Search Results for - Narrowed by: 2015 - Electronic Book - Computer security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092015$0025092015$0026qf$003dITYPE$002509Materyal$002bT$0025C3$0025BCr$0025C3$0025BC$0025091$00253AE-BOOKS$002509Electronic$002bBook$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-05-29T08:06:53ZSecure Wireless Sensor Networks Threats and Solutionsent://SD_ILS/0/SD_ILS:199622024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Conti, Mauro. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3460-7">http://dx.doi.org/10.1007/978-1-4939-3460-7</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedingsent://SD_ILS/0/SD_ILS:223862024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Mirkovic, Jelena. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15509-8">http://dx.doi.org/10.1007/978-3-319-15509-8</a><br/>Format: Electronic Resources<br/>Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:223232024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedingsent://SD_ILS/0/SD_ILS:226922024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Lehmann, Anja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17470-9">http://dx.doi.org/10.1007/978-3-319-17470-9</a><br/>Format: Electronic Resources<br/>Game Theoretic Analysis of Congestion, Safety and Security Networks, Air Traffic and Emergency Departmentsent://SD_ILS/0/SD_ILS:219982024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Hausken, Kjell. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13009-5">http://dx.doi.org/10.1007/978-3-319-13009-5</a><br/>Format: Electronic Resources<br/>Encyclopedia of Biometricsent://SD_ILS/0/SD_ILS:198332024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Li, Stan Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4899-7488-4">http://dx.doi.org/10.1007/978-1-4899-7488-4</a><br/>Format: Electronic Resources<br/>Counterterrorism and Cybersecurity Total Information Awarenessent://SD_ILS/0/SD_ILS:226572024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Lee, Newton. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17244-6">http://dx.doi.org/10.1007/978-3-319-17244-6</a><br/>Format: Electronic Resources<br/>Applied cryptanalysis : breaking ciphers in the real worldent://SD_ILS/0/SD_ILS:149832024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Stamp, Mark. author.<br/>Abstract with links to resource <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXIX 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedingsent://SD_ILS/0/SD_ILS:230762024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Samarati, Pierangela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20810-7">http://dx.doi.org/10.1007/978-3-319-20810-7</a><br/>Format: Electronic Resources<br/>Contemporary cryptology : the science of information integrityent://SD_ILS/0/SD_ILS:152512024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Simmons, Gustavus J.<br/>Abstract with links to resource <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format: Electronic Resources<br/>Service Oriented and Cloud Computing 4th European Conference, ESOCC 2015, Taormina, Italy, September 15-17, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233332024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Dustdar, Schahram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24072-5">http://dx.doi.org/10.1007/978-3-319-24072-5</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XI 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:233362024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24123-4">http://dx.doi.org/10.1007/978-3-319-24123-4</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233482024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Koornneef, Floor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24249-1">http://dx.doi.org/10.1007/978-3-319-24249-1</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233492024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Koornneef, Floor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24255-2">http://dx.doi.org/10.1007/978-3-319-24255-2</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235082024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26135-5">http://dx.doi.org/10.1007/978-3-319-26135-5</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2015 Conferences Confederated International Conferences: CoopIS, ODBASE, and C&TC 2015, Rhodes, Greece, October 26-30, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235112024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Debruyne, Christophe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26148-5">http://dx.doi.org/10.1007/978-3-319-26148-5</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:231432024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21476-4">http://dx.doi.org/10.1007/978-3-319-21476-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:248502024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48000-7">http://dx.doi.org/10.1007/978-3-662-48000-7</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248522024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Brenner, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48051-9">http://dx.doi.org/10.1007/978-3-662-48051-9</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:247722024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format: Electronic Resources<br/>Frontiers in Internet Technologies Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:247842024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Zhang, Shiyong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46826-5">http://dx.doi.org/10.1007/978-3-662-46826-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:248872024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247352024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format: Electronic Resources<br/>Advances in Computer Science and Ubiquitous Computing CSA & CUTEent://SD_ILS/0/SD_ILS:258352024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Park, Doo-Soon. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0281-6">http://dx.doi.org/10.1007/978-981-10-0281-6</a><br/>Format: Electronic Resources<br/>Handbook on Data Centersent://SD_ILS/0/SD_ILS:199342024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Khan, Samee U. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-2092-1">http://dx.doi.org/10.1007/978-1-4939-2092-1</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232842024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format: Electronic Resources<br/>Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applicationsent://SD_ILS/0/SD_ILS:232852024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Lu, Zhou. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23288-1">http://dx.doi.org/10.1007/978-3-319-23288-1</a><br/>Format: Electronic Resources<br/>Information Security 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232862024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23318-5">http://dx.doi.org/10.1007/978-3-319-23318-5</a><br/>Format: Electronic Resources<br/>The Global Cyber-Vulnerability Reportent://SD_ILS/0/SD_ILS:234802024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Subrahmanian, V.S. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25760-0">http://dx.doi.org/10.1007/978-3-319-25760-0</a><br/>Format: Electronic Resources<br/>Quantum Computational Number Theoryent://SD_ILS/0/SD_ILS:234882024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:233442024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format: Electronic Resources<br/>Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:236092024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236142024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231942024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedingsent://SD_ILS/0/SD_ILS:229082024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Doss, Robin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19210-9">http://dx.doi.org/10.1007/978-3-319-19210-9</a><br/>Format: Electronic Resources<br/>E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232022024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Haenni, Rolf. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22270-7">http://dx.doi.org/10.1007/978-3-319-22270-7</a><br/>Format: Electronic Resources<br/>Cyber Security and Privacy 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:234452024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25360-2">http://dx.doi.org/10.1007/978-3-319-25360-2</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235462024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248572024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security Xent://SD_ILS/0/SD_ILS:247752024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedingsent://SD_ILS/0/SD_ILS:248852024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Niu, Wenjia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48683-2">http://dx.doi.org/10.1007/978-3-662-48683-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:248862024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248422024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Böhme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47854-7">http://dx.doi.org/10.1007/978-3-662-47854-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:248482024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Gennaro, Rosario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47989-6">http://dx.doi.org/10.1007/978-3-662-47989-6</a><br/>Format: Electronic Resources<br/>Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:231822024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format: Electronic Resources<br/>Building Secure Defenses Against Code-Reuse Attacksent://SD_ILS/0/SD_ILS:234642024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Davi, Lucas. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25546-0">http://dx.doi.org/10.1007/978-3-319-25546-0</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235762024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format: Electronic Resources<br/>Visual Cryptography for Image Processing and Security Theory, Methods, and Applicationsent://SD_ILS/0/SD_ILS:232932024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23473-1">http://dx.doi.org/10.1007/978-3-319-23473-1</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234682024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Khouzani, MHR. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25594-1">http://dx.doi.org/10.1007/978-3-319-25594-1</a><br/>Format: Electronic Resources<br/>Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234712024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:233992024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24837-0">http://dx.doi.org/10.1007/978-3-319-24837-0</a><br/>Format: Electronic Resources<br/>Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234002024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24858-5">http://dx.doi.org/10.1007/978-3-319-24858-5</a><br/>Format: Electronic Resources<br/>Digital Defense A Cybersecurity Primerent://SD_ILS/0/SD_ILS:230032024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Pelton, Joseph. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19953-5">http://dx.doi.org/10.1007/978-3-319-19953-5</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:230042024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Foo, Ernest. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19962-7">http://dx.doi.org/10.1007/978-3-319-19962-7</a><br/>Format: Electronic Resources<br/>Intelligent Mechanisms for Network Configuration and Security 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedingsent://SD_ILS/0/SD_ILS:230092024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Latré, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20034-7">http://dx.doi.org/10.1007/978-3-319-20034-7</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235922024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27668-7">http://dx.doi.org/10.1007/978-3-319-27668-7</a><br/>Format: Electronic Resources<br/>Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedingsent://SD_ILS/0/SD_ILS:234962024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:234972024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25915-4">http://dx.doi.org/10.1007/978-3-319-25915-4</a><br/>Format: Electronic Resources<br/>Guide to Security Assurance for Cloud Computingent://SD_ILS/0/SD_ILS:235022024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Zhu, Shao Ying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25988-8">http://dx.doi.org/10.1007/978-3-319-25988-8</a><br/>Format: Electronic Resources<br/>Provable Security 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235042024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Au, Man-Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26059-4">http://dx.doi.org/10.1007/978-3-319-26059-4</a><br/>Format: Electronic Resources<br/>Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235052024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format: Electronic Resources<br/>Encrypted Email The History and Technology of Message Privacyent://SD_ILS/0/SD_ILS:231282024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Orman, Hilarie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21344-6">http://dx.doi.org/10.1007/978-3-319-21344-6</a><br/>Format: Electronic Resources<br/>Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:231292024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Ors, Berna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21356-9">http://dx.doi.org/10.1007/978-3-319-21356-9</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232132024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Tanaka, Keisuke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22425-1">http://dx.doi.org/10.1007/978-3-319-22425-1</a><br/>Format: Electronic Resources<br/>ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conferenceent://SD_ILS/0/SD_ILS:243742024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Reimer, Helmut. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-658-10934-9">http://dx.doi.org/10.1007/978-3-658-10934-9</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232482024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Fischer-Hübner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22906-5">http://dx.doi.org/10.1007/978-3-319-22906-5</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232492024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Abawajy, Jemal H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22915-7">http://dx.doi.org/10.1007/978-3-319-22915-7</a><br/>Format: Electronic Resources<br/>Understanding Network Hacks Attack and Defense with Pythonent://SD_ILS/0/SD_ILS:244992024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Ballmann, Bastian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44437-5">http://dx.doi.org/10.1007/978-3-662-44437-5</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:247432024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46494-6">http://dx.doi.org/10.1007/978-3-662-46494-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:247442024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46497-7">http://dx.doi.org/10.1007/978-3-662-46497-7</a><br/>Format: Electronic Resources<br/>Reforming European Data Protection Lawent://SD_ILS/0/SD_ILS:254802024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Gutwirth, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-94-017-9385-8">http://dx.doi.org/10.1007/978-94-017-9385-8</a><br/>Format: Electronic Resources<br/>Smart Grid Securityent://SD_ILS/0/SD_ILS:195662024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Goel, Sanjay. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6663-4">http://dx.doi.org/10.1007/978-1-4471-6663-4</a><br/>Format: Electronic Resources<br/>Game Theoretic Analysis of Congestion, Safety and Security Traffic and Transportation Theoryent://SD_ILS/0/SD_ILS:217602024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Hausken, Kjell. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11674-7">http://dx.doi.org/10.1007/978-3-319-11674-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papersent://SD_ILS/0/SD_ILS:225332024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format: Electronic Resources<br/>Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235542024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:247792024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46800-5">http://dx.doi.org/10.1007/978-3-662-46800-5</a><br/>Format: Electronic Resources<br/>Trustworthy Computing and Services International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papersent://SD_ILS/0/SD_ILS:248252024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Yueming, Lu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47401-3">http://dx.doi.org/10.1007/978-3-662-47401-3</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:248462024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47974-2">http://dx.doi.org/10.1007/978-3-662-47974-2</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedingsent://SD_ILS/0/SD_ILS:227062024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17533-1">http://dx.doi.org/10.1007/978-3-319-17533-1</a><br/>Format: Electronic Resources<br/>Detecting Peripheral-based Attacks on the Host Memoryent://SD_ILS/0/SD_ILS:220972024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Stewin, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13515-1">http://dx.doi.org/10.1007/978-3-319-13515-1</a><br/>Format: Electronic Resources<br/>Security Issues in Mobile NFC Devicesent://SD_ILS/0/SD_ILS:223832024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Roland, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15488-6">http://dx.doi.org/10.1007/978-3-319-15488-6</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:224692024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Lee, Jooyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15943-0">http://dx.doi.org/10.1007/978-3-319-15943-0</a><br/>Format: Electronic Resources<br/>Cyber Warfare Building the Scientific Foundationent://SD_ILS/0/SD_ILS:221772024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format: Electronic Resources<br/>Violence in Nigeria Patterns and Trendsent://SD_ILS/0/SD_ILS:223032024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Taft, Patricia. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14935-6">http://dx.doi.org/10.1007/978-3-319-14935-6</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedingsent://SD_ILS/0/SD_ILS:223102024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Natarajan, Raja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14977-6">http://dx.doi.org/10.1007/978-3-319-14977-6</a><br/>Format: Electronic Resources<br/>Aspect-Oriented Security Hardening of UML Design Modelsent://SD_ILS/0/SD_ILS:224932024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Mouheb, Djedjiga. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16106-8">http://dx.doi.org/10.1007/978-3-319-16106-8</a><br/>Format: Electronic Resources<br/>Protecting Privacy in Data Releaseent://SD_ILS/0/SD_ILS:224942024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Livraga, Giovanni. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16109-9">http://dx.doi.org/10.1007/978-3-319-16109-9</a><br/>Format: Electronic Resources<br/>Attribute-based Credentials for Trust Identity in the Information Societyent://SD_ILS/0/SD_ILS:222422024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Rannenberg, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14439-9">http://dx.doi.org/10.1007/978-3-319-14439-9</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:226232024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17016-9">http://dx.doi.org/10.1007/978-3-319-17016-9</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:226262024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Cuppens, Frédéric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17040-4">http://dx.doi.org/10.1007/978-3-319-17040-4</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:234572024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar James, Joshua I. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25512-5">http://dx.doi.org/10.1007/978-3-319-25512-5</a><br/>Format: Electronic Resources<br/>E-Democracy – Citizen Rights in the World of the New Computing Paradigms 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235702024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27164-4">http://dx.doi.org/10.1007/978-3-319-27164-4</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:235712024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Bica, Ion. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27179-8">http://dx.doi.org/10.1007/978-3-319-27179-8</a><br/>Format: Electronic Resources<br/>Cyber-Risk Managementent://SD_ILS/0/SD_ILS:233022024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Refsdal, Atle. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23570-7">http://dx.doi.org/10.1007/978-3-319-23570-7</a><br/>Format: Electronic Resources<br/>Security and Privacy for Mobile Healthcare Networksent://SD_ILS/0/SD_ILS:233912024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Zhang, Kuan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24717-5">http://dx.doi.org/10.1007/978-3-319-24717-5</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking First International Conference, MSPN 2015, Paris, France, June 15-17, 2015, Selected Papersent://SD_ILS/0/SD_ILS:234762024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Boumerdassi, Selma. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25744-0">http://dx.doi.org/10.1007/978-3-319-25744-0</a><br/>Format: Electronic Resources<br/>Trusted Computing for Embedded Systemsent://SD_ILS/0/SD_ILS:213332024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Candaele, Bernard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09420-5">http://dx.doi.org/10.1007/978-3-319-09420-5</a><br/>Format: Electronic Resources<br/>Leakage Resilient Password Systemsent://SD_ILS/0/SD_ILS:226992024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format: Electronic Resources<br/>Self- and Co-regulation in Cybercrime, Cybersecurity and National Securityent://SD_ILS/0/SD_ILS:225502024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Tropina, Tatiana. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16447-2">http://dx.doi.org/10.1007/978-3-319-16447-2</a><br/>Format: Electronic Resources<br/>Cyber Security: Analytics, Technology and Automationent://SD_ILS/0/SD_ILS:228072024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Lehto, Martti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18302-2">http://dx.doi.org/10.1007/978-3-319-18302-2</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:226402024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17127-2">http://dx.doi.org/10.1007/978-3-319-17127-2</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235682024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27152-1">http://dx.doi.org/10.1007/978-3-319-27152-1</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedingsent://SD_ILS/0/SD_ILS:233272024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Akram, Raja Naeem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24018-3">http://dx.doi.org/10.1007/978-3-319-24018-3</a><br/>Format: Electronic Resources<br/>Cybersecurity in Israelent://SD_ILS/0/SD_ILS:228782024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Tabansky, Lior. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18986-4">http://dx.doi.org/10.1007/978-3-319-18986-4</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233372024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:233422024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:233432024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedingsent://SD_ILS/0/SD_ILS:234192024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Mitton, Nathalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25067-0">http://dx.doi.org/10.1007/978-3-319-25067-0</a><br/>Format: Electronic Resources<br/>Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defenseent://SD_ILS/0/SD_ILS:234242024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Heckman, Kristin E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25133-2">http://dx.doi.org/10.1007/978-3-319-25133-2</a><br/>Format: Electronic Resources<br/>Interactive Theorem Proving 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231922024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Urban, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22102-1">http://dx.doi.org/10.1007/978-3-319-22102-1</a><br/>Format: Electronic Resources<br/>Multimedia Communications, Services and Security 8th International Conference, MCSS 2015, Kraków, Poland, November 24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235222024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Dziech, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26404-2">http://dx.doi.org/10.1007/978-3-319-26404-2</a><br/>Format: Electronic Resources<br/>Risk Assessment and Risk-Driven Testing Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:235242024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Seehusen, Fredrik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26416-5">http://dx.doi.org/10.1007/978-3-319-26416-5</a><br/>Format: Electronic Resources<br/>Secure IT Systems 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19–21, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235302024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Buchegger, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26502-5">http://dx.doi.org/10.1007/978-3-319-26502-5</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IX 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235382024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Rice, Mason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26567-4">http://dx.doi.org/10.1007/978-3-319-26567-4</a><br/>Format: Electronic Resources<br/>Advanced Information Systems Engineering Workshops CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:229132024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Persson, Anne. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19243-7">http://dx.doi.org/10.1007/978-3-319-19243-7</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:229242024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236262024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Thuraisingham, Bhavani. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28865-9">http://dx.doi.org/10.1007/978-3-319-28865-9</a><br/>Format: Electronic Resources<br/>Security Planning An Applied Approachent://SD_ILS/0/SD_ILS:224812024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Lincke, Susan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16027-6">http://dx.doi.org/10.1007/978-3-319-16027-6</a><br/>Format: Electronic Resources<br/>Pattern and Security Requirements Engineering-Based Establishment of Security Standardsent://SD_ILS/0/SD_ILS:225852024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Beckers, Kristian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16664-3">http://dx.doi.org/10.1007/978-3-319-16664-3</a><br/>Format: Electronic Resources<br/>Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:225902024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:225922024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16745-9">http://dx.doi.org/10.1007/978-3-319-16745-9</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:225942024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Joye, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16763-3">http://dx.doi.org/10.1007/978-3-319-16763-3</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedingsent://SD_ILS/0/SD_ILS:228192024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18455-5">http://dx.doi.org/10.1007/978-3-319-18455-5</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228222024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format: Electronic Resources<br/>Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228292024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Damsgaard Jensen, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18491-3">http://dx.doi.org/10.1007/978-3-319-18491-3</a><br/>Format: Electronic Resources<br/>Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228302024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18500-2">http://dx.doi.org/10.1007/978-3-319-18500-2</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231582024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Pelc, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21741-3">http://dx.doi.org/10.1007/978-3-319-21741-3</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedingsent://SD_ILS/0/SD_ILS:230572024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Almgren, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20550-2">http://dx.doi.org/10.1007/978-3-319-20550-2</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:225402024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Eisenbarth, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16363-5">http://dx.doi.org/10.1007/978-3-319-16363-5</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233602024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Khalil, Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24315-3">http://dx.doi.org/10.1007/978-3-319-24315-3</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management for the Future Internet in the Age of Globalisation 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:228422024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18621-4">http://dx.doi.org/10.1007/978-3-319-18621-4</a><br/>Format: Electronic Resources<br/>Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Bergerent://SD_ILS/0/SD_ILS:228452024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar El Hajji, Said. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18681-8">http://dx.doi.org/10.1007/978-3-319-18681-8</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 8th International Conference, IDCS 2015, Windsor, UK, September 2-4, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232802024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Di Fatta, Giuseppe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23237-9">http://dx.doi.org/10.1007/978-3-319-23237-9</a><br/>Format: Electronic Resources<br/>Evolution of Cyber Technologies and Operations to 2035ent://SD_ILS/0/SD_ILS:233032024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Blowers, Misty. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23585-1">http://dx.doi.org/10.1007/978-3-319-23585-1</a><br/>Format: Electronic Resources<br/>Medical Data Privacy Handbookent://SD_ILS/0/SD_ILS:233042024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Gkoulalas-Divanis, Aris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23633-9">http://dx.doi.org/10.1007/978-3-319-23633-9</a><br/>Format: Electronic Resources<br/>International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:233132024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Tian, Jing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23802-9">http://dx.doi.org/10.1007/978-3-319-23802-9</a><br/>Format: Electronic Resources<br/>International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:233162024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Tian, Jing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23829-6">http://dx.doi.org/10.1007/978-3-319-23829-6</a><br/>Format: Electronic Resources<br/>Internet of Vehicles - Safe and Intelligent Mobility Second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235802024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Hsu, Ching-Hsien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27293-1">http://dx.doi.org/10.1007/978-3-319-27293-1</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235202024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Bos, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26362-5">http://dx.doi.org/10.1007/978-3-319-26362-5</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- INDOCRYPT 2015 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235402024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26617-6">http://dx.doi.org/10.1007/978-3-319-26617-6</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232382024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247652024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:247802024-05-29T08:06:53Z2024-05-29T08:06:53ZYazar Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46803-6">http://dx.doi.org/10.1007/978-3-662-46803-6</a><br/>Format: Electronic Resources<br/>