Search Results for - Narrowed by: SpringerLink (Online service) - Data Encryption.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Subject$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300?2024-05-26T17:34:52ZInformation Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035862024-05-26T17:34:52Z2024-05-26T17:34:52Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036002024-05-26T17:34:52Z2024-05-26T17:34:52Zby Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036492024-05-26T17:34:52Z2024-05-26T17:34:52Zby Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format: Electronic Resources<br/>Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5037892024-05-26T17:34:52Z2024-05-26T17:34:52Zby Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026232024-05-26T17:34:52Z2024-05-26T17:34:52Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format: Electronic Resources<br/>Securing Biometrics Applicationsent://SD_ILS/0/SD_ILS:5016522024-05-26T17:34:52Z2024-05-26T17:34:52Zby Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format: Electronic Resources<br/>Handbook of Biometricsent://SD_ILS/0/SD_ILS:5016622024-05-26T17:34:52Z2024-05-26T17:34:52Zby Jain, Anil K. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-71041-9">http://dx.doi.org/10.1007/978-0-387-71041-9</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028122024-05-26T17:34:52Z2024-05-26T17:34:52Zby Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format: Electronic Resources<br/>Algorithmic Number Theory 8th International Symposium, ANTS-VIII Banff, Canada, May 17-22, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5035262024-05-26T17:34:52Z2024-05-26T17:34:52Zby Poorten, Alfred J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79456-1">http://dx.doi.org/10.1007/978-3-540-79456-1</a><br/>Format: Electronic Resources<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038392024-05-26T17:34:52Z2024-05-26T17:34:52Zby Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2008 The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035032024-05-26T17:34:52Z2024-05-26T17:34:52Zby Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IIIent://SD_ILS/0/SD_ILS:5026992024-05-26T17:34:52Z2024-05-26T17:34:52Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format: Electronic Resources<br/>RFID Security Techniques, Protocols and System-on-Chip Designent://SD_ILS/0/SD_ILS:5018732024-05-26T17:34:52Z2024-05-26T17:34:52Zby Kitsos, Paris. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-76481-8">http://dx.doi.org/10.1007/978-0-387-76481-8</a><br/>Format: Electronic Resources<br/>Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027502024-05-26T17:34:52Z2024-05-26T17:34:52Zby Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027592024-05-26T17:34:52Z2024-05-26T17:34:52Zby Gathen, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69499-1">http://dx.doi.org/10.1007/978-3-540-69499-1</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033872024-05-26T17:34:52Z2024-05-26T17:34:52Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038212024-05-26T17:34:52Z2024-05-26T17:34:52Zby Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format: Electronic Resources<br/>IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036802024-05-26T17:34:52Z2024-05-26T17:34:52Zby Akar, Nail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036842024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format: Electronic Resources<br/>Coding Theory and Applications Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036882024-05-26T17:34:52Z2024-05-26T17:34:52Zby Barbero, Ángela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87448-5">http://dx.doi.org/10.1007/978-3-540-87448-5</a><br/>Format: Electronic Resources<br/>An Introduction to Mathematical Cryptographyent://SD_ILS/0/SD_ILS:5019382024-05-26T17:34:52Z2024-05-26T17:34:52Zby Silverman, J.H. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:5016902024-05-26T17:34:52Z2024-05-26T17:34:52Zby Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027322024-05-26T17:34:52Z2024-05-26T17:34:52Zby Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69304-8">http://dx.doi.org/10.1007/978-3-540-69304-8</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027562024-05-26T17:34:52Z2024-05-26T17:34:52Zby Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5028032024-05-26T17:34:52Z2024-05-26T17:34:52Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5036102024-05-26T17:34:52Z2024-05-26T17:34:52Zby Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033722024-05-26T17:34:52Z2024-05-26T17:34:52Zby Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038322024-05-26T17:34:52Z2024-05-26T17:34:52Zby Chowdhury, Dipanwita Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format: Electronic Resources<br/>Network and Parallel Computing IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037402024-05-26T17:34:52Z2024-05-26T17:34:52Zby Cao, Jian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88140-7">http://dx.doi.org/10.1007/978-3-540-88140-7</a><br/>Format: Electronic