Search Results for - Narrowed by: Data encryption (Computer science). SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300? 2024-05-04T14:08:01Z Blok zinciri-dijital d&ouml;n&uuml;ş&uuml;m : Harvard Business Review ent://SD_ILS/0/SD_ILS:418458 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Gezer, Taner.<br/>Format:&#160;Kitap<br/> Advances in Cryptology &ndash; CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18&ndash;22, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:427913 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26951-7">https://doi.org/10.1007/978-3-030-26951-7</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428207 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format:&#160;Electronic Resources<br/> Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22&ndash;24, 2019, Proceedings - In Honor of Said El Hajji ent://SD_ILS/0/SD_ILS:427950 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19&ndash;23, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:427820 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Ishai, Yuval. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17653-2">https://doi.org/10.1007/978-3-030-17653-2</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8&ndash;10, 2019 Revised Selected Papers ent://SD_ILS/0/SD_ILS:427871 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Ding, Jintai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format:&#160;Electronic Resources<br/> Mobile, Secure, and Programmable Networking 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23&ndash;24, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427691 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Renault, &Eacute;ric. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22885-9">https://doi.org/10.1007/978-3-030-22885-9</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428324 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Electronic Resources<br/> Algebra, Codes and Cryptology First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428037 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Gueye, Cheikh Thiecoumba. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36237-9">https://doi.org/10.1007/978-3-030-36237-9</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2019 The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4&ndash;8, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428500 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Matsui, Mitsuru. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12612-4">https://doi.org/10.1007/978-3-030-12612-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:428537 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34618-8">https://doi.org/10.1007/978-3-030-34618-8</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19&ndash;22, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428170 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Thampi, Sabu M. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5826-5">https://doi.org/10.1007/978-981-13-5826-5</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 15th International Conference, ICDCIT 2019, Bhubaneswar, India, January 10&ndash;13, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427758 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Fahrnberger, G&uuml;nter. editor. (orcid)0000-0002-2606-3988<br/><a href="https://doi.org/10.1007/978-3-030-05366-6">https://doi.org/10.1007/978-3-030-05366-6</a><br/>Format:&#160;Electronic Resources<br/> Electronic Voting 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1&ndash;4, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428766 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-30625-0">https://doi.org/10.1007/978-3-030-30625-0</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; LATINCRYPT 2017 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20&ndash;22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:429033 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25283-0">https://doi.org/10.1007/978-3-030-25283-0</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:429040 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format:&#160;Electronic Resources<br/> Code-Based Cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18&ndash;19, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:429041 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526<br/><a href="https://doi.org/10.1007/978-3-030-25922-8">https://doi.org/10.1007/978-3-030-25922-8</a><br/>Format:&#160;Electronic Resources<br/> Distributed Applications and Interoperable Systems 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17&ndash;21, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428983 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Pereira, Jos&eacute;. editor. (orcid)0000-0002-3341-9217<br/><a href="https://doi.org/10.1007/978-3-030-22496-7">https://doi.org/10.1007/978-3-030-22496-7</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:427804 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format:&#160;Electronic Resources<br/> Data Science 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20&ndash;23, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:427923 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Cheng, Xiaohui. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0118-0">https://doi.org/10.1007/978-981-15-0118-0</a><br/>Format:&#160;Electronic Resources<br/> Ethical and Secure Computing A Concise Module ent://SD_ILS/0/SD_ILS:428358 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-030-03937-0">https://doi.org/10.1007/978-3-030-03937-0</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Error Correction An Algebraic Introduction and Real-World Applications ent://SD_ILS/0/SD_ILS:428259 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Childs, Lindsay N. author.<br/><a href="https://doi.org/10.1007/978-3-030-15453-0">https://doi.org/10.1007/978-3-030-15453-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19&ndash;23, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:428644 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Ishai, Yuval. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17659-4">https://doi.org/10.1007/978-3-030-17659-4</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography &ndash; SAC 2018 25th International Conference, Calgary, AB, Canada, August 15&ndash;17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427899 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Cid, Carlos. editor. (orcid)0000-0001-5761-8694<br/><a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428024 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34578-5">https://doi.org/10.1007/978-3-030-34578-5</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427943 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Mori, Paolo. editor. (orcid)0000-0002-6618-0388<br/><a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18&ndash;22, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428422 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26948-7">https://doi.org/10.1007/978-3-030-26948-7</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; LATINCRYPT 2019 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2&ndash;4, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428524 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Schwabe, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30530-7">https://doi.org/10.1007/978-3-030-30530-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cyber Security: Principles, Techniques, and Applications ent://SD_ILS/0/SD_ILS:428398 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Li, Kuan-Ching. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1483-4">https://doi.org/10.1007/978-981-13-1483-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18&ndash;22, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:428490 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26954-8">https://doi.org/10.1007/978-3-030-26954-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428492 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Romanovsky, Alexander. editor. (orcid)0000-0002-4076-3331<br/><a href="https://doi.org/10.1007/978-3-030-26250-1">https://doi.org/10.1007/978-3-030-26250-1</a><br/>Format:&#160;Electronic Resources<br/> Ad-Hoc, Mobile, and Wireless Networks 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1&ndash;3, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428914 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Palattella, Maria Rita. editor. (orcid)0000-0002-4945-1406<br/><a href="https://doi.org/10.1007/978-3-030-31831-4">https://doi.org/10.1007/978-3-030-31831-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19&ndash;23, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:428921 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Ishai, Yuval. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17656-3">https://doi.org/10.1007/978-3-030-17656-3</a><br/>Format:&#160;Electronic Resources<br/> Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428328 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349<br/><a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura&ccedil;ao, March 2, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428440 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Zohar, Aviv. editor.<br/><a href="https://doi.org/10.1007/978-3-662-58820-8">https://doi.org/10.1007/978-3-662-58820-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:428546 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format:&#160;Electronic Resources<br/> Guide to Automotive Connectivity and Cybersecurity Trends, Technologies, Innovations and Applications ent://SD_ILS/0/SD_ILS:427771 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;M&ouml;ller, Dietmar P.F. author.<br/><a href="https://doi.org/10.1007/978-3-319-73512-2">https://doi.org/10.1007/978-3-319-73512-2</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 18th International Conference, CANS 2019, Fuzhou, China, October 25&ndash;27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428946 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Mu, Yi. editor. (orcid)0000-0002-1637-845X<br/><a href="https://doi.org/10.1007/978-3-030-31578-8">https://doi.org/10.1007/978-3-030-31578-8</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26&ndash;28, 2019, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:429023 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428867 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and Secure Information Systems Challenges and Solutions in Smart Environments ent://SD_ILS/0/SD_ILS:428985 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hassanien, Aboul Ella. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16837-7">https://doi.org/10.1007/978-3-030-16837-7</a><br/>Format:&#160;Electronic Resources<br/> Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15&ndash;16, 2019, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:429193 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Luhach, Ashish Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0111-1">https://doi.org/10.1007/978-981-15-0111-1</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:429196 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Liu, Joseph K. editor. (orcid)0000-0001-6656-6240<br/><a href="https://doi.org/10.1007/978-3-030-36938-5">https://doi.org/10.1007/978-3-030-36938-5</a><br/>Format:&#160;Electronic Resources<br/> Deep Reinforcement Learning Frontiers of Artificial Intelligence ent://SD_ILS/0/SD_ILS:429100 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Sewak, Mohit. author.<br/><a href="https://doi.org/10.1007/978-981-13-8285-7">https://doi.org/10.1007/978-981-13-8285-7</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:427778 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26&ndash;28, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:429024 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format:&#160;Electronic Resources<br/> Creativity in Intelligent Technologies and Data Science Third Conference, CIT&amp;DS 2019, Volgograd, Russia, September 16&ndash;19, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:429244 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kravets, Alla G. editor. (orcid)0000-0003-1675-8652<br/><a href="https://doi.org/10.1007/978-3-030-29743-5">https://doi.org/10.1007/978-3-030-29743-5</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:428979 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Yoo, Chang D. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2019 20th International Conference on Cryptology in India, Hyderabad, India, December 15&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:429183 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35423-7">https://doi.org/10.1007/978-3-030-35423-7</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18&ndash;22, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428996 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Goldberg, Ian. editor.<br/><a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1&ndash;4, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427695 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Steinfeld, Ron. editor. (orcid)0000-0003-1745-4183<br/><a href="https://doi.org/10.1007/978-3-030-31919-9">https://doi.org/10.1007/978-3-030-31919-9</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428046 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Albrecht, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format:&#160;Electronic Resources<br/> Image Analysis and Recognition 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27&ndash;29, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428423 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Karray, Fakhri. editor. (orcid)0000-0002-4217-1372<br/><a href="https://doi.org/10.1007/978-3-030-27202-9">https://doi.org/10.1007/978-3-030-27202-9</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428283 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432<br/><a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427738 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Zhang, Huanguo. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 17th International Conference, CARDIS 2018, Montpellier, France, November 12&ndash;14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428669 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Bilgin, Beg&uuml;l. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15462-2">https://doi.org/10.1007/978-3-030-15462-2</a><br/>Format:&#160;Electronic Resources<br/> Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427761 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hamid, Brahim. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428747 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Askarov, Aslan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428778 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format:&#160;Electronic Resources<br/> Cryptography with Shrinking Generators Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation ent://SD_ILS/0/SD_ILS:428793 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;D&iacute;az Cardell, Sara. author.<br/><a href="https://doi.org/10.1007/978-3-030-12850-0">https://doi.org/10.1007/978-3-030-12850-0</a><br/>Format:&#160;Electronic Resources<br/> HCI for Cybersecurity, Privacy and Trust First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26&ndash;31, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428897 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Moallem, Abbas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22351-9">https://doi.org/10.1007/978-3-030-22351-9</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16&ndash;18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:226798 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format:&#160;Electronic Resources<br/> Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeria ent://SD_ILS/0/SD_ILS:224990 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225509 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format:&#160;Electronic Resources<br/> Unconventional Computation and Natural Computation 17th International Conference, UCNC 2018, Fontainebleau, France, June 25-29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:226005 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Stepney, Susan. editor. (orcid)0000-0003-3146-5401<br/><a href="https://doi.org/10.1007/978-3-319-92435-9">https://doi.org/10.1007/978-3-319-92435-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28&ndash;29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226023 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hancke, Gerhard P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format:&#160;Electronic Resources<br/> Blockchain &ndash; ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:226024 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Chen, Shiping. editor. (orcid)0000-0002-4603-0024<br/><a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221627 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13&ndash;15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221771 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Eisenbarth, Thomas. editor. (orcid)0000-0003-1116-6973<br/><a