Search Results for - Narrowed by: 2015 - Electronic Book - Computer security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092015$0025092015$0026qf$003dITYPE$002509Materyal$002bT$0025C3$0025BCr$0025C3$0025BC$0025091$00253AE-BOOKS$002509Electronic$002bBook$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-05-29T08:06:53Z Secure Wireless Sensor Networks Threats and Solutions ent://SD_ILS/0/SD_ILS:19962 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Conti, Mauro. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3460-7">http://dx.doi.org/10.1007/978-1-4939-3460-7</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22386 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Mirkovic, Jelena. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15509-8">http://dx.doi.org/10.1007/978-3-319-15509-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:22323 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22692 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Lehmann, Anja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17470-9">http://dx.doi.org/10.1007/978-3-319-17470-9</a><br/>Format:&#160;Electronic Resources<br/> Game Theoretic Analysis of Congestion, Safety and Security Networks, Air Traffic and Emergency Departments ent://SD_ILS/0/SD_ILS:21998 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Hausken, Kjell. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13009-5">http://dx.doi.org/10.1007/978-3-319-13009-5</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Biometrics ent://SD_ILS/0/SD_ILS:19833 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Li, Stan Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4899-7488-4">http://dx.doi.org/10.1007/978-1-4899-7488-4</a><br/>Format:&#160;Electronic Resources<br/> Counterterrorism and Cybersecurity Total Information Awareness ent://SD_ILS/0/SD_ILS:22657 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Lee, Newton. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17244-6">http://dx.doi.org/10.1007/978-3-319-17244-6</a><br/>Format:&#160;Electronic Resources<br/> Applied cryptanalysis : breaking ciphers in the real world ent://SD_ILS/0/SD_ILS:14983 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Stamp, Mark. author.<br/>Abstract with links to resource <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXIX 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23076 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Samarati, Pierangela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20810-7">http://dx.doi.org/10.1007/978-3-319-20810-7</a><br/>Format:&#160;Electronic Resources<br/> Contemporary cryptology : the science of information integrity ent://SD_ILS/0/SD_ILS:15251 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Simmons, Gustavus J.<br/>Abstract with links to resource <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format:&#160;Electronic Resources<br/> Service Oriented and Cloud Computing 4th European Conference, ESOCC 2015, Taormina, Italy, September 15-17, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23333 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Dustdar, Schahram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24072-5">http://dx.doi.org/10.1007/978-3-319-24072-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XI 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23336 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24123-4">http://dx.doi.org/10.1007/978-3-319-24123-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23348 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Koornneef, Floor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24249-1">http://dx.doi.org/10.1007/978-3-319-24249-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23349 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Koornneef, Floor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24255-2">http://dx.doi.org/10.1007/978-3-319-24255-2</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23508 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26135-5">http://dx.doi.org/10.1007/978-3-319-26135-5</a><br/>Format:&#160;Electronic Resources<br/> On the Move to Meaningful Internet Systems: OTM 2015 Conferences Confederated International Conferences: CoopIS, ODBASE, and C&amp;TC 2015, Rhodes, Greece, October 26-30, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23511 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Debruyne, Christophe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26148-5">http://dx.doi.org/10.1007/978-3-319-26148-5</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23143 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21476-4">http://dx.doi.org/10.1007/978-3-319-21476-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24850 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48000-7">http://dx.doi.org/10.1007/978-3-662-48000-7</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24852 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Brenner, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48051-9">http://dx.doi.org/10.1007/978-3-662-48051-9</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:24772 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Internet Technologies Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24784 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Zhang, Shiyong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46826-5">http://dx.doi.org/10.1007/978-3-662-46826-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24887 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24735 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science and Ubiquitous Computing CSA &amp; CUTE ent://SD_ILS/0/SD_ILS:25835 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Park, Doo-Soon. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0281-6">http://dx.doi.org/10.1007/978-981-10-0281-6</a><br/>Format:&#160;Electronic Resources<br/> Handbook on Data Centers ent://SD_ILS/0/SD_ILS:19934 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Khan, Samee U. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-2092-1">http://dx.doi.org/10.1007/978-1-4939-2092-1</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23284 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format:&#160;Electronic Resources<br/> Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications ent://SD_ILS/0/SD_ILS:23285 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Lu, Zhou. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23288-1">http://dx.doi.org/10.1007/978-3-319-23288-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23286 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23318-5">http://dx.doi.org/10.1007/978-3-319-23318-5</a><br/>Format:&#160;Electronic Resources<br/> The Global Cyber-Vulnerability Report ent://SD_ILS/0/SD_ILS:23480 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Subrahmanian, V.S. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25760-0">http://dx.doi.org/10.1007/978-3-319-25760-0</a><br/>Format:&#160;Electronic Resources<br/> Quantum Computational Number Theory ent://SD_ILS/0/SD_ILS:23488 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23344 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format:&#160;Electronic Resources<br/> Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23609 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23614 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23194 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22908 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Doss, Robin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19210-9">http://dx.doi.org/10.1007/978-3-319-19210-9</a><br/>Format:&#160;Electronic Resources<br/> E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23202 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Haenni, Rolf. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22270-7">http://dx.doi.org/10.1007/978-3-319-22270-7</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and Privacy 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23445 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25360-2">http://dx.doi.org/10.1007/978-3-319-25360-2</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23546 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24857 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security X ent://SD_ILS/0/SD_ILS:24775 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24885 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Niu, Wenjia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48683-2">http://dx.doi.org/10.1007/978-3-662-48683-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24886 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24842 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;B&ouml;hme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47854-7">http://dx.doi.org/10.1007/978-3-662-47854-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24848 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47989-6">http://dx.doi.org/10.1007/978-3-662-47989-6</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23182 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format:&#160;Electronic Resources<br/> Building Secure Defenses Against Code-Reuse Attacks ent://SD_ILS/0/SD_ILS:23464 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Davi, Lucas. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25546-0">http://dx.doi.org/10.1007/978-3-319-25546-0</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23576 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format:&#160;Electronic Resources<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:23293 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23473-1">http://dx.doi.org/10.1007/978-3-319-23473-1</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23468 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Khouzani, MHR. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25594-1">http://dx.doi.org/10.1007/978-3-319-25594-1</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23471 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23399 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24837-0">http://dx.doi.org/10.1007/978-3-319-24837-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23400 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24858-5">http://dx.doi.org/10.1007/978-3-319-24858-5</a><br/>Format:&#160;Electronic Resources<br/> Digital Defense A Cybersecurity Primer ent://SD_ILS/0/SD_ILS:23003 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Pelton, Joseph. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19953-5">http://dx.doi.org/10.1007/978-3-319-19953-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23004 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Foo, Ernest. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19962-7">http://dx.doi.org/10.1007/978-3-319-19962-7</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Mechanisms for Network Configuration and Security 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23009 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Latr&eacute;, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20034-7">http://dx.doi.org/10.1007/978-3-319-20034-7</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23592 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27668-7">http://dx.doi.org/10.1007/978-3-319-27668-7</a><br/>Format:&#160;Electronic Resources<br/> Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23496 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23497 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25915-4">http://dx.doi.org/10.1007/978-3-319-25915-4</a><br/>Format:&#160;Electronic Resources<br/> Guide to Security Assurance for Cloud Computing ent://SD_ILS/0/SD_ILS:23502 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Zhu, Shao Ying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25988-8">http://dx.doi.org/10.1007/978-3-319-25988-8</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23504 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Au, Man-Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26059-4">http://dx.doi.org/10.1007/978-3-319-26059-4</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23505 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format:&#160;Electronic Resources<br/> Encrypted Email The History and Technology of Message Privacy ent://SD_ILS/0/SD_ILS:23128 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Orman, Hilarie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21344-6">http://dx.doi.org/10.1007/978-3-319-21344-6</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23129 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Ors, Berna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21356-9">http://dx.doi.org/10.1007/978-3-319-21356-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23213 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Tanaka, Keisuke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22425-1">http://dx.doi.org/10.1007/978-3-319-22425-1</a><br/>Format:&#160;Electronic Resources<br/> ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference ent://SD_ILS/0/SD_ILS:24374 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Reimer, Helmut. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-658-10934-9">http://dx.doi.org/10.1007/978-3-658-10934-9</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23248 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Fischer-H&uuml;bner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22906-5">http://dx.doi.org/10.1007/978-3-319-22906-5</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23249 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Abawajy, Jemal H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22915-7">http://dx.doi.org/10.1007/978-3-319-22915-7</a><br/>Format:&#160;Electronic Resources<br/> Understanding Network Hacks Attack and Defense with Python ent://SD_ILS/0/SD_ILS:24499 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Ballmann, Bastian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44437-5">http://dx.doi.org/10.1007/978-3-662-44437-5</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24743 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46494-6">http://dx.doi.org/10.1007/978-3-662-46494-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24744 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46497-7">http://dx.doi.org/10.1007/978-3-662-46497-7</a><br/>Format:&#160;Electronic Resources<br/> Reforming European Data Protection Law ent://SD_ILS/0/SD_ILS:25480 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Gutwirth, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-94-017-9385-8">http://dx.doi.org/10.1007/978-94-017-9385-8</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid Security ent://SD_ILS/0/SD_ILS:19566 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Goel, Sanjay. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6663-4">http://dx.doi.org/10.1007/978-1-4471-6663-4</a><br/>Format:&#160;Electronic Resources<br/> Game Theoretic Analysis of Congestion, Safety and Security Traffic and Transportation Theory ent://SD_ILS/0/SD_ILS:21760 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Hausken, Kjell. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11674-7">http://dx.doi.org/10.1007/978-3-319-11674-7</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florian&oacute;polis, Brazil, September 17&ndash;19, 2014 Revised Selected Papers ent://SD_ILS/0/SD_ILS:22533 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23554 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24779 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46800-5">http://dx.doi.org/10.1007/978-3-662-46800-5</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Computing and Services International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers ent://SD_ILS/0/SD_ILS:24825 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Yueming, Lu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47401-3">http://dx.doi.org/10.1007/978-3-662-47401-3</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:24846 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47974-2">http://dx.doi.org/10.1007/978-3-662-47974-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22706 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17533-1">http://dx.doi.org/10.1007/978-3-319-17533-1</a><br/>Format:&#160;Electronic Resources<br/> Detecting Peripheral-based Attacks on the Host Memory ent://SD_ILS/0/SD_ILS:22097 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Stewin, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13515-1">http://dx.doi.org/10.1007/978-3-319-13515-1</a><br/>Format:&#160;Electronic Resources<br/> Security Issues in Mobile NFC Devices ent://SD_ILS/0/SD_ILS:22383 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Roland, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15488-6">http://dx.doi.org/10.1007/978-3-319-15488-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22469 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Lee, Jooyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15943-0">http://dx.doi.org/10.1007/978-3-319-15943-0</a><br/>Format:&#160;Electronic Resources<br/> Cyber Warfare Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:22177 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format:&#160;Electronic Resources<br/> Violence in Nigeria Patterns and Trends ent://SD_ILS/0/SD_ILS:22303 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Taft, Patricia. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14935-6">http://dx.doi.org/10.1007/978-3-319-14935-6</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22310 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Natarajan, Raja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14977-6">http://dx.doi.org/10.1007/978-3-319-14977-6</a><br/>Format:&#160;Electronic Resources<br/> Aspect-Oriented Security Hardening of UML Design Models ent://SD_ILS/0/SD_ILS:22493 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Mouheb, Djedjiga. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16106-8">http://dx.doi.org/10.1007/978-3-319-16106-8</a><br/>Format:&#160;Electronic Resources<br/> Protecting Privacy in Data Release ent://SD_ILS/0/SD_ILS:22494 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Livraga, Giovanni. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16109-9">http://dx.doi.org/10.1007/978-3-319-16109-9</a><br/>Format:&#160;Electronic Resources<br/> Attribute-based Credentials for Trust Identity in the Information Society ent://SD_ILS/0/SD_ILS:22242 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Rannenberg, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14439-9">http://dx.doi.org/10.1007/978-3-319-14439-9</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:22623 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17016-9">http://dx.doi.org/10.1007/978-3-319-17016-9</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:22626 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17040-4">http://dx.doi.org/10.1007/978-3-319-17040-4</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23457 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;James, Joshua I. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25512-5">http://dx.doi.org/10.1007/978-3-319-25512-5</a><br/>Format:&#160;Electronic Resources<br/> E-Democracy &ndash; Citizen Rights in the World of the New Computing Paradigms 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23570 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27164-4">http://dx.doi.org/10.1007/978-3-319-27164-4</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23571 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Bica, Ion. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27179-8">http://dx.doi.org/10.1007/978-3-319-27179-8</a><br/>Format:&#160;Electronic Resources<br/> Cyber-Risk Management ent://SD_ILS/0/SD_ILS:23302 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Refsdal, Atle. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23570-7">http://dx.doi.org/10.1007/978-3-319-23570-7</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy for Mobile Healthcare Networks ent://SD_ILS/0/SD_ILS:23391 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Zhang, Kuan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24717-5">http://dx.doi.org/10.1007/978-3-319-24717-5</a><br/>Format:&#160;Electronic Resources<br/> Mobile, Secure, and Programmable Networking First International Conference, MSPN 2015, Paris, France, June 15-17, 2015, Selected Papers ent://SD_ILS/0/SD_ILS:23476 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Boumerdassi, Selma. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25744-0">http://dx.doi.org/10.1007/978-3-319-25744-0</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing for Embedded Systems ent://SD_ILS/0/SD_ILS:21333 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Candaele, Bernard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09420-5">http://dx.doi.org/10.1007/978-3-319-09420-5</a><br/>Format:&#160;Electronic Resources<br/> Leakage Resilient Password Systems ent://SD_ILS/0/SD_ILS:22699 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format:&#160;Electronic Resources<br/> Self- and Co-regulation in Cybercrime, Cybersecurity and National Security ent://SD_ILS/0/SD_ILS:22550 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Tropina, Tatiana. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16447-2">http://dx.doi.org/10.1007/978-3-319-16447-2</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security: Analytics, Technology and Automation ent://SD_ILS/0/SD_ILS:22807 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Lehto, Martti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18302-2">http://dx.doi.org/10.1007/978-3-319-18302-2</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22640 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17127-2">http://dx.doi.org/10.1007/978-3-319-17127-2</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23568 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27152-1">http://dx.doi.org/10.1007/978-3-319-27152-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23327 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Akram, Raja Naeem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24018-3">http://dx.doi.org/10.1007/978-3-319-24018-3</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity in Israel ent://SD_ILS/0/SD_ILS:22878 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Tabansky, Lior. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18986-4">http://dx.doi.org/10.1007/978-3-319-18986-4</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23337 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:23342 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:23343 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23419 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Mitton, Nathalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25067-0">http://dx.doi.org/10.1007/978-3-319-25067-0</a><br/>Format:&#160;Electronic Resources<br/> Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense ent://SD_ILS/0/SD_ILS:23424 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Heckman, Kristin E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25133-2">http://dx.doi.org/10.1007/978-3-319-25133-2</a><br/>Format:&#160;Electronic Resources<br/> Interactive Theorem Proving 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23192 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Urban, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22102-1">http://dx.doi.org/10.1007/978-3-319-22102-1</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Communications, Services and Security 8th International Conference, MCSS 2015, Krak&oacute;w, Poland, November 24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23522 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Dziech, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26404-2">http://dx.doi.org/10.1007/978-3-319-26404-2</a><br/>Format:&#160;Electronic Resources<br/> Risk Assessment and Risk-Driven Testing Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23524 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Seehusen, Fredrik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26416-5">http://dx.doi.org/10.1007/978-3-319-26416-5</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19&ndash;21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23530 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Buchegger, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26502-5">http://dx.doi.org/10.1007/978-3-319-26502-5</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection IX 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23538 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Rice, Mason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26567-4">http://dx.doi.org/10.1007/978-3-319-26567-4</a><br/>Format:&#160;Electronic Resources<br/> Advanced Information Systems Engineering Workshops CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22913 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Persson, Anne. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19243-7">http://dx.doi.org/10.1007/978-3-319-19243-7</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:22924 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23626 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Thuraisingham, Bhavani. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28865-9">http://dx.doi.org/10.1007/978-3-319-28865-9</a><br/>Format:&#160;Electronic Resources<br/> Security Planning An Applied Approach ent://SD_ILS/0/SD_ILS:22481 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Lincke, Susan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16027-6">http://dx.doi.org/10.1007/978-3-319-16027-6</a><br/>Format:&#160;Electronic Resources<br/> Pattern and Security Requirements Engineering-Based Establishment of Security Standards ent://SD_ILS/0/SD_ILS:22585 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Beckers, Kristian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16664-3">http://dx.doi.org/10.1007/978-3-319-16664-3</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash;- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22590 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22592 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16745-9">http://dx.doi.org/10.1007/978-3-319-16745-9</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:22594 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Joye, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16763-3">http://dx.doi.org/10.1007/978-3-319-16763-3</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22819 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18455-5">http://dx.doi.org/10.1007/978-3-319-18455-5</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22822 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format:&#160;Electronic Resources<br/> Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22829 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Damsgaard Jensen, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18491-3">http://dx.doi.org/10.1007/978-3-319-18491-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22830 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18500-2">http://dx.doi.org/10.1007/978-3-319-18500-2</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23158 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Pelc, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21741-3">http://dx.doi.org/10.1007/978-3-319-21741-3</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23057 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Almgren, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20550-2">http://dx.doi.org/10.1007/978-3-319-20550-2</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22540 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Eisenbarth, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16363-5">http://dx.doi.org/10.1007/978-3-319-16363-5</a><br/>Format:&#160;Electronic Resources<br/> Information and Communication Technology Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23360 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Khalil, Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24315-3">http://dx.doi.org/10.1007/978-3-319-24315-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management for the Future Internet in the Age of Globalisation 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22842 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18621-4">http://dx.doi.org/10.1007/978-3-319-18621-4</a><br/>Format:&#160;Electronic Resources<br/> Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger ent://SD_ILS/0/SD_ILS:22845 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;El Hajji, Said. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18681-8">http://dx.doi.org/10.1007/978-3-319-18681-8</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 8th International Conference, IDCS 2015, Windsor, UK, September 2-4, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23280 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Di Fatta, Giuseppe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23237-9">http://dx.doi.org/10.1007/978-3-319-23237-9</a><br/>Format:&#160;Electronic Resources<br/> Evolution of Cyber Technologies and Operations to 2035 ent://SD_ILS/0/SD_ILS:23303 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Blowers, Misty. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23585-1">http://dx.doi.org/10.1007/978-3-319-23585-1</a><br/>Format:&#160;Electronic Resources<br/> Medical Data Privacy Handbook ent://SD_ILS/0/SD_ILS:23304 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Gkoulalas-Divanis, Aris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23633-9">http://dx.doi.org/10.1007/978-3-319-23633-9</a><br/>Format:&#160;Electronic Resources<br/> International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:23313 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Tian, Jing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23802-9">http://dx.doi.org/10.1007/978-3-319-23802-9</a><br/>Format:&#160;Electronic Resources<br/> International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:23316 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Tian, Jing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23829-6">http://dx.doi.org/10.1007/978-3-319-23829-6</a><br/>Format:&#160;Electronic Resources<br/> Internet of Vehicles - Safe and Intelligent Mobility Second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23580 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Hsu, Ching-Hsien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27293-1">http://dx.doi.org/10.1007/978-3-319-27293-1</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23520 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Bos, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26362-5">http://dx.doi.org/10.1007/978-3-319-26362-5</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- INDOCRYPT 2015 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23540 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26617-6">http://dx.doi.org/10.1007/978-3-319-26617-6</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23238 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24765 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24780 2024-05-29T08:06:53Z 2024-05-29T08:06:53Z Yazar&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46803-6">http://dx.doi.org/10.1007/978-3-662-46803-6</a><br/>Format:&#160;Electronic Resources<br/>