Resources<br/>Mathematical Methods in Computer Science Essays in Memory of Thomas Bethent://SD_ILS/0/SD_ILS:5038492024-05-26T17:34:52Z2024-05-26T17:34:52Zby Calmet, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89994-5">http://dx.doi.org/10.1007/978-3-540-89994-5</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037532024-05-26T17:34:52Z2024-05-26T17:34:52Zby Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037772024-05-26T17:34:52Z2024-05-26T17:34:52Zby Baek, Joonsang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88733-1">http://dx.doi.org/10.1007/978-3-540-88733-1</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5028552024-05-26T17:34:52Z2024-05-26T17:34:52Zby Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71039-4">http://dx.doi.org/10.1007/978-3-540-71039-4</a><br/>Format: Electronic Resources<br/>Handbook of Database Security Applications and Trendsent://SD_ILS/0/SD_ILS:5015832024-05-26T17:34:52Z2024-05-26T17:34:52Zby Gertz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format: Electronic Resources<br/>Cryptanalytic Attacks on RSAent://SD_ILS/0/SD_ILS:5015842024-05-26T17:34:52Z2024-05-26T17:34:52Zby Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Network-Aware Security for Group Communicationsent://SD_ILS/0/SD_ILS:5016322024-05-26T17:34:52Z2024-05-26T17:34:52Zby Sun, Yan. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68848-0">http://dx.doi.org/10.1007/978-0-387-68848-0</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028272024-05-26T17:34:52Z2024-05-26T17:34:52Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027302024-05-26T17:34:52Z2024-05-26T17:34:52Zby Rong, Chunming. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027932024-05-26T17:34:52Z2024-05-26T17:34:52Zby Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5035332024-05-26T17:34:52Z2024-05-26T17:34:52Zby Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2008 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035762024-05-26T17:34:52Z2024-05-26T17:34:52Zby Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85053-3">http://dx.doi.org/10.1007/978-3-540-85053-3</a><br/>Format: Electronic Resources<br/>Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5037912024-05-26T17:34:52Z2024-05-26T17:34:52Zby Schulzrinne, Henning. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5037932024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038002024-05-26T17:34:52Z2024-05-26T17:34:52Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Privacy-Preserving Data Mining Models and Algorithmsent://SD_ILS/0/SD_ILS:5016612024-05-26T17:34:52Z2024-05-26T17:34:52Zby Aggarwal, Charu C. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-70992-5">http://dx.doi.org/10.1007/978-0-387-70992-5</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Techniques and Applicationsent://SD_ILS/0/SD_ILS:5027212024-05-26T17:34:52Z2024-05-26T17:34:52Zby Chen, Hsinchun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69209-6">http://dx.doi.org/10.1007/978-3-540-69209-6</a><br/>Format: Electronic Resources<br/>Security for Telecommunications Networksent://SD_ILS/0/SD_ILS:5016992024-05-26T17:34:52Z2024-05-26T17:34:52Zby Traynor, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Intrusion Detection Systemsent://SD_ILS/0/SD_ILS:5019102024-05-26T17:34:52Z2024-05-26T17:34:52Zby Mancini, Luigi V. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Insider Attack and Cyber Security Beyond the Hackerent://SD_ILS/0/SD_ILS:5019132024-05-26T17:34:52Z2024-05-26T17:34:52Zby Stolfo, Salvatore J. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Botnet Detection Countering the Largest Security Threatent://SD_ILS/0/SD_ILS:5016272024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lee, Wenke. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Vulnerability Analysis and Defense for the Internetent://SD_ILS/0/SD_ILS:5017872024-05-26T17:34:52Z2024-05-26T17:34:52Zby Singh, Abhishek. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026912024-05-26T17:34:52Z2024-05-26T17:34:52Zby Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026942024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lipp, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68979-9">http://dx.doi.org/10.1007/978-3-540-68979-9</a><br/>Format: Electronic Resources<br/>Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036132024-05-26T17:34:52Z2024-05-26T17:34:52Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5034552024-05-26T17:34:52Z2024-05-26T17:34:52Zby Smart, Nigel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format: Electronic Resources<br/>RFID Security and Privacy Concepts, Protocols, and Architecturesent://SD_ILS/0/SD_ILS:5034782024-05-26T17:34:52Z2024-05-26T17:34:52Zby Henrici, Dirk. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79076-1">http://dx.doi.org/10.1007/978-3-540-79076-1</a><br/>Format: Electronic Resources<br/>Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037672024-05-26T17:34:52Z2024-05-26T17:34:52Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Random Curves Journeys of a Mathematicianent://SD_ILS/0/SD_ILS:5029852024-05-26T17:34:52Z2024-05-26T17:34:52Zby Koblitz, Neal. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74078-0">http://dx.doi.org/10.1007/978-3-540-74078-0</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036332024-05-26T17:34:52Z2024-05-26T17:34:52Zby Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037492024-05-26T17:34:52Z2024-05-26T17:34:52Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Electronic Resources<br/>Research in Cryptology Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5037512024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lucks, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88353-1">http://dx.doi.org/10.1007/978-3-540-88353-1</a><br/>Format: Electronic Resources<br/>Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5038592024-05-26T17:34:52Z2024-05-26T17:34:52Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5034812024-05-26T17:34:52Z2024-05-26T17:34:52Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035632024-05-26T17:34:52Z2024-05-26T17:34:52Zby Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036602024-05-26T17:34:52Z2024-05-26T17:34:52Zby Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036622024-05-26T17:34:52Z2024-05-26T17:34:52Zby Wu, Tzong-Chen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85886-7">http://dx.doi.org/10.1007/978-3-540-85886-7</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036642024-05-26T17:34:52Z2024-05-26T17:34:52Zby Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications - SETA 2008 5th International Conference Lexington, KY, USA, September 14-18, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036662024-05-26T17:34:52Z2024-05-26T17:34:52Zby Golomb, Solomon W. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85912-3">http://dx.doi.org/10.1007/978-3-540-85912-3</a><br/>Format: Electronic Resources<br/>Malware Detectionent://SD_ILS/0/SD_ILS:5055692024-05-26T17:34:52Z2024-05-26T17:34:52Zby Christodorescu, Mihai. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Electronic Postage Systems Technology, Security, Economicsent://SD_ILS/0/SD_ILS:5055712024-05-26T17:34:52Z2024-05-26T17:34:52Zby Bleumer, Gerrit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Topics in Geometry, Coding Theory and Cryptographyent://SD_ILS/0/SD_ILS:5072292024-05-26T17:34:52Z2024-05-26T17:34:52Zby Garcia, Arnaldo. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128252024-05-26T17:34:52Z2024-05-26T17:34:52Zby Paillier, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74735-2">http://dx.doi.org/10.1007/978-3-540-74735-2</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123812024-05-26T17:34:52Z2024-05-26T17:34:52Zby Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128462024-05-26T17:34:52Z2024-05-26T17:34:52Zby Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format: Electronic Resources<br/>Emerging Directions in Embedded and Ubiquitous Computing EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130092024-05-26T17:34:52Z2024-05-26T17:34:52Zby Denko, Mieso K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77090-9">http://dx.doi.org/10.1007/978-3-540-77090-9</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2007 First International Conference, Tokyo, Japan, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126802024-05-26T17:34:52Z2024-05-26T17:34:52Zby Takagi, Tsuyoshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5127932024-05-26T17:34:52Z2024-05-26T17:34:52Zby Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format: Electronic Resources<br/>Ethical and Social Issues in the Information Ageent://SD_ILS/0/SD_ILS:5086252024-05-26T17:34:52Z2024-05-26T17:34:52Zby Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-659-9">http://dx.doi.org/10.1007/978-1-84628-659-9</a><br/>Format: Electronic Resources<br/>Secure Data Management in Decentralized Systemsent://SD_ILS/0/SD_ILS:5046902024-05-26T17:34:52Z2024-05-26T17:34:52Zby Yu, Ting. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format: Electronic Resources<br/>Security for Wireless Sensor Networksent://SD_ILS/0/SD_ILS:5056282024-05-26T17:34:52Z2024-05-26T17:34:52Zby Liu, Donggang. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Data Warehousing and Data Mining Techniques for Cyber Securityent://SD_ILS/0/SD_ILS:5056472024-05-26T17:34:52Z2024-05-26T17:34:52Zby Singhal, Anoop. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Online Business Security Systemsent://SD_ILS/0/SD_ILS:5058322024-05-26T17:34:52Z2024-05-26T17:34:52Zby Williams, Godfried B. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design IV FOSAD 2006/2007 Tutorial Lecturesent://SD_ILS/0/SD_ILS:5128372024-05-26T17:34:52Z2024-05-26T17:34:52Zby Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74810-6">http://dx.doi.org/10.1007/978-3-540-74810-6</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:5119462024-05-26T17:34:52Z2024-05-26T17:34:52Zby Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Security with Noisy Data On Private Biometrics, Secure Key Storage and Anti-Counterfeitingent://SD_ILS/0/SD_ILS:5087232024-05-26T17:34:52Z2024-05-26T17:34:52Zby Tuyls, Pim. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-984-2">http://dx.doi.org/10.1007/978-1-84628-984-2</a><br/>Format: Electronic Resources<br/>Data Compression The Complete Referenceent://SD_ILS/0/SD_ILS:5085982024-05-26T17:34:52Z2024-05-26T17:34:52Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-603-2">http://dx.doi.org/10.1007/978-1-84628-603-2</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5122482024-05-26T17:34:52Z2024-05-26T17:34:52Zby Vadhan, Salil P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5128142024-05-26T17:34:52Z2024-05-26T17:34:52Zby Biryukov, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74619-5">http://dx.doi.org/10.1007/978-3-540-74619-5</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126602024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format: Electronic Resources<br/>Information Security 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129122024-05-26T17:34:52Z2024-05-26T17:34:52Zby Garay, Juan A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75496-1">http://dx.doi.org/10.1007/978-3-540-75496-1</a><br/>Format: Electronic Resources<br/>Variable-length Codes for Data Compressionent://SD_ILS/0/SD_ILS:5087172024-05-26T17:34:52Z2024-05-26T17:34:52Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-959-0">http://dx.doi.org/10.1007/978-1-84628-959-0</a><br/>Format: Electronic Resources<br/>Embedded Java Security Security for Mobile Devicesent://SD_ILS/0/SD_ILS:5086482024-05-26T17:34:52Z2024-05-26T17:34:52Zby Debbabi, Mourad. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-711-4">http://dx.doi.org/10.1007/978-1-84628-711-4</a><br/>Format: Electronic Resources<br/>Forensic Computingent://SD_ILS/0/SD_ILS:5086562024-05-26T17:34:52Z2024-05-26T17:34:52Zby Sammes, Tony. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-732-9">http://dx.doi.org/10.1007/978-1-84628-732-9</a><br/>Format: Electronic Resources<br/>Binary Quadratic Forms An Algorithmic Approachent://SD_ILS/0/SD_ILS:5117902024-05-26T17:34:52Z2024-05-26T17:34:52Zby Buchmann, Johannes. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-46368-9">http://dx.doi.org/10.1007/978-3-540-46368-9</a><br/>Format: Electronic Resources<br/>Decrypted Secrets Methods and Maxims of Cryptologyent://SD_ILS/0/SD_ILS:5118682024-05-26T17:34:52Z2024-05-26T17:34:52Zby Bauer, Friedrich L. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126262024-05-26T17:34:52Z2024-05-26T17:34:52Zby Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format: Electronic Resources<br/>Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5122762024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lee, Jae Kwang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125902024-05-26T17:34:52Z2024-05-26T17:34:52Zby Carlet, Claude. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73074-3">http://dx.doi.org/10.1007/978-3-540-73074-3</a><br/>Format: Electronic Resources<br/>Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130072024-05-26T17:34:52Z2024-05-26T17:34:52Zby McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papersent://SD_ILS/0/SD_ILS:5129222024-05-26T17:34:52Z2024-05-26T17:34:52Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127612024-05-26T17:34:52Z2024-05-26T17:34:52Zby Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format: Electronic Resources<br/>Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130172024-05-26T17:34:52Z2024-05-26T17:34:52Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format: Electronic Resources<br/>Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129312024-05-26T17:34:52Z2024-05-26T17:34:52Zby Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5127032024-05-26T17:34:52Z2024-05-26T17:34:52Zby Hämmerli, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130322024-05-26T17:34:52Z2024-05-26T17:34:52Zby Adams, Carlisle. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papersent://SD_ILS/0/SD_ILS:5130332024-05-26T17:34:52Z2024-05-26T17:34:52Zby Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format: Electronic Resources<br/>Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130352024-05-26T17:34:52Z2024-05-26T17:34:52Zby Furon, Teddy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format: Electronic Resources<br/>Sequences, Subsequences, and Consequences International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papersent://SD_ILS/0/SD_ILS:5130372024-05-26T17:34:52Z2024-05-26T17:34:52Zby Golomb, Solomon W. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77404-4">http://dx.doi.org/10.1007/978-3-540-77404-4</a><br/>Format: Electronic Resources<br/>E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130402024-05-26T17:34:52Z2024-05-26T17:34:52Zby Alkassar, Ammar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format: Electronic Resources<br/>Practical Internet Securityent://SD_ILS/0/SD_ILS:5049522024-05-26T17:34:52Z2024-05-26T17:34:52Zby Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format: Electronic Resources<br/>Synchronizing Internet Protocol Security (SIPSec)ent://SD_ILS/0/SD_ILS:5058142024-05-26T17:34:52Z2024-05-26T17:34:52Zby Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format: Electronic Resources<br/>Economics of Identity Theft: Avoidance, Causes and Possible Curesent://SD_ILS/0/SD_ILS:5058172024-05-26T17:34:52Z2024-05-26T17:34:52Zby Camp, L. Jean. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format: Electronic Resources<br/>Power Analysis Attacks Revealing the Secrets of Smart Cardsent://SD_ILS/0/SD_ILS:5055042024-05-26T17:34:52Z2024-05-26T17:34:52Zby Mangard, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-38162-6">http://dx.doi.org/10.1007/978-0-387-38162-6</a><br/>Format: Electronic Resources<br/>Preserving Privacy in On-Line Analytical Processing (OLAP)ent://SD_ILS/0/SD_ILS:5056112024-05-26T17:34:52Z2024-05-26T17:34:52Zby Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format: Electronic Resources<br/>Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networksent://SD_ILS/0/SD_ILS:5056122024-05-26T17:34:52Z2024-05-26T17:34:52Zby Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Reliable Face Recognition Methods System Design, Impementation and Evaluationent://SD_ILS/0/SD_ILS:5055222024-05-26T17:34:52Z2024-05-26T17:34:52Zby Wechsler, Harry. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-38464-1">http://dx.doi.org/10.1007/978-0-387-38464-1</a><br/>Format: Electronic Resources<br/>Network Security Policies and Proceduresent://SD_ILS/0/SD_ILS:5056592024-05-26T17:34:52Z2024-05-26T17:34:52Zby Frye, Douglas W. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125292024-05-26T17:34:52Z2024-05-26T17:34:52Zby Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5128882024-05-26T17:34:52Z2024-05-26T17:34:52Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format: Electronic Resources<br/>Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128892024-05-26T17:34:52Z2024-05-26T17:34:52Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126872024-05-26T17:34:52Z2024-05-26T17:34:52Zby Barker, Steve. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126902024-05-26T17:34:52Z2024-05-26T17:34:52Zby Xiao, Bin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124402024-05-26T17:34:52Z2024-05-26T17:34:52Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127842024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129862024-05-26T17:34:52Z2024-05-26T17:34:52Zby Kurosawa, Kaoru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Electronic Resources<br/>Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129982024-05-26T17:34:52Z2024-05-26T17:34:52Zby Zhang, Hongke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129992024-05-26T17:34:52Z2024-05-26T17:34:52Zby Srinathan, K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77026-8">http://dx.doi.org/10.1007/978-3-540-77026-8</a><br/>Format: Electronic Resources<br/>Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130042024-05-26T17:34:52Z2024-05-26T17:34:52Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IIent://SD_ILS/0/SD_ILS:5125942024-05-26T17:34:52Z2024-05-26T17:34:52Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format: Electronic Resources<br/>Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papersent://SD_ILS/0/SD_ILS:5127562024-05-26T17:34:52Z2024-05-26T17:34:52Zby Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126752024-05-26T17:34:52Z2024-05-26T17:34:52Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Electronic Resources<br/>Terrestrial Trunked Radio - Tetra A Global Security Toolent://SD_ILS/0/SD_ILS:5122952024-05-26T17:34:52Z2024-05-26T17:34:52Zby Stavroulakis, Peter. author.<br/><a href="http://dx.doi.org/10.1007/3-540-71192-9">http://dx.doi.org/10.1007/3-540-71192-9</a><br/>Format: Electronic Resources<br/>Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130202024-05-26T17:34:52Z2024-05-26T17:34:52Zby BoztaÅŸ, Serdar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77224-8">http://dx.doi.org/10.1007/978-3-540-77224-8</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130232024-05-26T17:34:52Z2024-05-26T17:34:52Zby Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127772024-05-26T17:34:52Z2024-05-26T17:34:52Zby Kruegel, Christopher. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">http://dx.doi.org/10.1007/978-3-540-74320-0</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124602024-05-26T17:34:52Z2024-05-26T17:34:52Zby Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Electronic Resources<br/>Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130432024-05-26T17:34:52Z2024-05-26T17:34:52Zby Kim, Sehun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129742024-05-26T17:34:52Z2024-05-26T17:34:52Zby Nam, Kil-Hyun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124922024-05-26T17:34:52Z2024-05-26T17:34:52Zby Naor, Moni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129912024-05-26T17:34:52Z2024-05-26T17:34:52Zby Bao, Feng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format: Electronic Resources<br/>Wireless Network Securityent://SD_ILS/0/SD_ILS:5051842024-05-26T17:34:52Z2024-05-26T17:34:52Zby Xiao, Yang. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-33112-6">http://dx.doi.org/10.1007/978-0-387-33112-6</a><br/>Format: Electronic Resources<br/>Privacy-Respecting Intrusion Detectionent://SD_ILS/0/SD_ILS:5057892024-05-26T17:34:52Z2024-05-26T17:34:52Zby Flegel, Ulrich. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Computer Viruses and Malwareent://SD_ILS/0/SD_ILS:5052842024-05-26T17:34:52Z2024-05-26T17:34:52Zby Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>CryptoGraphics Exploiting Graphics Cards for Securityent://SD_ILS/0/SD_ILS:5052852024-05-26T17:34:52Z2024-05-26T17:34:52Zby Cook, Debra L. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2006 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111602024-05-26T17:34:52Z2024-05-26T17:34:52Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/11761679">http://dx.doi.org/10.1007/11761679</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111992024-05-26T17:34:52Z2024-05-26T17:34:52Zby Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 9th International Symposium, RAID 2006 Hamburg, Germany, September 20-22, 2006 Proceedingsent://SD_ILS/0/SD_ILS:5116522024-05-26T17:34:52Z2024-05-26T17:34:52Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/11856214">http://dx.doi.org/10.1007/11856214</a><br/>Format: Electronic Resources<br/>Trust and Privacy in Digital Business Third International Conference, TrustBus 2006, Kraków, Poland, September 4-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115662024-05-26T17:34:52Z2024-05-26T17:34:52Zby Fischer-Hübner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/11824633">http://dx.doi.org/10.1007/11824633</a><br/>Format: Electronic Resources<br/>Information Security 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115982024-05-26T17:34:52Z2024-05-26T17:34:52Zby Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/11836810">http://dx.doi.org/10.1007/11836810</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118522024-05-26T17:34:52Z2024-05-26T17:34:52Zby Yoshiura, Hiroshi. editor.<br/><a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118572024-05-26T17:34:52Z2024-05-26T17:34:52Zby Leitold, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/11909033">http://dx.doi.org/10.1007/11909033</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119832024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lipmaa, Helger. editor.<br/><a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format: Electronic Resources<br/>Information Assurance Security in the Information Environmentent://SD_ILS/0/SD_ILS:5085712024-05-26T17:34:52Z2024-05-26T17:34:52Zby Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-489-9">http://dx.doi.org/10.1007/1-84628-489-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5107492024-05-26T17:34:52Z2024-05-26T17:34:52Zby Halevi, Shai. editor.<br/><a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5101792024-05-26T17:34:52Z2024-05-26T17:34:52Zby Valdes, Alfonso. editor.<br/><a href="http://dx.doi.org/10.1007/11663812">http://dx.doi.org/10.1007/11663812</a><br/>Format: Electronic Resources<br/>Secure Data Management Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116252024-05-26T17:34:52Z2024-05-26T17:34:52Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11844662">http://dx.doi.org/10.1007/11844662</a><br/>Format: Electronic Resources<br/>Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5113422024-05-26T17:34:52Z2024-05-26T17:34:52Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/11787952">http://dx.doi.org/10.1007/11787952</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5113452024-05-26T17:34:52Z2024-05-26T17:34:52Zby Büschkes, Roland. editor.<br/><a href="http://dx.doi.org/10.1007/11790754">http://dx.doi.org/10.1007/11790754</a><br/>Format: Electronic Resources<br/>Digital Watermarking 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119152024-05-26T17:34:52Z2024-05-26T17:34:52Zby Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/11922841">http://dx.doi.org/10.1007/11922841</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119612024-05-26T17:34:52Z2024-05-26T17:34:52Zby Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2006 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5120002024-05-26T17:34:52Z2024-05-26T17:34:52Zby Barua, Rana. editor.<br/><a href="http://dx.doi.org/10.1007/11941378">http://dx.doi.org/10.1007/11941378</a><br/>Format: Electronic Resources<br/>Understanding Intrusion Detection Through Visualizationent://SD_ILS/0/SD_ILS:5046782024-05-26T17:34:52Z2024-05-26T17:34:52Zby Axelsson, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format: Electronic Resources<br/>Access Control Systems Security, Identity Management and Trust Modelsent://SD_ILS/0/SD_ILS:5046922024-05-26T17:34:52Z2024-05-26T17:34:52Zby Benantar, Messaoud. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format: Electronic Resources<br/>Handbook of Multibiometricsent://SD_ILS/0/SD_ILS:5051862024-05-26T17:34:52Z2024-05-26T17:34:52Zby Ross, Arun A. author.