href="https://doi.org/10.1007/978-3-319-75208-2">https://doi.org/10.1007/978-3-319-75208-2</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:221562 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221564 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222370 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Inomata, Atsuo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5&ndash;6, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222371 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29&ndash;31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222328 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221378 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-79063-3">https://doi.org/10.1007/978-3-319-79063-3</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221239 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Baek, Joonsang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01446-9">https://doi.org/10.1007/978-3-030-01446-9</a><br/>Format:&#160;Electronic Resources<br/> Interoperability, Safety and Security in IoT Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221692 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Fortino, Giancarlo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93797-7">https://doi.org/10.1007/978-3-319-93797-7</a><br/>Format:&#160;Electronic Resources<br/> Towards Autonomous Robotic Systems 19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221493 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Giuliani, Manuel. editor. (orcid)0000-0003-3781-7623<br/><a href="https://doi.org/10.1007/978-3-319-96728-8">https://doi.org/10.1007/978-3-319-96728-8</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8&ndash;10, 2018, Revised Selected Papers, Part IV ent://SD_ILS/0/SD_ILS:221879 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19&ndash;23, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:221888 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96878-0">https://doi.org/10.1007/978-3-319-96878-0</a><br/>Format:&#160;Electronic Resources<br/> Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221616 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221645 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Cremers, Cas. editor. (orcid)0000-0003-0322-2293<br/><a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format:&#160;Electronic Resources<br/> Cellular Automata 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17&ndash;21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221969 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Mauri, Giancarlo. editor. (orcid)0000-0003-3520-4022<br/><a href="https://doi.org/10.1007/978-3-319-99813-8">https://doi.org/10.1007/978-3-319-99813-8</a><br/>Format:&#160;Electronic Resources<br/> Soft Computing Systems Second International Conference, ICSCS 2018, Kollam, India, April 19&ndash;20, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221989 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Zelinka, Ivan. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1936-5">https://doi.org/10.1007/978-981-13-1936-5</a><br/>Format:&#160;Electronic Resources<br/> From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday ent://SD_ILS/0/SD_ILS:221990 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222189 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format:&#160;Electronic Resources<br/> Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28&ndash;30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221644 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Traore, Issa. editor. (orcid)0000-0003-2987-8047<br/><a href="https://doi.org/10.1007/978-3-030-03712-3">https://doi.org/10.1007/978-3-030-03712-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:221784 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03332-3">https://doi.org/10.1007/978-3-030-03332-3</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222274 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222277 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:222076 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03326-2">https://doi.org/10.1007/978-3-030-03326-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19&ndash;23, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222393 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96881-0">https://doi.org/10.1007/978-3-319-96881-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222137 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19&ndash;23, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:222591 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Shacham, Hovav. editor.<br/><a href="https://doi.org/10.1007/978-3-319-96884-1">https://doi.org/10.1007/978-3-319-96884-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III ent://SD_ILS/0/SD_ILS:222895 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78372-7">https://doi.org/10.1007/978-3-319-78372-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II ent://SD_ILS/0/SD_ILS:222896 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78375-8">https://doi.org/10.1007/978-3-319-78375-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I ent://SD_ILS/0/SD_ILS:222897 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78381-9">https://doi.org/10.1007/978-3-319-78381-9</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 9th International Workshop, COSADE 2018, Singapore, April 23&ndash;24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222906 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Fan, Junfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89641-0">https://doi.org/10.1007/978-3-319-89641-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222802 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197<br/><a href="https://doi.org/10.1007/978-3-030-03329-3">https://doi.org/10.1007/978-3-030-03329-3</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Cyber Security First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221282 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Li, Fagen. editor. (orcid)0000-0001-6289-1265<br/><a href="https://doi.org/10.1007/978-981-13-3095-7">https://doi.org/10.1007/978-981-13-3095-7</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applications ent://SD_ILS/0/SD_ILS:221503 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;K&auml;vrestad, Joakim. author.<br/><a href="https://doi.org/10.1007/978-3-319-96319-8">https://doi.org/10.1007/978-3-319-96319-8</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 16th International Conference, CANS 2017, Hong Kong, China, November 30&mdash;December 2, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221530 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Capkun, Srdjan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02641-7">https://doi.org/10.1007/978-3-030-02641-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:224900 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format:&#160;Electronic Resources<br/> Number-Theoretic Methods in Cryptology First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225176 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kaczorowski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76620-1">https://doi.org/10.1007/978-3-319-76620-1</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:224538 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76578-5">https://doi.org/10.1007/978-3-319-76578-5</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Communications and Network Computing First International Conference, UBICNET 2017, Bangalore, India, August 3-5, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226188 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kumar, Navin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73423-1">https://doi.org/10.1007/978-3-319-73423-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 17th International Conference, CANS 2018, Naples, Italy, September 30 &ndash; October 3, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222099 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Camenisch, Jan. editor. (orcid)0000-0001-6654-9459<br/><a href="https://doi.org/10.1007/978-3-030-00434-7">https://doi.org/10.1007/978-3-030-00434-7</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2018 19th International Conference on Cryptology in India, New Delhi, India, December 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222048 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Chakraborty, Debrup. editor. (orcid)0000-0001-5179-1971<br/><a href="https://doi.org/10.1007/978-3-030-05378-9">https://doi.org/10.1007/978-3-030-05378-9</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222717 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:222808 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223280 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format:&#160;Electronic Resources<br/> Mobile Networks and Management 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223687 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hu, Jiankun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90775-8">https://doi.org/10.1007/978-3-319-90775-8</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:223516 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Cuppens, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76687-4">https://doi.org/10.1007/978-3-319-76687-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:225557 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Electronic Resources<br/> Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222584 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format:&#160;Electronic Resources<br/> Smart Secure Systems &ndash; IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222677 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Venkataramani, Guru Prasadh. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224628 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225223 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76581-5">https://doi.org/10.1007/978-3-319-76581-5</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography &ndash; SAC 2017 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225671 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Adams, Carlisle. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72565-9">https://doi.org/10.1007/978-3-319-72565-9</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222545 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Budaghyan, Lilya. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222594 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/> Algorithms and Architectures for Parallel Processing ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222811 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hu, Ting. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05234-8">https://doi.org/10.1007/978-3-030-05234-8</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25&ndash;26, and December 15&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:222755 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format:&#160;Electronic Resources<br/> Random Numbers and Computers ent://SD_ILS/0/SD_ILS:222849 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kneusel, Ronald T. author.<br/><a href="https://doi.org/10.1007/978-3-319-77697-2">https://doi.org/10.1007/978-3-319-77697-2</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2018 The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222850 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Smart, Nigel P. editor. (orcid)0000-0003-3567-3304<br/><a href="https://doi.org/10.1007/978-3-319-76953-0">https://doi.org/10.1007/978-3-319-76953-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223485 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format:&#160;Electronic Resources<br/> Fault Tolerant Architectures for Cryptography and Hardware Security ent://SD_ILS/0/SD_ILS:223437 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;PATRANABIS, SIKHAR. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1387-4">https://doi.org/10.1007/978-981-10-1387-4</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221828 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222633 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Chen, Qingfeng. editor.<br/><a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format:&#160;Electronic Resources<br/> Reconfigurable Cryptographic Processor ent://SD_ILS/0/SD_ILS:223101 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Liu, Leibo. author.<br/><a href="https://doi.org/10.1007/978-981-10-8899-5">https://doi.org/10.1007/978-981-10-8899-5</a><br/>Format:&#160;Electronic Resources<br/> The Hardware Trojan War Attacks, Myths, and Defenses ent://SD_ILS/0/SD_ILS:223319 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Bhunia, Swarup. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3&ndash;5, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:223249 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:224801 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kim, Howon. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224989 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226673 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Rak, Jacek. editor.<br/><a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format:&#160;Electronic Resources<br/> Data Analytics and Decision Support for Cybersecurity Trends, Methodologies and Applications ent://SD_ILS/0/SD_ILS:226804 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Palomares Carrascosa, Iv&aacute;n. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59439-2">https://doi.org/10.1007/978-3-319-59439-2</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXV 25th International Workshop, Cambridge, UK, March 20&ndash;22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226536 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71075-4">https://doi.org/10.1007/978-3-319-71075-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20&ndash;24, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:226241 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63697-9">https://doi.org/10.1007/978-3-319-63697-9</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI Special Issue on Data and Security Engineering ent://SD_ILS/0/SD_ILS:226147 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54173-9">https://doi.org/10.1007/978-3-662-54173-9</a><br/>Format:&#160;Electronic Resources<br/> Paradigms in Cryptology &ndash; Mycrypt 2016. Malicious and Exploratory Cryptology Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226158 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Phan, Rapha&euml;l C.-W. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61273-7">https://doi.org/10.1007/978-3-319-61273-7</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226881 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67816-0">https://doi.org/10.1007/978-3-319-67816-0</a><br/>Format:&#160;Electronic Resources<br/> Radio Frequency Identification and IoT Security 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 -- December 2, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226822 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hancke, Gerhard P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62024-4">https://doi.org/10.1007/978-3-319-62024-4</a><br/>Format:&#160;Electronic Resources<br/> Electronic Voting Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226435 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-319-68687-5">https://doi.org/10.1007/978-3-319-68687-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3&ndash;5, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225278 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-59870-3">https://doi.org/10.1007/978-3-319-59870-3</a><br/>Format:&#160;Electronic Resources<br/> Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225302 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Cuppens-Boulahia, Nora. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61437-3">https://doi.org/10.1007/978-3-319-61437-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225440 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format:&#160;Electronic Resources<br/> Guide to Security in SDN and NFV Challenges, Opportunities, and Applications ent://SD_ILS/0/SD_ILS:225612 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Zhu, Shao Ying. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format:&#160;Electronic Resources<br/> Guide to Digital Forensics A Concise and Practical Introduction ent://SD_ILS/0/SD_ILS:225883 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;K&auml;vrestad, Joakim. author.<br/><a href="https://doi.org/10.1007/978-3-319-67450-6">https://doi.org/10.1007/978-3-319-67450-6</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18&ndash;20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224543 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Dacier, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66332-6">https://doi.org/10.1007/978-3-319-66332-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:225929 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kalai, Yael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70500-2">https://doi.org/10.1007/978-3-319-70500-2</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225930 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kalai, Yael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70503-3">https://doi.org/10.1007/978-3-319-70503-3</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:221204 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Nematollahi, Mohammad Ali. author.