Search Results for - Narrowed by: Computer communication systems. - Computer security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bcommunication$002bsystems.$002509Computer$002bcommunication$002bsystems.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2024-09-23T21:19:44ZE-Business and Telecommunications 15th International Joint Conference, ICETE 2018, Porto, Portugal, July 26–28, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4280022024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34866-3">https://doi.org/10.1007/978-3-030-34866-3</a><br/>Format: Electronic Resources<br/>Science of Cyber Security Second International Conference, SciSec 2019, Nanjing, China, August 9–11, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4278372024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34637-9">https://doi.org/10.1007/978-3-030-34637-9</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280222024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944<br/><a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Electronic Resources<br/>Algebra, Codes and Cryptology First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280372024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Gueye, Cheikh Thiecoumba. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36237-9">https://doi.org/10.1007/978-3-030-36237-9</a><br/>Format: Electronic Resources<br/>Recent Trends in Image Processing and Pattern Recognition Second International Conference, RTIP2R 2018, Solapur, India, December 21–22, 2018, Revised Selected Papers, Part IIIent://SD_ILS/0/SD_ILS:4278722024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Santosh, K. C. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9187-3">https://doi.org/10.1007/978-981-13-9187-3</a><br/>Format: Electronic Resources<br/>Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4278942024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9942-8">https://doi.org/10.1007/978-981-13-9942-8</a><br/>Format: Electronic Resources<br/>Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285132024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Lin, Zhiqiang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Computer Vision – ECCV 2018 Workshops Munich, Germany, September 8-14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4281802024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Leal-Taixé, Laura. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11012-3">https://doi.org/10.1007/978-3-030-11012-3</a><br/>Format: Electronic Resources<br/>Security and Privacy in New Computing Environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279812024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Li, Jin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-21373-2">https://doi.org/10.1007/978-3-030-21373-2</a><br/>Format: Electronic Resources<br/>Security, Privacy and Trust in the IoT Environmentent://SD_ILS/0/SD_ILS:4286262024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-030-18075-1">https://doi.org/10.1007/978-3-030-18075-1</a><br/>Format: Electronic Resources<br/>Emerging Technologies in Computing Second International Conference, iCETiC 2019, London, UK, August 19–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285552024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Miraz, Mahdi H. editor. (orcid)0000-0002-6795-7048<br/><a href="https://doi.org/10.1007/978-3-030-23943-5">https://doi.org/10.1007/978-3-030-23943-5</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XLIIent://SD_ILS/0/SD_ILS:4285832024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-60531-8">https://doi.org/10.1007/978-3-662-60531-8</a><br/>Format: Electronic Resources<br/>Computer Networks 26th International Conference, CN 2019, Kamień Śląski, Poland, June 25–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291342024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Gaj, Piotr. editor. (orcid)0000-0002-2291-7341<br/><a href="https://doi.org/10.1007/978-3-030-21952-9">https://doi.org/10.1007/978-3-030-21952-9</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4291402024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24274-9">https://doi.org/10.1007/978-3-030-24274-9</a><br/>Format: Electronic Resources<br/>Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277382024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Zhang, Huanguo. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paperent://SD_ILS/0/SD_ILS:4284002024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11039-0">https://doi.org/10.1007/978-3-030-11039-0</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281292024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751<br/><a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4284142024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Blazy, Olivier. editor. (orcid)0000-0001-6205-8249<br/><a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Electronic Resources<br/>Introduction to Intelligent Surveillance Surveillance Data Capture, Transmission, and Analyticsent://SD_ILS/0/SD_ILS:4282402024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Yan, Wei Qi. author.<br/><a href="https://doi.org/10.1007/978-3-030-10713-0">https://doi.org/10.1007/978-3-030-10713-0</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4290232024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4290242024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format: Electronic Resources<br/>Green, Pervasive, and Cloud Computing 14th International Conference, GPC 2019, Uberlândia, Brazil, May 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288542024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Miani, Rodrigo. editor. (orcid)0000-0002-8176-8040<br/><a href="https://doi.org/10.1007/978-3-030-19223-5">https://doi.org/10.1007/978-3-030-19223-5</a><br/>Format: Electronic Resources<br/>Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288562024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Shen, Bazhong. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format: Electronic Resources<br/>Communication Technologies for Vehicles 14th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2019, Colmar, France, May 16–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4290302024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Hilt, Benoît. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25529-9">https://doi.org/10.1007/978-3-030-25529-9</a><br/>Format: Electronic Resources<br/>Computer Vision – ECCV 2018 Workshops Munich, Germany, September 8-14, 2018, Proceedings, Part Vent://SD_ILS/0/SD_ILS:4292012024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Leal-Taixé, Laura. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11021-5">https://doi.org/10.1007/978-3-030-11021-5</a><br/>Format: Electronic Resources<br/>Mobile Web and Intelligent Information Systems 16th International Conference, MobiWIS 2019, Istanbul, Turkey, August 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276822024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Awan, Irfan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27192-3">https://doi.org/10.1007/978-3-030-27192-3</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23–24, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4276912024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Renault, Éric. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22885-9">https://doi.org/10.1007/978-3-030-22885-9</a><br/>Format: Electronic Resources<br/>Trust Management XIII 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4277562024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-3-030-33716-2">https://doi.org/10.1007/978-3-030-33716-2</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 15th International Conference, ICDCIT 2019, Bhubaneswar, India, January 10–13, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4277582024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Fahrnberger, Günter. editor. (orcid)0000-0002-2606-3988<br/><a href="https://doi.org/10.1007/978-3-030-05366-6">https://doi.org/10.1007/978-3-030-05366-6</a><br/>Format: Electronic Resources<br/>Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277612024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Hamid, Brahim. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282072024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format: Electronic Resources<br/>Dependability in Sensor, Cloud, and Big Data Systems and Applications 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282162024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-981-15-1304-6">https://doi.org/10.1007/978-981-15-1304-6</a><br/>Format: Electronic Resources<br/>High-Performance Computing Applications in Numerical Simulation and Edge Computing ACM ICS 2018 International Workshops, HPCMS and HiDEC, Beijing, China, June 12, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282342024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Hu, Changjun. editor.<br/><a href="https://doi.org/10.1007/978-981-32-9987-0">https://doi.org/10.1007/978-981-32-9987-0</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4281702024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Thampi, Sabu M. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5826-5">https://doi.org/10.1007/978-981-13-5826-5</a><br/>Format: Electronic Resources<br/>Biomedical Engineering Systems and Technologies 11th International Joint Conference, BIOSTEC 2018, Funchal, Madeira, Portugal, January 19–21, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4281732024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Cliquet Jr., Alberto. editor.<br/><a href="https://doi.org/10.1007/978-3-030-29196-9">https://doi.org/10.1007/978-3-030-29196-9</a><br/>Format: Electronic Resources<br/>Computer Analysis of Images and Patterns 18th International Conference, CAIP 2019, Salerno, Italy, September 3–5, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4281962024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Vento, Mario. editor. (orcid)0000-0002-2948-741X<br/><a href="https://doi.org/10.1007/978-3-030-29891-3">https://doi.org/10.1007/978-3-030-29891-3</a><br/>Format: Electronic Resources<br/>Intelligent Technologies and Applications First International Conference, INTAP 2018, Bahawalpur, Pakistan, October 23-25, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4288002024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Bajwa, Imran Sarwar. editor.<br/><a href="https://doi.org/10.1007/978-981-13-6052-7">https://doi.org/10.1007/978-981-13-6052-7</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282662024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking 4th International Conference, MSPN 2018, Paris, France, June 18-20, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282682024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Renault, Éric. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03101-5">https://doi.org/10.1007/978-3-030-03101-5</a><br/>Format: Electronic Resources<br/>Human Centered Computing 4th International Conference, HCC 2018, Mérida, Mexico, December, 5–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282702024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Tang, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15127-0">https://doi.org/10.1007/978-3-030-15127-0</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 20th International Conference, PAM 2019, Puerto Varas, Chile, March 27–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287412024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Choffnes, David. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15986-3">https://doi.org/10.1007/978-3-030-15986-3</a><br/>Format: Electronic Resources<br/>Advances in Computational Intelligence 15th International Work-Conference on Artificial Neural Networks, IWANN 2019, Gran Canaria, Spain, June 12-14, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4288212024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Rojas, Ignacio. editor. (orcid)0000-0002-1033-5635<br/><a href="https://doi.org/10.1007/978-3-030-20518-8">https://doi.org/10.1007/978-3-030-20518-8</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282832024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Zhou, Jianying. editor. (orcid)0000-0003-0594-0432<br/><a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287472024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Askarov, Aslan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Green, Pervasive, and Cloud Computing 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282912024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Li, Shijian. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15093-8">https://doi.org/10.1007/978-3-030-15093-8</a><br/>Format: Electronic Resources<br/>Policy-Based Autonomic Data Governanceent://SD_ILS/0/SD_ILS:4285512024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Calo, Seraphin. editor. (orcid)0000-0003-4668-3989<br/><a href="https://doi.org/10.1007/978-3-030-17277-0">https://doi.org/10.1007/978-3-030-17277-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4288672024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format: Electronic Resources<br/>Distributed Applications and Interoperable Systems 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17–21, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289832024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Pereira, José. editor. (orcid)0000-0002-3341-9217<br/><a href="https://doi.org/10.1007/978-3-030-22496-7">https://doi.org/10.1007/978-3-030-22496-7</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologiesent://SD_ILS/0/SD_ILS:4283482024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Gritzalis, Dimitris. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Advances in Computational Intelligence 15th International Work-Conference on Artificial Neural Networks, IWANN 2019, Gran Canaria, Spain, June 12-14, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4288222024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Rojas, Ignacio. editor. (orcid)0000-0002-1033-5635<br/><a href="https://doi.org/10.1007/978-3-030-20521-8">https://doi.org/10.1007/978-3-030-20521-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2019 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288252024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Buchmann, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23696-0">https://doi.org/10.1007/978-3-030-23696-0</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284642024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Alpcan, Tansu. editor. (orcid)0000-0002-7434-3239<br/><a href="https://doi.org/10.1007/978-3-030-32430-8">https://doi.org/10.1007/978-3-030-32430-8</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282892024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Luiijf, Eric. editor. (orcid)0000-0002-1821-9890<br/><a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Electronic Resources<br/>ECML PKDD 2018 Workshops Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September 10-14, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4285492024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Alzate, Carlos. editor. (orcid)0000-0003-2434-2534<br/><a href="https://doi.org/10.1007/978-3-030-13453-2">https://doi.org/10.1007/978-3-030-13453-2</a><br/>Format: Electronic Resources<br/>Economics of Grids, Clouds, Systems, and Services 15th International Conference, GECON 2018, Pisa, Italy, September 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4286682024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Coppola, Massimo. editor. (orcid)0000-0002-7937-4157<br/><a href="https://doi.org/10.1007/978-3-030-13342-9">https://doi.org/10.1007/978-3-030-13342-9</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4290082024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941<br/><a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format: Electronic Resources<br/>Smart City and Informatization 7th International Conference, iSCI 2019, Guangzhou, China, November 12–15, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287762024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-981-15-1301-5">https://doi.org/10.1007/978-981-15-1301-5</a><br/>Format: Electronic Resources<br/>Creativity in Intelligent Technologies and Data Science Third Conference, CIT&DS 2019, Volgograd, Russia, September 16–19, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4292442024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Kravets, Alla G. editor. (orcid)0000-0003-1675-8652<br/><a href="https://doi.org/10.1007/978-3-030-29743-5">https://doi.org/10.1007/978-3-030-29743-5</a><br/>Format: Electronic Resources<br/>Distributed Computer and Communication Networks 22nd International Conference, DCCN 2019, Moscow, Russia, September 23–27, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4291572024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Vishnevskiy, Vladimir M. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36625-4">https://doi.org/10.1007/978-3-030-36625-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2019 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291832024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Hao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35423-7">https://doi.org/10.1007/978-3-030-35423-7</a><br/>Format: Electronic Resources<br/>Communication Systems and Networks 10th International Conference, COMSNETS 2018, Bangalore, India, January 3-7, 2018, Extended Selected Papersent://SD_ILS/0/SD_ILS:4283192024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Biswas, Subir. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10659-1">https://doi.org/10.1007/978-3-030-10659-1</a><br/>Format: Electronic Resources<br/>Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4283282024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349<br/><a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Development of Transport by Telematics 19th International Conference on Transport System Telematics, TST 2019, Jaworze, Poland, February 27 – March 2, 2019, Selected Papersent://SD_ILS/0/SD_ILS:4276422024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mikulski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27547-1">https://doi.org/10.1007/978-3-030-27547-1</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4278042024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4278992024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Cid, Carlos. editor. (orcid)0000-0001-5761-8694<br/><a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281022024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Biagioni, Edoardo S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23597-0">https://doi.org/10.1007/978-3-030-23597-0</a><br/>Format: Electronic Resources<br/>Parallel and Distributed Computing, Applications and Technologies 19th International Conference, PDCAT 2018, Jeju Island, South Korea, August 20-22, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4278602024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Park, Jong Hyuk. editor. (orcid)0000-0003-1831-0309<br/><a href="https://doi.org/10.1007/978-981-13-5907-1">https://doi.org/10.1007/978-981-13-5907-1</a><br/>Format: Electronic Resources<br/>Design, User Experience, and Usability. Practice and Case Studies 8th International Conference, DUXU 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4288752024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Marcus, Aaron. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23535-2">https://doi.org/10.1007/978-3-030-23535-2</a><br/>Format: Electronic Resources<br/>Web Services – ICWS 2019 26th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289922024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Miller, John. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23499-7">https://doi.org/10.1007/978-3-030-23499-7</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283242024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4291932024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Luhach, Ashish Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0111-1">https://doi.org/10.1007/978-981-15-0111-1</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174712024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30222-5">http://dx.doi.org/10.1007/978-3-319-30222-5</a><br/>Format: Electronic Resources<br/>Big Data Concepts, Theories, and Applicationsent://SD_ILS/0/SD_ILS:171902024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Yu, Shui. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27763-9">http://dx.doi.org/10.1007/978-3-319-27763-9</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176752024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31811-0">http://dx.doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Security in Network Codingent://SD_ILS/0/SD_ILS:175962024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Zhang, Peng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31083-1">http://dx.doi.org/10.1007/978-3-319-31083-1</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174132024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:180302024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Badonnel, Rémi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39814-3">http://dx.doi.org/10.1007/978-3-319-39814-3</a><br/>Format: Electronic Resources<br/>Introduction to Cyberdeceptionent://SD_ILS/0/SD_ILS:181422024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Rowe, Neil C. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41187-3">http://dx.doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183422024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Monrose, Fabian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45719-2">http://dx.doi.org/10.1007/978-3-319-45719-2</a><br/>Format: Electronic Resources<br/>Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN & PDCAT 2015ent://SD_ILS/0/SD_ILS:189652024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Park, James J. (Jong Hyuk). editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0068-3">http://dx.doi.org/10.1007/978-981-10-0068-3</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:173682024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29485-8">http://dx.doi.org/10.1007/978-3-319-29485-8</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176832024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Kim, Ho-won. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31875-2">http://dx.doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:173242024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Güneysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29078-2">http://dx.doi.org/10.1007/978-3-319-29078-2</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:177772024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183602024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Li, Wenfeng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45940-0">http://dx.doi.org/10.1007/978-3-319-45940-0</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:178372024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Rome, Erich. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33331-1">http://dx.doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186842024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53140-2">http://dx.doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedingsent://SD_ILS/0/SD_ILS:175212024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Karagiannis, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30505-9">http://dx.doi.org/10.1007/978-3-319-30505-9</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179552024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Industrial IoT Technologies and Applications International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:182712024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Wan, Jiafu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44350-8">http://dx.doi.org/10.1007/978-3-319-44350-8</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:180992024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mitton, Nathalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40509-4">http://dx.doi.org/10.1007/978-3-319-40509-4</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182822024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Ogawa, Kazuto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44524-3">http://dx.doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Cloud Computing 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Proceedingsent://SD_ILS/0/SD_ILS:179432024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Zhang, Yin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38904-2">http://dx.doi.org/10.1007/978-3-319-38904-2</a><br/>Format: Electronic Resources<br/>Graphical Models for Security Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:183752024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Kordy, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46263-9">http://dx.doi.org/10.1007/978-3-319-46263-9</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183792024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183802024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Galinina, Olga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46301-8">http://dx.doi.org/10.1007/978-3-319-46301-8</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:180062024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:174282024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174332024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29968-6">http://dx.doi.org/10.1007/978-3-319-29968-6</a><br/>Format: Electronic Resources<br/>Security and Resiliency Analytics for Smart Grids Static and Dynamic Approachesent://SD_ILS/0/SD_ILS:177982024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32871-3">http://dx.doi.org/10.1007/978-3-319-32871-3</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182882024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Zikas, Vassilis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44618-9">http://dx.doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186532024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applicationsent://SD_ILS/0/SD_ILS:182172024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Liu, Wen Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42644-0">http://dx.doi.org/10.1007/978-3-319-42644-0</a><br/>Format: Electronic Resources<br/>Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprisesent://SD_ILS/0/SD_ILS:185322024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Pierer, Markus. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-15046-4">http://dx.doi.org/10.1007/978-3-658-15046-4</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186172024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49096-9">http://dx.doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186182024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49099-0">http://dx.doi.org/10.1007/978-3-662-49099-0</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:191842024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mueller, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2738-3">http://dx.doi.org/10.1007/978-981-10-2738-3</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174892024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30303-1">http://dx.doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>Collaborative Computing: Networking, Applications, and Worksharing 11th International Conference, CollaborateCom 2015, Wuhan, November 10-11, 2015, China. Proceedingsent://SD_ILS/0/SD_ILS:173032024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Guo, Song. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28910-6">http://dx.doi.org/10.1007/978-3-319-28910-6</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:176572024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Panayiotou, Christos G. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31664-2">http://dx.doi.org/10.1007/978-3-319-31664-2</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:172062024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Bjørner, Nikolaj. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28034-9">http://dx.doi.org/10.1007/978-3-319-28034-9</a><br/>Format: Electronic Resources<br/>Moving Target Defense for Distributed Systemsent://SD_ILS/0/SD_ILS:175902024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Shetty, Sachin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31032-9">http://dx.doi.org/10.1007/978-3-319-31032-9</a><br/>Format: Electronic Resources<br/>Physical-Layer Security for Cooperative Relay Networksent://SD_ILS/0/SD_ILS:176082024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Zou, Yulong. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31174-6">http://dx.doi.org/10.1007/978-3-319-31174-6</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:178682024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Hoepman, Jaap-Henk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33630-5">http://dx.doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:177082024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Colbert, Edward J. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32125-7">http://dx.doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Elements of Cloud Computing Security A Survey of Key Practicalitiesent://SD_ILS/0/SD_ILS:181522024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Alani, Mohammed M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41411-9">http://dx.doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Aggregation Techniques for Smart Grid Communicationsent://SD_ILS/0/SD_ILS:178022024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Lu, Rongxing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32899-7">http://dx.doi.org/10.1007/978-3-319-32899-7</a><br/>Format: Electronic Resources<br/>Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:179042024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Lecomte, Thierry. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33951-1">http://dx.doi.org/10.1007/978-3-319-33951-1</a><br/>Format: Electronic Resources<br/>Computer Networks 23rd International Conference, CN 2016, Brunów, Poland, June 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:179702024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Gaj, Piotr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39207-3">http://dx.doi.org/10.1007/978-3-319-39207-3</a><br/>Format: Electronic Resources<br/>Security-Aware Device-to-Device Communications Underlaying Cellular Networksent://SD_ILS/0/SD_ILS:177472024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Zhang, Aiqing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32458-6">http://dx.doi.org/10.1007/978-3-319-32458-6</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182702024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44341-6">http://dx.doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papersent://SD_ILS/0/SD_ILS:225332024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231582024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Pelc, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21741-3">http://dx.doi.org/10.1007/978-3-319-21741-3</a><br/>Format: Electronic Resources<br/>Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applicationsent://SD_ILS/0/SD_ILS:232852024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Lu, Zhou. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23288-1">http://dx.doi.org/10.1007/978-3-319-23288-1</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231942024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228222024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233602024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Khalil, Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24315-3">http://dx.doi.org/10.1007/978-3-319-24315-3</a><br/>Format: Electronic Resources<br/>Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228302024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18500-2">http://dx.doi.org/10.1007/978-3-319-18500-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236262024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Thuraisingham, Bhavani. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28865-9">http://dx.doi.org/10.1007/978-3-319-28865-9</a><br/>Format: Electronic Resources<br/>Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:225902024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedingsent://SD_ILS/0/SD_ILS:223862024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mirkovic, Jelena. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15509-8">http://dx.doi.org/10.1007/978-3-319-15509-8</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247652024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format: Electronic Resources<br/>Frontiers in Internet Technologies Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:247842024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Zhang, Shiyong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46826-5">http://dx.doi.org/10.1007/978-3-662-46826-5</a><br/>Format: Electronic Resources<br/>Intelligent Mechanisms for Network Configuration and Security 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedingsent://SD_ILS/0/SD_ILS:230092024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Latré, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20034-7">http://dx.doi.org/10.1007/978-3-319-20034-7</a><br/>Format: Electronic Resources<br/>Encrypted Email The History and Technology of Message Privacyent://SD_ILS/0/SD_ILS:231282024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Orman, Hilarie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21344-6">http://dx.doi.org/10.1007/978-3-319-21344-6</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:231432024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21476-4">http://dx.doi.org/10.1007/978-3-319-21476-4</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:226402024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17127-2">http://dx.doi.org/10.1007/978-3-319-17127-2</a><br/>Format: Electronic Resources<br/>Understanding Network Hacks Attack and Defense with Pythonent://SD_ILS/0/SD_ILS:244992024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Ballmann, Bastian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44437-5">http://dx.doi.org/10.1007/978-3-662-44437-5</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:233992024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24837-0">http://dx.doi.org/10.1007/978-3-319-24837-0</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:233442024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234682024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Khouzani, MHR. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25594-1">http://dx.doi.org/10.1007/978-3-319-25594-1</a><br/>Format: Electronic Resources<br/>Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235542024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:235712024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Bica, Ion. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27179-8">http://dx.doi.org/10.1007/978-3-319-27179-8</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232482024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Fischer-Hübner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22906-5">http://dx.doi.org/10.1007/978-3-319-22906-5</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232492024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Abawajy, Jemal H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22915-7">http://dx.doi.org/10.1007/978-3-319-22915-7</a><br/>Format: Electronic Resources<br/>Risk Assessment and Risk-Driven Testing Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:235242024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Seehusen, Fredrik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26416-5">http://dx.doi.org/10.1007/978-3-319-26416-5</a><br/>Format: Electronic Resources<br/>Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:236092024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236142024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Cyber Warfare Building the Scientific Foundationent://SD_ILS/0/SD_ILS:221772024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 8th International Conference, IDCS 2015, Windsor, UK, September 2-4, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232802024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Di Fatta, Giuseppe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23237-9">http://dx.doi.org/10.1007/978-3-319-23237-9</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedingsent://SD_ILS/0/SD_ILS:229082024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Doss, Robin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19210-9">http://dx.doi.org/10.1007/978-3-319-19210-9</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232132024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Tanaka, Keisuke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22425-1">http://dx.doi.org/10.1007/978-3-319-22425-1</a><br/>Format: Electronic Resources<br/>Cyber Security and Privacy 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:234452024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25360-2">http://dx.doi.org/10.1007/978-3-319-25360-2</a><br/>Format: Electronic Resources<br/>Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234712024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235682024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27152-1">http://dx.doi.org/10.1007/978-3-319-27152-1</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking First International Conference, MSPN 2015, Paris, France, June 15-17, 2015, Selected Papersent://SD_ILS/0/SD_ILS:234762024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Boumerdassi, Selma. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25744-0">http://dx.doi.org/10.1007/978-3-319-25744-0</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedingsent://SD_ILS/0/SD_ILS:234192024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mitton, Nathalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25067-0">http://dx.doi.org/10.1007/978-3-319-25067-0</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:234972024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25915-4">http://dx.doi.org/10.1007/978-3-319-25915-4</a><br/>Format: Electronic Resources<br/>Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235052024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235462024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format: Electronic Resources<br/>Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:223232024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXIX 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedingsent://SD_ILS/0/SD_ILS:230762024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Samarati, Pierangela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20810-7">http://dx.doi.org/10.1007/978-3-319-20810-7</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248422024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Böhme, Rainer. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47854-7">http://dx.doi.org/10.1007/978-3-662-47854-7</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233372024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format: Electronic Resources<br/>Guide to Security Assurance for Cloud Computingent://SD_ILS/0/SD_ILS:235022024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Zhu, Shao Ying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25988-8">http://dx.doi.org/10.1007/978-3-319-25988-8</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235202024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Bos, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26362-5">http://dx.doi.org/10.1007/978-3-319-26362-5</a><br/>Format: Electronic Resources<br/>Advances in Computer Science and Ubiquitous Computing CSA & CUTEent://SD_ILS/0/SD_ILS:258352024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Park, Doo-Soon. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0281-6">http://dx.doi.org/10.1007/978-981-10-0281-6</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedingsent://SD_ILS/0/SD_ILS:223102024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Natarajan, Raja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14977-6">http://dx.doi.org/10.1007/978-3-319-14977-6</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:225402024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Eisenbarth, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16363-5">http://dx.doi.org/10.1007/978-3-319-16363-5</a><br/>Format: Electronic Resources<br/>Secure Wireless Sensor Networks Threats and Solutionsent://SD_ILS/0/SD_ILS:199622024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Conti, Mauro. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3460-7">http://dx.doi.org/10.1007/978-1-4939-3460-7</a><br/>Format: Electronic Resources<br/>Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:231822024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedingsent://SD_ILS/0/SD_ILS:228192024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18455-5">http://dx.doi.org/10.1007/978-3-319-18455-5</a><br/>Format: Electronic Resources<br/>E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232022024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Haenni, Rolf. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22270-7">http://dx.doi.org/10.1007/978-3-319-22270-7</a><br/>Format: Electronic Resources<br/>Security and Privacy for Mobile Healthcare Networksent://SD_ILS/0/SD_ILS:233912024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Zhang, Kuan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24717-5">http://dx.doi.org/10.1007/978-3-319-24717-5</a><br/>Format: Electronic Resources<br/>Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedingsent://SD_ILS/0/SD_ILS:221552024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Prakash, Atul. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13841-1">http://dx.doi.org/10.1007/978-3-319-13841-1</a><br/>Format: Electronic Resources<br/>Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:220072024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Saxena, Nitesh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13066-8">http://dx.doi.org/10.1007/978-3-319-13066-8</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedingsent://SD_ILS/0/SD_ILS:241222024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Cuppens-Boulahia, Nora. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55415-5">http://dx.doi.org/10.1007/978-3-642-55415-5</a><br/>Format: Electronic Resources<br/>Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedingsent://SD_ILS/0/SD_ILS:240132024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Martínez Pérez, Gregorio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54525-2">http://dx.doi.org/10.1007/978-3-642-54525-2</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244462024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43936-4">http://dx.doi.org/10.1007/978-3-662-43936-4</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedingsent://SD_ILS/0/SD_ILS:205672024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Faloutsos, Michalis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04918-2">http://dx.doi.org/10.1007/978-3-319-04918-2</a><br/>Format: Electronic Resources<br/>Virtualization Techniques for Mobile Systemsent://SD_ILS/0/SD_ILS:207152024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Jaramillo, David. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05741-5">http://dx.doi.org/10.1007/978-3-319-05741-5</a><br/>Format: Electronic Resources<br/>Cyber Defense and Situational Awarenessent://SD_ILS/0/SD_ILS:216972024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Kott, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11391-3">http://dx.doi.org/10.1007/978-3-319-11391-3</a><br/>Format: Electronic Resources<br/>Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:219182024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12574-9">http://dx.doi.org/10.1007/978-3-319-12574-9</a><br/>Format: Electronic Resources<br/>Cloud Computing Challenges, Limitations and R&D Solutionsent://SD_ILS/0/SD_ILS:215312024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10530-7">http://dx.doi.org/10.1007/978-3-319-10530-7</a><br/>Format: Electronic Resources<br/>Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedingsent://SD_ILS/0/SD_ILS:221782024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14054-4">http://dx.doi.org/10.1007/978-3-319-14054-4</a><br/>Format: Electronic Resources<br/>Secure Cloud Computingent://SD_ILS/0/SD_ILS:197662024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9278-8">http://dx.doi.org/10.1007/978-1-4614-9278-8</a><br/>Format: Electronic Resources<br/>Dynamic Secrets in Communication Securityent://SD_ILS/0/SD_ILS:196732024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Xiao, Sheng. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7831-7">http://dx.doi.org/10.1007/978-1-4614-7831-7</a><br/>Format: Electronic Resources<br/>Distributed Denial of Service Attack and Defenseent://SD_ILS/0/SD_ILS:197902024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Yu, Shui. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9491-1">http://dx.doi.org/10.1007/978-1-4614-9491-1</a><br/>Format: Electronic Resources<br/>Continued Rise of the Cloud Advances and Trends in Cloud Computingent://SD_ILS/0/SD_ILS:195392024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6452-4">http://dx.doi.org/10.1007/978-1-4471-6452-4</a><br/>Format: Electronic Resources<br/>Network Science and Cybersecurityent://SD_ILS/0/SD_ILS:196612024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7597-2">http://dx.doi.org/10.1007/978-1-4614-7597-2</a><br/>Format: Electronic Resources<br/>Trustworthy Execution on Mobile Devicesent://SD_ILS/0/SD_ILS:197052024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Vasudevan, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8190-4">http://dx.doi.org/10.1007/978-1-4614-8190-4</a><br/>Format: Electronic Resources<br/>Cyberterrorism Understanding, Assessment, and Responseent://SD_ILS/0/SD_ILS:198962024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Chen, Thomas M. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0962-9">http://dx.doi.org/10.1007/978-1-4939-0962-9</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208672024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06677-6">http://dx.doi.org/10.1007/978-3-319-06677-6</a><br/>Format: Electronic Resources<br/>e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:211662024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Bissyandé, Tegawendé F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08368-1">http://dx.doi.org/10.1007/978-3-319-08368-1</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208072024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Electronic Resources<br/>Querying over Encrypted Data in Smart Gridsent://SD_ILS/0/SD_ILS:208142024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Wen, Mi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06355-3">http://dx.doi.org/10.1007/978-3-319-06355-3</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:218762024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedingsent://SD_ILS/0/SD_ILS:240812024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Linawati. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55032-4">http://dx.doi.org/10.1007/978-3-642-55032-4</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:245732024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44885-4">http://dx.doi.org/10.1007/978-3-662-44885-4</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:245572024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44788-8">http://dx.doi.org/10.1007/978-3-662-44788-8</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:245582024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Obaidat, Mohammad S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44791-8">http://dx.doi.org/10.1007/978-3-662-44791-8</a><br/>Format: Electronic Resources<br/>Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:246882024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45921-8">http://dx.doi.org/10.1007/978-3-662-45921-8</a><br/>Format: Electronic Resources<br/>Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:239442024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format: Electronic Resources<br/>Network and System Security 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:217662024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Au, Man Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11698-3">http://dx.doi.org/10.1007/978-3-319-11698-3</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 7th International Conference, IDCS 2014, Calabria, Italy, September 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:217642024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Fortino, Giancarlo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11692-1">http://dx.doi.org/10.1007/978-3-319-11692-1</a><br/>Format: Electronic Resources<br/>Automated Firewall Analytics Design, Configuration and Optimizationent://SD_ILS/0/SD_ILS:214992024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10371-6">http://dx.doi.org/10.1007/978-3-319-10371-6</a><br/>Format: Electronic Resources<br/>Cybersecurity Systems for Human Cognition Augmentationent://SD_ILS/0/SD_ILS:215002024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10374-7">http://dx.doi.org/10.1007/978-3-319-10374-7</a><br/>Format: Electronic Resources<br/>Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:218912024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12400-1">http://dx.doi.org/10.1007/978-3-319-12400-1</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 – October 1, 2014. Proceedingsent://SD_ILS/0/SD_ILS:217822024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Felber, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11764-5">http://dx.doi.org/10.1007/978-3-319-11764-5</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedingsent://SD_ILS/0/SD_ILS:219222024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12601-2">http://dx.doi.org/10.1007/978-3-319-12601-2</a><br/>Format: Electronic Resources<br/>Web Technologies and Applications APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014. Proceedingsent://SD_ILS/0/SD_ILS:216402024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Han, Weihong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11119-3">http://dx.doi.org/10.1007/978-3-319-11119-3</a><br/>Format: Electronic Resources<br/>Trusted Cloud Computingent://SD_ILS/0/SD_ILS:219472024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Krcmar, Helmut. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12718-7">http://dx.doi.org/10.1007/978-3-319-12718-7</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedingsent://SD_ILS/0/SD_ILS:218412024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12060-7">http://dx.doi.org/10.1007/978-3-319-12060-7</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:220642024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mitton, Natalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13329-4">http://dx.doi.org/10.1007/978-3-319-13329-4</a><br/>Format: Electronic Resources<br/>Secure and Trustworthy Service Composition The Aniketos Approachent://SD_ILS/0/SD_ILS:220982024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Brucker, Achim D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13518-2">http://dx.doi.org/10.1007/978-3-319-13518-2</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 12th International Conference, WWIC 2014, Paris, France, May 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:220292024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mellouk, Abdelhamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13174-0">http://dx.doi.org/10.1007/978-3-319-13174-0</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014. Proceedingsent://SD_ILS/0/SD_ILS:239002024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Chatterjee, Mainak. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45249-9">http://dx.doi.org/10.1007/978-3-642-45249-9</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedingsent://SD_ILS/0/SD_ILS:240442024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Abadi, Martín. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54792-8">http://dx.doi.org/10.1007/978-3-642-54792-8</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedingsent://SD_ILS/0/SD_ILS:245852024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Mauri, Jaime Lloret. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44966-0">http://dx.doi.org/10.1007/978-3-662-44966-0</a><br/>Format: Electronic Resources<br/>Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 – July 3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244312024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Sperotto, Anna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43862-6">http://dx.doi.org/10.1007/978-3-662-43862-6</a><br/>Format: Electronic Resources<br/>Cyberpatterns Unifying Design Patterns with Security and Attack Patternsent://SD_ILS/0/SD_ILS:204772024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Blackwell, Clive. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04447-7">http://dx.doi.org/10.1007/978-3-319-04447-7</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014. Proceedingsent://SD_ILS/0/SD_ILS:204822024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Natarajan, Raja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04483-5">http://dx.doi.org/10.1007/978-3-319-04483-5</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:204142024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Sherif, Mostafa Hashem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04105-6">http://dx.doi.org/10.1007/978-3-319-04105-6</a><br/>Format: Electronic Resources<br/>Network Hardening An Automated Approach to Improving Network Securityent://SD_ILS/0/SD_ILS:205062024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04612-9">http://dx.doi.org/10.1007/978-3-319-04612-9</a><br/>Format: Electronic Resources<br/>Pervasive Wireless Environments: Detecting and Localizing User Spoofingent://SD_ILS/0/SD_ILS:209832024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Yang, Jie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07356-9">http://dx.doi.org/10.1007/978-3-319-07356-9</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:214602024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format: Electronic Resources<br/>Computer Networks and Distributed Systems International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:216042024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Jahangir, Amir Hossein. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10903-9">http://dx.doi.org/10.1007/978-3-319-10903-9</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions and Defenses 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedingsent://SD_ILS/0/SD_ILS:216952024-09-23T21:19:44Z2024-09-23T21:19:44ZYazar Stavrou, Angelos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11379-1">http://dx.doi.org/10.1007/978-3-319-11379-1</a><br/>Format: Electronic Resources<br/>