<br/><a href="http://dx.doi.org/10.1007/0-387-33123-9">http://dx.doi.org/10.1007/0-387-33123-9</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5107202024-05-26T17:34:52Z2024-05-26T17:34:52Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/11679219">http://dx.doi.org/10.1007/11679219</a><br/>Format: Electronic Resources<br/>Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5110072024-05-26T17:34:52Z2024-05-26T17:34:52Zby Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116142024-05-26T17:34:52Z2024-05-26T17:34:52Zby Yang, Laurence T. editor.<br/><a href="http://dx.doi.org/10.1007/11839569">http://dx.doi.org/10.1007/11839569</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5112442024-05-26T17:34:52Z2024-05-26T17:34:52Zby Atzeni, Andrea S. editor.<br/><a href="http://dx.doi.org/10.1007/11774716">http://dx.doi.org/10.1007/11774716</a><br/>Format: Electronic Resources<br/>Algorithmic Number Theory 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5113562024-05-26T17:34:52Z2024-05-26T17:34:52Zby Hess, Florian. editor.<br/><a href="http://dx.doi.org/10.1007/11792086">http://dx.doi.org/10.1007/11792086</a><br/>Format: Electronic Resources<br/>Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5116632024-05-26T17:34:52Z2024-05-26T17:34:52Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11861386">http://dx.doi.org/10.1007/11861386</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security Ient://SD_ILS/0/SD_ILS:5119372024-05-26T17:34:52Z2024-05-26T17:34:52Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/11926214">http://dx.doi.org/10.1007/11926214</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119422024-05-26T17:34:52Z2024-05-26T17:34:52Zby Rhee, Min Surp. editor.<br/><a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format: Electronic Resources<br/>Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5121252024-05-26T17:34:52Z2024-05-26T17:34:52Zby Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Electronic Resources<br/>Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117712024-05-26T17:34:52Z2024-05-26T17:34:52Zby Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5117732024-05-26T17:34:52Z2024-05-26T17:34:52Zby Crescenzo, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papersent://SD_ILS/0/SD_ILS:5121352024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format: Electronic Resources<br/>Emerging Directions in Embedded and Ubiquitous Computing EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114342024-05-26T17:34:52Z2024-05-26T17:34:52Zby Zhou, Xiaobo. editor.<br/><a href="http://dx.doi.org/10.1007/11807964">http://dx.doi.org/10.1007/11807964</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5108252024-05-26T17:34:52Z2024-05-26T17:34:52Zby Chen, Kefei. editor.<br/><a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5109082024-05-26T17:34:52Z2024-05-26T17:34:52Zby Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/11733447">http://dx.doi.org/10.1007/11733447</a><br/>Format: Electronic Resources<br/>Theoretical Computer Science Essays in Memory of Shimon Evenent://SD_ILS/0/SD_ILS:5107832024-05-26T17:34:52Z2024-05-26T17:34:52Zby Goldreich, Oded. editor.<br/><a href="http://dx.doi.org/10.1007/11685654">http://dx.doi.org/10.1007/11685654</a><br/>Format: Electronic Resources<br/>Mobile Ad-hoc and Sensor Networks Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5120152024-05-26T17:34:52Z2024-05-26T17:34:52Zby Cao, Jiannong. editor.<br/><a href="http://dx.doi.org/10.1007/11943952">http://dx.doi.org/10.1007/11943952</a><br/>Format: Electronic Resources<br/>Secure Mobile Ad-hoc Networks and Sensors First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5115742024-05-26T17:34:52Z2024-05-26T17:34:52Zby Burmester, Mike. editor.<br/><a href="http://dx.doi.org/10.1007/11801412">http://dx.doi.org/10.1007/11801412</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5113882024-05-26T17:34:52Z2024-05-26T17:34:52Zby Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/11799313">http://dx.doi.org/10.1007/11799313</a><br/>Format: Electronic Resources<br/>Embedded Security in Cars Securing Current and Future Automotive IT Applicationsent://SD_ILS/0/SD_ILS:5094242024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lemke, Kerstin. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-28428-1">http://dx.doi.org/10.1007/3-540-28428-1</a><br/>Format: Electronic Resources<br/>Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5099192024-05-26T17:34:52Z2024-05-26T17:34:52Zby Fossorier, Marc P. C. editor.<br/><a href="http://dx.doi.org/10.1007/11617983">http://dx.doi.org/10.1007/11617983</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2006 The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5107262024-05-26T17:34:52Z2024-05-26T17:34:52Zby Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11605805">http://dx.doi.org/10.1007/11605805</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5108432024-05-26T17:34:52Z2024-05-26T17:34:52Zby Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/11693383">http://dx.doi.org/10.1007/11693383</a><br/>Format: Electronic Resources<br/>Emerging Trends in Information and Communication Security International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111822024-05-26T17:34:52Z2024-05-26T17:34:52Zby Müller, Günter. editor.