita. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71667-1">https://doi.org/10.1007/978-3-319-71667-1</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2225602024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lemke-Rust, Kerstin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54669-8">https://doi.org/10.1007/978-3-319-54669-8</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2235642024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64483-7">https://doi.org/10.1007/978-3-319-64483-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2238032024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Coron, Jean-Sébastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56614-6">https://doi.org/10.1007/978-3-319-56614-6</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2017 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2238422024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Fischer, Wieland. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66787-4">https://doi.org/10.1007/978-3-319-66787-4</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2244262024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54388-7">https://doi.org/10.1007/978-3-662-54388-7</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2248682024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Grossklags, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54970-4">https://doi.org/10.1007/978-3-662-54970-4</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2017 The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2249732024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Handschuh, Helena. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52153-4">https://doi.org/10.1007/978-3-319-52153-4</a><br/>Format: Electronic Resources<br/>Animal Biometrics Techniques and Applicationsent://SD_ILS/0/SD_ILS:2248412024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kumar, Santosh. author.<br/><a href="https://doi.org/10.1007/978-981-10-7956-6">https://doi.org/10.1007/978-981-10-7956-6</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2253022024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Cuppens-Boulahia, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61437-3">https://doi.org/10.1007/978-3-319-61437-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222502024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2222512024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2227632024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Deng, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59608-2">https://doi.org/10.1007/978-3-319-59608-2</a><br/>Format: Electronic Resources<br/>Hardware Protection through Obfuscationent://SD_ILS/0/SD_ILS:2236982024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Forte, Domenic. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49019-9">https://doi.org/10.1007/978-3-319-49019-9</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245432024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Dacier, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66332-6">https://doi.org/10.1007/978-3-319-66332-6</a><br/>Format: Electronic Resources<br/>Information Security Applications 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2238442024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Choi, Dooho. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56549-1">https://doi.org/10.1007/978-3-319-56549-1</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2239632024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format: Electronic Resources<br/>Feistel Ciphers Security Proofs and Cryptanalysisent://SD_ILS/0/SD_ILS:2247202024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Nachef, Valerie. author.<br/><a href="https://doi.org/10.1007/978-3-319-49530-9">https://doi.org/10.1007/978-3-319-49530-9</a><br/>Format: Electronic Resources<br/>Secure and Trustworthy Transportation Cyber-Physical Systemsent://SD_ILS/0/SD_ILS:2248202024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Sun, Yunchuan. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3892-1">https://doi.org/10.1007/978-981-10-3892-1</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2016 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2254212024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Avanzi, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69453-5">https://doi.org/10.1007/978-3-319-69453-5</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2251402024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Obana, Satoshi. editor. (orcid)0000-0003-4795-4779<br/><a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2259292024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kalai, Yael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70500-2">https://doi.org/10.1007/978-3-319-70500-2</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2259302024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kalai, Yael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70503-3">https://doi.org/10.1007/978-3-319-70503-3</a><br/>Format: Electronic Resources<br/>Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications 5th International Symposium, CompIMAGE 2016, Niagara Falls, NY, USA, September 21-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2252602024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Barneva, Reneta P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54609-4">https://doi.org/10.1007/978-3-319-54609-4</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2259462024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-60055-0">https://doi.org/10.1007/978-3-319-60055-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2264782024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format: Electronic Resources<br/>On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Gridsent://SD_ILS/0/SD_ILS:2244092024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Borges de Oliveira, Fábio. author.<br/><a href="https://doi.org/10.1007/978-3-319-40718-0">https://doi.org/10.1007/978-3-319-40718-0</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2245122024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Bogdanov, Andrey. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55714-4">https://doi.org/10.1007/978-3-319-55714-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2242592024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Coron, Jean-Sébastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56620-7">https://doi.org/10.1007/978-3-319-56620-7</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2247362024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar De Capitani di Vimercati, Sabrina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58469-0">https://doi.org/10.1007/978-3-319-58469-0</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2253772024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2254982024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Brenner, Michael. editor. (orcid)0000-0003-2690-7340<br/><a href="https://doi.org/10.1007/978-3-319-70278-0">https://doi.org/10.1007/978-3-319-70278-0</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2254402024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256562024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Camp, Olivier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54433-5">https://doi.org/10.1007/978-3-319-54433-5</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2265872024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59879-6">https://doi.org/10.1007/978-3-319-59879-6</a><br/>Format: Electronic Resources<br/>Information Security 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2265952024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Nguyen, Phong Q. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69659-1">https://doi.org/10.1007/978-3-319-69659-1</a><br/>Format: Electronic Resources<br/>Security Protocols XXV 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2265362024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71075-4">https://doi.org/10.1007/978-3-319-71075-4</a><br/>Format: Electronic Resources<br/>Enterprise Security Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266192024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Chang, Victor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54380-2">https://doi.org/10.1007/978-3-319-54380-2</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2268812024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67816-0">https://doi.org/10.1007/978-3-319-67816-0</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking Third International Conference, MSPN 2017, Paris, France, June 29-30, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2265512024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Bouzefrane, Samia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67807-8">https://doi.org/10.1007/978-3-319-67807-8</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245082024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Polychronakis, Michalis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60876-1">https://doi.org/10.1007/978-3-319-60876-1</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2252782024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-59870-3">https://doi.org/10.1007/978-3-319-59870-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2248972024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Coron, Jean-Sébastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56617-7">https://doi.org/10.1007/978-3-319-56617-7</a><br/>Format: Electronic Resources<br/>Digital Forensics and Watermarking 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2253912024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Shi, Yun Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53465-7">https://doi.org/10.1007/978-3-319-53465-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2257952024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63715-0">https://doi.org/10.1007/978-3-319-63715-0</a><br/>Format: Electronic Resources<br/>Guide to Digital Forensics A Concise and Practical Introductionent://SD_ILS/0/SD_ILS:2258832024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kävrestad, Joakim. author.<br/><a href="https://doi.org/10.1007/978-3-319-67450-6">https://doi.org/10.1007/978-3-319-67450-6</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2261802024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kiayias, Aggelos. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70972-7">https://doi.org/10.1007/978-3-319-70972-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2269352024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54365-8">https://doi.org/10.1007/978-3-662-54365-8</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174132024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedingsent://SD_ILS/0/SD_ILS:183522024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45871-7">http://dx.doi.org/10.1007/978-3-319-45871-7</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Aggregation Techniques for Smart Grid Communicationsent://SD_ILS/0/SD_ILS:178022024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lu, Rongxing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32899-7">http://dx.doi.org/10.1007/978-3-319-32899-7</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183792024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183972024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Barthe, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46598-2">http://dx.doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186532024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Understanding Social Engineering Based Scamsent://SD_ILS/0/SD_ILS:164802024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Jakobsson, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-6457-4">http://dx.doi.org/10.1007/978-1-4939-6457-4</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179552024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:176442024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31517-1">http://dx.doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:180062024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:182752024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hartmann, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44406-2">http://dx.doi.org/10.1007/978-3-319-44406-2</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182822024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Ogawa, Kazuto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44524-3">http://dx.doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:186772024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Peyrin, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-52993-5">http://dx.doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186782024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53008-5">http://dx.doi.org/10.1007/978-3-662-53008-5</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:173242024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Güneysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29078-2">http://dx.doi.org/10.1007/978-3-319-29078-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:186792024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53015-3">http://dx.doi.org/10.1007/978-3-662-53015-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186802024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53018-4">http://dx.doi.org/10.1007/978-3-662-53018-4</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedingsent://SD_ILS/0/SD_ILS:173532024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Takagi, Tsuyoshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29360-8">http://dx.doi.org/10.1007/978-3-319-29360-8</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:173682024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29485-8">http://dx.doi.org/10.1007/978-3-319-29485-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:175602024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kwon, Soonhak. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30840-1">http://dx.doi.org/10.1007/978-3-319-30840-1</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography - SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176232024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Dunkelman, Orr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31301-6">http://dx.doi.org/10.1007/978-3-319-31301-6</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedingsent://SD_ILS/0/SD_ILS:175562024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Caballero, Juan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30806-7">http://dx.doi.org/10.1007/978-3-319-30806-7</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174892024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30303-1">http://dx.doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176752024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31811-0">http://dx.doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176832024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kim, Ho-won. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31875-2">http://dx.doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:174212024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29883-2">http://dx.doi.org/10.1007/978-3-319-29883-2</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:174282024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:177082024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Colbert, Edward J. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32125-7">http://dx.doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:177772024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedingsent://SD_ILS/0/SD_ILS:181542024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Ranise, Silvio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41483-6">http://dx.doi.org/10.1007/978-3-319-41483-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:180732024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40253-6">http://dx.doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Electronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182642024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kő, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44159-7">http://dx.doi.org/10.1007/978-3-319-44159-7</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182702024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44341-6">http://dx.doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:183762024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46279-0">http://dx.doi.org/10.1007/978-3-319-46279-0</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:180892024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Bécue, Adrien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40385-4">http://dx.doi.org/10.1007/978-3-319-40385-4</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179412024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38898-4">http://dx.doi.org/10.1007/978-3-319-38898-4</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:184132024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Livraga, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47072-6">http://dx.doi.org/10.1007/978-3-319-47072-6</a><br/>Format: Electronic Resources<br/>Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applicationsent://SD_ILS/0/SD_ILS:182172024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Liu, Wen Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42644-0">http://dx.doi.org/10.1007/978-3-319-42644-0</a><br/>Format: Electronic Resources<br/>Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183312024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Buccafurri, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45507-5">http://dx.doi.org/10.1007/978-3-319-45507-5</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183372024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186622024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49890-3">http://dx.doi.org/10.1007/978-3-662-49890-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186632024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49896-5">http://dx.doi.org/10.1007/978-3-662-49896-5</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:182312024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43005-8">http://dx.doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Ethics in Computing A Concise Moduleent://SD_ILS/0/SD_ILS:173272024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29106-2">http://dx.doi.org/10.1007/978-3-319-29106-2</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:186872024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Clark, Jeremy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53357-4">http://dx.doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Watermarking Securityent://SD_ILS/0/SD_ILS:190352024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Bas, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0506-0">http://dx.doi.org/10.1007/978-981-10-0506-0</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:178682024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hoepman, Jaap-Henk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33630-5">http://dx.doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Elements of Cloud Computing Security A Survey of Key Practicalitiesent://SD_ILS/0/SD_ILS:181522024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Alani, Mohammed M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41411-9">http://dx.doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183592024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45931-8">http://dx.doi.org/10.1007/978-3-319-45931-8</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:182742024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Hartmann, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44403-1">http://dx.doi.org/10.1007/978-3-319-44403-1</a><br/>Format: Electronic Resources<br/>Digital Watermarking Techniques in Curvelet and Ridgelet Domainent://SD_ILS/0/SD_ILS:178072024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Rao, Channapragada Rama Seshagiri. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32951-2">http://dx.doi.org/10.1007/978-3-319-32951-2</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:180852024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40367-0">http://dx.doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:183442024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45741-3">http://dx.doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:183452024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45744-4">http://dx.doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Introduction to Cyberdeceptionent://SD_ILS/0/SD_ILS:181422024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Rowe, Neil C. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41187-3">http://dx.doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Mobile and Wireless Technologies 2016ent://SD_ILS/0/SD_ILS:191312024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1409-3">http://dx.doi.org/10.1007/978-981-10-1409-3</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186172024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49096-9">http://dx.doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>SOFSEM 2016: Theory and Practice of Computer Science 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186272024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Freivalds, Rūsiņš Mārtiņš. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49192-8">http://dx.doi.org/10.1007/978-3-662-49192-8</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182882024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Zikas, Vassilis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44618-9">http://dx.doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183242024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45381-1">http://dx.doi.org/10.1007/978-3-319-45381-1</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:182362024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Standaert, François-Xavier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43283-0">http://dx.doi.org/10.1007/978-3-319-43283-0</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186842024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53140-2">http://dx.doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:173332024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Pasalic, Enes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29172-7">http://dx.doi.org/10.1007/978-3-319-29172-7</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:191842024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Mueller, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2738-3">http://dx.doi.org/10.1007/978-981-10-2738-3</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:191852024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Batten, Lynn. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2741-3">http://dx.doi.org/10.1007/978-981-10-2741-3</a><br/>Format: Electronic Resources<br/>The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthdayent://SD_ILS/0/SD_ILS:186352024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Ryan, Peter Y. A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49301-4">http://dx.doi.org/10.1007/978-3-662-49301-4</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186382024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49384-7">http://dx.doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186392024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49387-8">http://dx.doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176942024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31960-5">http://dx.doi.org/10.1007/978-3-319-31960-5</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:176182024-05-05T12:42:31Z2024-05-05T12:42:31ZYazar Homma, Naofumi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31271-2">http://dx.doi.org/10.1007/978-3-319-31271-2</a><br/>Format: Electronic Resources<br/>