<br/><a href="https://doi.org/10.1007/978-981-10-2095-7">https://doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2016 19th International Conference, Seoul, South Korea, November 30 &ndash; December 2, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221296 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hong, Seokhie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53177-9">https://doi.org/10.1007/978-3-319-53177-9</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - AFRICACRYPT 2017 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221327 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Joye, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57339-7">https://doi.org/10.1007/978-3-319-57339-7</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221354 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Okamoto, Tatsuaki. editor. (orcid)0000-0002-8145-5474<br/><a href="https://doi.org/10.1007/978-3-319-68637-0">https://doi.org/10.1007/978-3-319-68637-0</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXXI 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221175 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Livraga, Giovanni. editor. (orcid)0000-0003-2661-8573<br/><a href="https://doi.org/10.1007/978-3-319-61176-1">https://doi.org/10.1007/978-3-319-61176-1</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:221571 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68542-7">https://doi.org/10.1007/978-3-319-68542-7</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221365 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72395-2">https://doi.org/10.1007/978-3-319-72395-2</a><br/>Format:&#160;Electronic Resources<br/> Theory and Models for Cyber Situation Awareness ent://SD_ILS/0/SD_ILS:223830 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61152-5">https://doi.org/10.1007/978-3-319-61152-5</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222093 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534<br/><a href="https://doi.org/10.1007/978-3-319-64647-3">https://doi.org/10.1007/978-3-319-64647-3</a><br/>Format:&#160;Electronic Resources<br/> Electronic Voting First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:221699 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-319-52240-1">https://doi.org/10.1007/978-3-319-52240-1</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8&ndash;10, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221362 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lipmaa, Helger. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70290-2">https://doi.org/10.1007/978-3-319-70290-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13&ndash;15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222178 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72359-4">https://doi.org/10.1007/978-3-319-72359-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221747 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented and Cloud Computing 6th IFIP WG 2.14 European Conference, ESOCC 2017, Oslo, Norway, September 27-29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221748 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;De Paoli, Flavio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67262-5">https://doi.org/10.1007/978-3-319-67262-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 &ndash; May 4, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:223803 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Coron, Jean-S&eacute;bastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56614-6">https://doi.org/10.1007/978-3-319-56614-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20&ndash;24, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221654 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63688-7">https://doi.org/10.1007/978-3-319-63688-7</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2017 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223842 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Fischer, Wieland. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66787-4">https://doi.org/10.1007/978-3-319-66787-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:223844 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Choi, Dooho. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56549-1">https://doi.org/10.1007/978-3-319-56549-1</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXIV 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221738 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Anderson, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62033-6">https://doi.org/10.1007/978-3-319-62033-6</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Networking Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221758 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Sabir, Essaid. editor. (orcid)0000-0001-9946-5761<br/><a href="https://doi.org/10.1007/978-3-319-68179-5">https://doi.org/10.1007/978-3-319-68179-5</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 9th International Symposium, FPS 2016, Qu&eacute;bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222389 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51966-1">https://doi.org/10.1007/978-3-319-51966-1</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Watermarking 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222084 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kraetzer, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64185-0">https://doi.org/10.1007/978-3-319-64185-0</a><br/>Format:&#160;Electronic Resources<br/> Codes, Cryptology and Information Security Second International Conference, C2SI 2017, Rabat, Morocco, April 10&ndash;12, 2017, Proceedings - In Honor of Claude Carlet ent://SD_ILS/0/SD_ILS:222201 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;El Hajji, Said. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55589-8">https://doi.org/10.1007/978-3-319-55589-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222211 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Chen, Kefei. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54705-3">https://doi.org/10.1007/978-3-319-54705-3</a><br/>Format:&#160;Electronic Resources<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:222151 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Mishra, Prabhat. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Electronic Resources<br/> Feistel Ciphers Security Proofs and Cryptanalysis ent://SD_ILS/0/SD_ILS:224720 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Nachef, Valerie. author.<br/><a href="https://doi.org/10.1007/978-3-319-49530-9">https://doi.org/10.1007/978-3-319-49530-9</a><br/>Format:&#160;Electronic Resources<br/> Ethical and Social Issues in the Information Age ent://SD_ILS/0/SD_ILS:222840 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-319-70712-9">https://doi.org/10.1007/978-3-319-70712-9</a><br/>Format:&#160;Electronic Resources<br/> Hardware Protection through Obfuscation ent://SD_ILS/0/SD_ILS:223698 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Forte, Domenic. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49019-9">https://doi.org/10.1007/978-3-319-49019-9</a><br/>Format:&#160;Electronic Resources<br/> On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids ent://SD_ILS/0/SD_ILS:224409 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Borges de Oliveira, F&aacute;bio. author.<br/><a href="https://doi.org/10.1007/978-3-319-40718-0">https://doi.org/10.1007/978-3-319-40718-0</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6&ndash;7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221372 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/><a href="https://doi.org/10.1007/978-981-10-5421-1">https://doi.org/10.1007/978-981-10-5421-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Computing and Communication First International Conference, SmartCom 2016, Shenzhen, China, December 17-19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:221678 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Qiu, Meikang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52015-5">https://doi.org/10.1007/978-3-319-52015-5</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Security Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 &ndash; December 3, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226619 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Chang, Victor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54380-2">https://doi.org/10.1007/978-3-319-54380-2</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:224512 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Bogdanov, Andrey. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55714-4">https://doi.org/10.1007/978-3-319-55714-4</a><br/>Format:&#160;Electronic Resources<br/> Secure and Trustworthy Transportation Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:224820 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Sun, Yunchuan. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3892-1">https://doi.org/10.1007/978-981-10-3892-1</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:224426 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54388-7">https://doi.org/10.1007/978-3-662-54388-7</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:225408 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68505-2">https://doi.org/10.1007/978-3-319-68505-2</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography &ndash; SAC 2016 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225421 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Avanzi, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69453-5">https://doi.org/10.1007/978-3-319-69453-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20&ndash;24, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225795 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63715-0">https://doi.org/10.1007/978-3-319-63715-0</a><br/>Format:&#160;Electronic Resources<br/> Network Security Metrics ent://SD_ILS/0/SD_ILS:225710 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Wang, Lingyu. author.<br/><a href="https://doi.org/10.1007/978-3-319-66505-4">https://doi.org/10.1007/978-3-319-66505-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225996 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226478 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222113 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72389-1">https://doi.org/10.1007/978-3-319-72389-1</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 &ndash; December 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223507 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70004-5">https://doi.org/10.1007/978-3-319-70004-5</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 20th International Conference, FC 2016, Christ Church, Barbados, February 22&ndash;26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:224868 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Grossklags, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54970-4">https://doi.org/10.1007/978-3-662-54970-4</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226616 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Bodden, Eric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62105-0">https://doi.org/10.1007/978-3-319-62105-0</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2017 The Cryptographers&rsquo; Track at the RSA Conference 2017, San Francisco, CA, USA, February 14&ndash;17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224973 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Handschuh, Helena. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52153-4">https://doi.org/10.1007/978-3-319-52153-4</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223564 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64483-7">https://doi.org/10.1007/978-3-319-64483-7</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226587 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59879-6">https://doi.org/10.1007/978-3-319-59879-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226595 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Nguyen, Phong Q. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69659-1">https://doi.org/10.1007/978-3-319-69659-1</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224508 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Polychronakis, Michalis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60876-1">https://doi.org/10.1007/978-3-319-60876-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 &ndash; May 4, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:224897 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Coron, Jean-S&eacute;bastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56617-7">https://doi.org/10.1007/978-3-319-56617-7</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226655 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54876-0">https://doi.org/10.1007/978-3-319-54876-0</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224692 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;O'Neill, M&aacute;ire. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71045-7">https://doi.org/10.1007/978-3-319-71045-7</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI Special Issue on Data and Security Engineering ent://SD_ILS/0/SD_ILS:222784 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56266-6">https://doi.org/10.1007/978-3-662-56266-6</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223105 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Gollmann, Dieter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61204-1">https://doi.org/10.1007/978-3-319-61204-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings ent://SD_ILS/0/SD_ILS:222763 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Deng, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59608-2">https://doi.org/10.1007/978-3-319-59608-2</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Safety and Security 9th International Symposium, CSS 2017, Xi&rsquo;an China, October 23&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223130 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Wen, Sheng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69471-9">https://doi.org/10.1007/978-3-319-69471-9</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223131 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Ali, Sk Subidh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71501-8">https://doi.org/10.1007/978-3-319-71501-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2017 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223132 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Patra, Arpita. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71667-1">https://doi.org/10.1007/978-3-319-71667-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222250 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:222251 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format:&#160;Electronic Resources<br/> Animal Biometrics Techniques and Applications ent://SD_ILS/0/SD_ILS:224841 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kumar, Santosh. author.<br/><a href="https://doi.org/10.1007/978-981-10-7956-6">https://doi.org/10.1007/978-981-10-7956-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225377 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Watermarking 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225391 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Shi, Yun Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53465-7">https://doi.org/10.1007/978-3-319-53465-7</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225498 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Brenner, Michael. editor. (orcid)0000-0003-2690-7340<br/><a href="https://doi.org/10.1007/978-3-319-70278-0">https://doi.org/10.1007/978-3-319-70278-0</a><br/>Format:&#160;Electronic Resources<br/> Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications 5th International Symposium, CompIMAGE 2016, Niagara Falls, NY, USA, September 21-23, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225260 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Barneva, Reneta P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54609-4">https://doi.org/10.1007/978-3-319-54609-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 &ndash; September 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225140 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Obana, Satoshi. editor. (orcid)0000-0003-4795-4779<br/><a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226180 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kiayias, Aggelos. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70972-7">https://doi.org/10.1007/978-3-319-70972-7</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 15th International Conference, CARDIS 2016, Cannes, France, November 7&ndash;9, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222560 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lemke-Rust, Kerstin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54669-8">https://doi.org/10.1007/978-3-319-54669-8</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222885 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Xu, Ming. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7080-8">https://doi.org/10.1007/978-981-10-7080-8</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224736 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;De Capitani di Vimercati, Sabrina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58469-0">https://doi.org/10.1007/978-3-319-58469-0</a><br/>Format:&#160;Electronic Resources<br/> Secure and Privacy-Preserving Data Communication in Internet of Things ent://SD_ILS/0/SD_ILS:224001 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Zhu, Liehuang. author.<br/><a href="https://doi.org/10.1007/978-981-10-3235-6">https://doi.org/10.1007/978-981-10-3235-6</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223963 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 &ndash; May 4, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:224259 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Coron, Jean-S&eacute;bastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56620-7">https://doi.org/10.1007/978-3-319-56620-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3&ndash;5, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:225946 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-60055-0">https://doi.org/10.1007/978-3-319-60055-0</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226935 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54365-8">https://doi.org/10.1007/978-3-662-54365-8</a><br/>Format:&#160;Electronic Resources<br/> Mobile, Secure, and Programmable Networking Third International Conference, MSPN 2017, Paris, France, June 29-30, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226551 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Bouzefrane, Samia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67807-8">https://doi.org/10.1007/978-3-319-67807-8</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225656 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Camp, Olivier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54433-5">https://doi.org/10.1007/978-3-319-54433-5</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 11th International Conference, NSS 2017, Helsinki, Finland, August 21&ndash;23, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226900 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Yan, Zheng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64701-2">https://doi.org/10.1007/978-3-319-64701-2</a><br/>Format:&#160;Electronic Resources<br/> Risk Assessment and Risk-Driven Quality Assurance 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226913 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Gro&szlig;mann, J&uuml;rgen. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57858-3">https://doi.org/10.1007/978-3-319-57858-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:643544 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Stallings, William.<br/>Format:&#160;Kitap<br/> Progress in Cryptology &ndash; AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17644 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31517-1">http://dx.doi.org/10.1007/978-3-319-31517-1</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Techniques in Curvelet and Ridgelet Domain ent://SD_ILS/0/SD_ILS:17807 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Rao, Channapragada Rama Seshagiri. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32951-2">http://dx.doi.org/10.1007/978-3-319-32951-2</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17694 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31960-5">http://dx.doi.org/10.1007/978-3-319-31960-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26&ndash;27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18359 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45931-8">http://dx.doi.org/10.1007/978-3-319-45931-8</a><br/>Format:&#160;Electronic Resources<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:17708 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Colbert, Edward J. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32125-7">http://dx.doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18397 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Barthe, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46598-2">http://dx.doi.org/10.1007/978-3-319-46598-2</a><br/>Format:&#160;Electronic Resources<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18331 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Buccafurri, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45507-5">http://dx.doi.org/10.1007/978-3-319-45507-5</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18413 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Livraga, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47072-6">http://dx.doi.org/10.1007/978-3-319-47072-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III ent://SD_ILS/0/SD_ILS:18679 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53015-3">http://dx.doi.org/10.1007/978-3-662-53015-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18680 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53018-4">http://dx.doi.org/10.1007/978-3-662-53018-4</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18617 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49096-9">http://dx.doi.org/10.1007/978-3-662-49096-9</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18618 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49099-0">http://dx.doi.org/10.1007/978-3-662-49099-0</a><br/>Format:&#160;Electronic Resources<br/> Ethics in Computing A Concise Module ent://SD_ILS/0/SD_ILS:17327 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29106-2">http://dx.doi.org/10.1007/978-3-319-29106-2</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18236 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Standaert, Fran&ccedil;ois-Xavier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43283-0">http://dx.doi.org/10.1007/978-3-319-43283-0</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18154 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Ranise, Silvio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41483-6">http://dx.doi.org/10.1007/978-3-319-41483-6</a><br/>Format:&#160;Electronic Resources<br/> Elements of Cloud Computing Security A Survey of Key Practicalities ent://SD_ILS/0/SD_ILS:18152 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Alani, Mohammed M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41411-9">http://dx.doi.org/10.1007/978-3-319-41411-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17560 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kwon, Soonhak. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30840-1">http://dx.doi.org/10.1007/978-3-319-30840-1</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17413 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17489 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30303-1">http://dx.doi.org/10.1007/978-3-319-30303-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Enhancing Aggregation Techniques for Smart Grid Communications ent://SD_ILS/0/SD_ILS:17802 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lu, Rongxing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32899-7">http://dx.doi.org/10.1007/978-3-319-32899-7</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17955 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18264 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kő, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44159-7">http://dx.doi.org/10.1007/978-3-319-44159-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18073 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40253-6">http://dx.doi.org/10.1007/978-3-319-40253-6</a><br/>Format:&#160;Electronic Resources<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18274 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hartmann, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44403-1">http://dx.doi.org/10.1007/978-3-319-44403-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18085 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40367-0">http://dx.doi.org/10.1007/978-3-319-40367-0</a><br/>Format:&#160;Electronic Resources<br/> Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21&ndash;22, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:18089 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;B&eacute;cue, Adrien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40385-4">http://dx.doi.org/10.1007/978-3-319-40385-4</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18379 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18006 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Understanding Social Engineering Based Scams ent://SD_ILS/0/SD_ILS:16480 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Jakobsson, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-6457-4">http://dx.doi.org/10.1007/978-1-4939-6457-4</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cyberdeception ent://SD_ILS/0/SD_ILS:18142 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Rowe, Neil C. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41187-3">http://dx.doi.org/10.1007/978-3-319-41187-3</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings ent://SD_ILS/0/SD_ILS:19184 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Mueller, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2738-3">http://dx.doi.org/10.1007/978-981-10-2738-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18678 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53008-5">http://dx.doi.org/10.1007/978-3-662-53008-5</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10&ndash;11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17324 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;G&uuml;neysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29078-2">http://dx.doi.org/10.1007/978-3-319-29078-2</a><br/>Format:&#160;Electronic Resources<br/> SOFSEM 2016: Theory and Practice of Computer Science 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18627 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Freivalds, Rūsiņ&scaron; Mārtiņ&scaron;. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49192-8">http://dx.doi.org/10.1007/978-3-662-49192-8</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17333 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Pasalic, Enes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29172-7">http://dx.doi.org/10.1007/978-3-319-29172-7</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:19185 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Batten, Lynn. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2741-3">http://dx.doi.org/10.1007/978-981-10-2741-3</a><br/>Format:&#160;Electronic Resources<br/> Mobile and Wireless Technologies 2016 ent://SD_ILS/0/SD_ILS:19131 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1409-3">http://dx.doi.org/10.1007/978-981-10-1409-3</a><br/>Format:&#160;Electronic Resources<br/> Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applications ent://SD_ILS/0/SD_ILS:18217 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Liu, Wen Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42644-0">http://dx.doi.org/10.1007/978-3-319-42644-0</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:18231 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43005-8">http://dx.doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings ent://SD_ILS/0/SD_ILS:17556 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Caballero, Juan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30806-7">http://dx.doi.org/10.1007/978-3-319-30806-7</a><br/>Format:&#160;Electronic Resources<br/> Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches ent://SD_ILS/0/SD_ILS:17798 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32871-3">http://dx.doi.org/10.1007/978-3-319-32871-3</a><br/>Format:&#160;Electronic Resources<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18275 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hartmann, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44406-2">http://dx.doi.org/10.1007/978-3-319-44406-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18376 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Peterson, Gilbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46279-0">http://dx.doi.org/10.1007/978-3-319-46279-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 &ndash; September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18288 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Zikas, Vassilis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44618-9">http://dx.doi.org/10.1007/978-3-319-44618-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18324 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45381-1">http://dx.doi.org/10.1007/978-3-319-45381-1</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18653 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Watermarking Security ent://SD_ILS/0/SD_ILS:19035 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Bas, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0506-0">http://dx.doi.org/10.1007/978-981-10-0506-0</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17353 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Takagi, Tsuyoshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29360-8">http://dx.doi.org/10.1007/978-3-319-29360-8</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17368 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Sako, Kazue. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29485-8">http://dx.doi.org/10.1007/978-3-319-29485-8</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:17428 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17675 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31811-0">http://dx.doi.org/10.1007/978-3-319-31811-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18282 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Ogawa, Kazuto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44524-3">http://dx.doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18662 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49890-3">http://dx.doi.org/10.1007/978-3-662-49890-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18663 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49896-5">http://dx.doi.org/10.1007/978-3-662-49896-5</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18677 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Peyrin, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-52993-5">http://dx.doi.org/10.1007/978-3-662-52993-5</a><br/>Format:&#160;Electronic Resources<br/> The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday ent://SD_ILS/0/SD_ILS:18635 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Ryan, Peter Y. A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49301-4">http://dx.doi.org/10.1007/978-3-662-49301-4</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18638 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49384-7">http://dx.doi.org/10.1007/978-3-662-49384-7</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18639 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49387-8">http://dx.doi.org/10.1007/978-3-662-49387-8</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17868 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Hoepman, Jaap-Henk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33630-5">http://dx.doi.org/10.1007/978-3-319-33630-5</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:17421 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29883-2">http://dx.doi.org/10.1007/978-3-319-29883-2</a><br/>Format:&#160;Electronic Resources<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:17777 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:17618 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Homma, Naofumi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31271-2">http://dx.doi.org/10.1007/978-3-319-31271-2</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography - SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17623 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Dunkelman, Orr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31301-6">http://dx.doi.org/10.1007/978-3-319-31301-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17683 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Kim, Ho-won. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31875-2">http://dx.doi.org/10.1007/978-3-319-31875-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18352 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45871-7">http://dx.doi.org/10.1007/978-3-319-45871-7</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18270 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44341-6">http://dx.doi.org/10.1007/978-3-319-44341-6</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18337 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18344 2024-05-04T14:08:01Z 2024-05-04T14:08:01Z Yazar&#160;Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45741-3">http://dx.doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/>