Search Results for - Narrowed by: Computers and civilization. - Computer security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computers$002band$002bcivilization.$002509Computers$002band$002bcivilization.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2024-05-28T21:13:40Z ECML PKDD 2018 Workshops MIDAS 2018 and PAP 2018, Dublin, Ireland, September 10-14, 2018, Proceedings ent://SD_ILS/0/SD_ILS:427630 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Alzate, Carlos. editor. (orcid)0000-0003-2434-2534<br/><a href="https://doi.org/10.1007/978-3-030-13463-1">https://doi.org/10.1007/978-3-030-13463-1</a><br/>Format:&#160;Electronic Resources<br/> Trust Management XIII 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427756 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-3-030-33716-2">https://doi.org/10.1007/978-3-030-33716-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28&ndash;30, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428129 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751<br/><a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10&ndash;11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428414 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Blazy, Olivier. editor. (orcid)0000-0001-6205-8249<br/><a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428324 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Electronic Resources<br/> e-Citizens Toward a New Model of (Inter)active Citizenry ent://SD_ILS/0/SD_ILS:428611 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Ronchi, Alfredo M. author.<br/><a href="https://doi.org/10.1007/978-3-030-00746-1">https://doi.org/10.1007/978-3-030-00746-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427797 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131<br/><a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXXIII 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428452 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22479-0">https://doi.org/10.1007/978-3-030-22479-0</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26&ndash;27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428715 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;P&eacute;rez-Sol&agrave;, Cristina. editor. (orcid)0000-0001-7534-1326<br/><a href="https://doi.org/10.1007/978-3-030-31500-9">https://doi.org/10.1007/978-3-030-31500-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26&ndash;27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428716 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Mauw, Sjouke. editor. (orcid)0000-0002-2818-4433<br/><a href="https://doi.org/10.1007/978-3-030-31511-5">https://doi.org/10.1007/978-3-030-31511-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13&ndash;14, 2019, Proceedings ent://SD_ILS/0/SD_ILS:429162 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Naldi, Maurizio. editor. (orcid)0000-0002-0903-398X<br/><a href="https://doi.org/10.1007/978-3-030-21752-5">https://doi.org/10.1007/978-3-030-21752-5</a><br/>Format:&#160;Electronic Resources<br/> Science of Cyber Security Second International Conference, SciSec 2019, Nanjing, China, August 9&ndash;11, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427837 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34637-9">https://doi.org/10.1007/978-3-030-34637-9</a><br/>Format:&#160;Electronic Resources<br/> Development of Transport by Telematics 19th International Conference on Transport System Telematics, TST 2019, Jaworze, Poland, February 27 &ndash; March 2, 2019, Selected Papers ent://SD_ILS/0/SD_ILS:427642 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Mikulski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27547-1">https://doi.org/10.1007/978-3-030-27547-1</a><br/>Format:&#160;Electronic Resources<br/> Computational Data and Social Networks 8th International Conference, CSoNet 2019, Ho Chi Minh City, Vietnam, November 18&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427767 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Tagarelli, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34980-6">https://doi.org/10.1007/978-3-030-34980-6</a><br/>Format:&#160;Electronic Resources<br/> Heterogeneous Data Management, Polystores, and Analytics for Healthcare VLDB 2019 Workshops, Poly and DMAH, Los Angeles, CA, USA, August 30, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428095 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Gadepally, Vijay. editor.<br/><a href="https://doi.org/10.1007/978-3-030-33752-0">https://doi.org/10.1007/978-3-030-33752-0</a><br/>Format:&#160;Electronic Resources<br/> On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence Themes from IACAP 2016 ent://SD_ILS/0/SD_ILS:428829 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Berkich, Don. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01800-9">https://doi.org/10.1007/978-3-030-01800-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2018 21st International Conference, Seoul, South Korea, November 28&ndash;30, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428179 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890<br/><a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format:&#160;Electronic Resources<br/> Geographical Information Systems Theory, Applications and Management 4th International Conference, GISTAM 2018, Funchal, Madeira, Portugal, March 17&ndash;19, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:429148 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Ragia, Lemonia. editor.<br/><a href="https://doi.org/10.1007/978-3-030-29948-4">https://doi.org/10.1007/978-3-030-29948-4</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428833 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Dhillon, Gurpreet. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22312-0">https://doi.org/10.1007/978-3-030-22312-0</a><br/>Format:&#160;Electronic Resources<br/> ICT Unbounded, Social Impact of Bright ICT Adoption IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2019, Accra, Ghana, June 21&ndash;22, 2019, Proceedings ent://SD_ILS/0/SD_ILS:429251 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Dwivedi, Yogesh. editor. (orcid)0000-0002-5547-9990<br/><a href="https://doi.org/10.1007/978-3-030-20671-0">https://doi.org/10.1007/978-3-030-20671-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428778 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 16th International Conference, TrustBus 2019, Linz, Austria, August 26&ndash;29, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428986 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Gritzalis, Stefanos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27813-7">https://doi.org/10.1007/978-3-030-27813-7</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17657 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Panayiotou, Christos G. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31664-2">http://dx.doi.org/10.1007/978-3-319-31664-2</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17413 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17681 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31863-9">http://dx.doi.org/10.1007/978-3-319-31863-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17636 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Berendt, Bettina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31456-3">http://dx.doi.org/10.1007/978-3-319-31456-3</a><br/>Format:&#160;Electronic Resources<br/> Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18150 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Habib, Sheikh Mahbub. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41354-9">http://dx.doi.org/10.1007/978-3-319-41354-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18085 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40367-0">http://dx.doi.org/10.1007/978-3-319-40367-0</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17837 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Rome, Erich. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33331-1">http://dx.doi.org/10.1007/978-3-319-33331-1</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18653 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17239 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Haltinner, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28313-5">http://dx.doi.org/10.1007/978-3-319-28313-5</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17955 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17868 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Hoepman, Jaap-Henk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33630-5">http://dx.doi.org/10.1007/978-3-319-33630-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18073 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40253-6">http://dx.doi.org/10.1007/978-3-319-40253-6</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18006 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18292 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Schiffner, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44760-5">http://dx.doi.org/10.1007/978-3-319-44760-5</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18337 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18344 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45741-3">http://dx.doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18397 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Barthe, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46598-2">http://dx.doi.org/10.1007/978-3-319-46598-2</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18172 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Aspinall, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41763-9">http://dx.doi.org/10.1007/978-3-319-41763-9</a><br/>Format:&#160;Electronic Resources<br/> Technology and Intimacy: Choice or Coercion 12th IFIP TC 9 International Conference on Human Choice and Computers, HCC12 2016, Salford, UK, September 7-9, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18298 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Kreps, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44805-3">http://dx.doi.org/10.1007/978-3-319-44805-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18324 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45381-1">http://dx.doi.org/10.1007/978-3-319-45381-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18345 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45744-4">http://dx.doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:17428 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17694 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31960-5">http://dx.doi.org/10.1007/978-3-319-31960-5</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18154 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Ranise, Silvio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41483-6">http://dx.doi.org/10.1007/978-3-319-41483-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18352 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45871-7">http://dx.doi.org/10.1007/978-3-319-45871-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18376 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46279-0">http://dx.doi.org/10.1007/978-3-319-46279-0</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18379 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18687 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Clark, Jeremy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53357-4">http://dx.doi.org/10.1007/978-3-662-53357-4</a><br/>Format:&#160;Electronic Resources<br/> Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21&ndash;22, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:18089 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;B&eacute;cue, Adrien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40385-4">http://dx.doi.org/10.1007/978-3-319-40385-4</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:18231 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43005-8">http://dx.doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/> Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22829 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Damsgaard Jensen, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18491-3">http://dx.doi.org/10.1007/978-3-319-18491-3</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:23342 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:23343 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23592 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27668-7">http://dx.doi.org/10.1007/978-3-319-27668-7</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24765 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23182 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection IX 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23538 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Rice, Mason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26567-4">http://dx.doi.org/10.1007/978-3-319-26567-4</a><br/>Format:&#160;Electronic Resources<br/> E-Democracy &ndash; Citizen Rights in the World of the New Computing Paradigms 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23570 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27164-4">http://dx.doi.org/10.1007/978-3-319-27164-4</a><br/>Format:&#160;Electronic Resources<br/> Internet of Vehicles - Safe and Intelligent Mobility Second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23580 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Hsu, Ching-Hsien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27293-1">http://dx.doi.org/10.1007/978-3-319-27293-1</a><br/>Format:&#160;Electronic Resources<br/> Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23496 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19&ndash;21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23530 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Buchegger, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26502-5">http://dx.doi.org/10.1007/978-3-319-26502-5</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23614 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23626 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Thuraisingham, Bhavani. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28865-9">http://dx.doi.org/10.1007/978-3-319-28865-9</a><br/>Format:&#160;Electronic Resources<br/> Information and Communication Technology Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23360 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Khalil, Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24315-3">http://dx.doi.org/10.1007/978-3-319-24315-3</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23400 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24858-5">http://dx.doi.org/10.1007/978-3-319-24858-5</a><br/>Format:&#160;Electronic Resources<br/> Reforming European Data Protection Law ent://SD_ILS/0/SD_ILS:25480 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Gutwirth, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-94-017-9385-8">http://dx.doi.org/10.1007/978-94-017-9385-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23194 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23238 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format:&#160;Electronic Resources<br/> E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23202 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Haenni, Rolf. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22270-7">http://dx.doi.org/10.1007/978-3-319-22270-7</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23457 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;James, Joshua I. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25512-5">http://dx.doi.org/10.1007/978-3-319-25512-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management for the Future Internet in the Age of Globalisation 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22842 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18621-4">http://dx.doi.org/10.1007/978-3-319-18621-4</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23504 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Au, Man-Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26059-4">http://dx.doi.org/10.1007/978-3-319-26059-4</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23344 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23284 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22819 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18455-5">http://dx.doi.org/10.1007/978-3-319-18455-5</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23471 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XI 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23336 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24123-4">http://dx.doi.org/10.1007/978-3-319-24123-4</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Communications, Services and Security 8th International Conference, MCSS 2015, Krak&oacute;w, Poland, November 24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23522 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Dziech, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26404-2">http://dx.doi.org/10.1007/978-3-319-26404-2</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and Privacy 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23445 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25360-2">http://dx.doi.org/10.1007/978-3-319-25360-2</a><br/>Format:&#160;Electronic Resources<br/> Information and Communication Technology Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24081 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Linawati. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55032-4">http://dx.doi.org/10.1007/978-3-642-55032-4</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23944 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format:&#160;Electronic Resources<br/> e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21166 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Bissyand&eacute;, Tegawend&eacute; F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08368-1">http://dx.doi.org/10.1007/978-3-319-08368-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics X 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24582 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44952-3">http://dx.doi.org/10.1007/978-3-662-44952-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy vs. Security ent://SD_ILS/0/SD_ILS:19546 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Stalla-Bourdillon, Sophie. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6530-9">http://dx.doi.org/10.1007/978-1-4471-6530-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20877 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06749-0">http://dx.doi.org/10.1007/978-3-319-06749-0</a><br/>Format:&#160;Electronic Resources<br/> Socio-technical Design of Ubiquitous Computing Systems ent://SD_ILS/0/SD_ILS:20594 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;David, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05044-7">http://dx.doi.org/10.1007/978-3-319-05044-7</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:20890 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06811-4">http://dx.doi.org/10.1007/978-3-319-06811-4</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace and International Relations Theory, Prospects and Challenges ent://SD_ILS/0/SD_ILS:23697 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Kremer, Jan-Frederik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37481-4">http://dx.doi.org/10.1007/978-3-642-37481-4</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24097 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Hansen, Marit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55137-6">http://dx.doi.org/10.1007/978-3-642-55137-6</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:24437 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43886-2">http://dx.doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/> ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 &ndash; August 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24476 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Kimppa, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44208-1">http://dx.doi.org/10.1007/978-3-662-44208-1</a><br/>Format:&#160;Electronic Resources<br/> Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24424 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43813-8">http://dx.doi.org/10.1007/978-3-662-43813-8</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20867 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06677-6">http://dx.doi.org/10.1007/978-3-319-06677-6</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21185 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08506-7">http://dx.doi.org/10.1007/978-3-319-08506-7</a><br/>Format:&#160;Electronic Resources<br/> E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21769 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Sideridis, Alexander B. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11710-2">http://dx.doi.org/10.1007/978-3-319-11710-2</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21902 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12475-9">http://dx.doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:20448 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Padr&oacute;, Carles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04268-8">http://dx.doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:21460 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21491 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10329-7">http://dx.doi.org/10.1007/978-3-319-10329-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21670 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11257-2">http://dx.doi.org/10.1007/978-3-319-11257-2</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22219 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Gladyshev, Pavel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14289-0">http://dx.doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:22047 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13257-0">http://dx.doi.org/10.1007/978-3-319-13257-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23951 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54069-1">http://dx.doi.org/10.1007/978-3-642-54069-1</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 &ndash; July 2, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21199 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21918 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12574-9">http://dx.doi.org/10.1007/978-3-319-12574-9</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24621 2024-05-28T21:13:40Z 2024-05-28T21:13:40Z Yazar&#160;Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45355-1">http://dx.doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/>