<br/><a href="http://dx.doi.org/10.1007/11766155">http://dx.doi.org/10.1007/11766155</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems - CHES 2006 8th International Workshop, Yokohama, Japan, October 10-13, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118172024-05-26T17:34:52Z2024-05-26T17:34:52Zby Goubin, Louis. editor.<br/><a href="http://dx.doi.org/10.1007/11894063">http://dx.doi.org/10.1007/11894063</a><br/>Format: Electronic Resources<br/>Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114212024-05-26T17:34:52Z2024-05-26T17:34:52Zby Damiani, Ernesto. editor.<br/><a href="http://dx.doi.org/10.1007/11805588">http://dx.doi.org/10.1007/11805588</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2006 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114992024-05-26T17:34:52Z2024-05-26T17:34:52Zby Dwork, Cynthia. editor.<br/><a href="http://dx.doi.org/10.1007/11818175">http://dx.doi.org/10.1007/11818175</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5109162024-05-26T17:34:52Z2024-05-26T17:34:52Zby Won, Dong Ho. editor.<br/><a href="http://dx.doi.org/10.1007/11734727">http://dx.doi.org/10.1007/11734727</a><br/>Format: Electronic Resources<br/>Information Security Applications 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5108512024-05-26T17:34:52Z2024-05-26T17:34:52Zby Song, Joo-Seok. editor.<br/><a href="http://dx.doi.org/10.1007/11604938">http://dx.doi.org/10.1007/11604938</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5112082024-05-26T17:34:52Z2024-05-26T17:34:52Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11767831">http://dx.doi.org/10.1007/11767831</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5112782024-05-26T17:34:52Z2024-05-26T17:34:52Zby Batten, Lynn Margaret. editor.<br/><a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115862024-05-26T17:34:52Z2024-05-26T17:34:52Zby Prisco, Roberto. editor.<br/><a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications – SETA 2006 4th International Conference Beijing, China, September 24-28, 2006 Proceedingsent://SD_ILS/0/SD_ILS:5116782024-05-26T17:34:52Z2024-05-26T17:34:52Zby Gong, Guang. editor.<br/><a href="http://dx.doi.org/10.1007/11863854">http://dx.doi.org/10.1007/11863854</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116812024-05-26T17:34:52Z2024-05-26T17:34:52Zby Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format: Electronic Resources<br/>Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5112882024-05-26T17:34:52Z2024-05-26T17:34:52Zby Ytrehus, Øyvind. editor.<br/><a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5121072024-05-26T17:34:52Z2024-05-26T17:34:52Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5121102024-05-26T17:34:52Z2024-05-26T17:34:52Zby Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/11958239">http://dx.doi.org/10.1007/11958239</a><br/>Format: Electronic Resources<br/>Foundations of Computer Securityent://SD_ILS/0/SD_ILS:5085252024-05-26T17:34:52Z2024-05-26T17:34:52Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119662024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lai, Xuejia. editor.<br/><a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format: Electronic Resources<br/>Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119672024-05-26T17:34:52Z2024-05-26T17:34:52Zby Ning, Peng. editor.<br/><a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2007 The Cryptographers’ Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5121532024-05-26T17:34:52Z2024-05-26T17:34:52Zby Abe, Masayuki. editor.<br/><a href="http://dx.doi.org/10.1007/11967668">http://dx.doi.org/10.1007/11967668</a><br/>Format: Electronic Resources<br/>Unconstrained Face Recognitionent://SD_ILS/0/SD_ILS:5049212024-05-26T17:34:52Z2024-05-26T17:34:52Zby Zhou, Shaohua Kevin. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29486-5">http://dx.doi.org/10.1007/978-0-387-29486-5</a><br/>Format: Electronic Resources<br/>Privacy Preserving Data Miningent://SD_ILS/0/SD_ILS:5049242024-05-26T17:34:52Z2024-05-26T17:34:52Zby Vaidya, Jaideep. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format: Electronic Resources<br/>Guide to Wireless Network Securityent://SD_ILS/0/SD_ILS:5049532024-05-26T17:34:52Z2024-05-26T17:34:52Zby Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>Quality of Protection Security Measurements and Metricsent://SD_ILS/0/SD_ILS:5054322024-05-26T17:34:52Z2024-05-26T17:34:52Zby Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format: Electronic Resources<br/>Algebraic Aspects of the Advanced Encryption Standardent://SD_ILS/0/SD_ILS:5054512024-05-26T17:34:52Z2024-05-26T17:34:52Zby Cid, Carlos. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36842-9">http://dx.doi.org/10.1007/978-0-387-36842-9</a><br/>Format: Electronic Resources<br/>Multivariate Public Key Cryptosystemsent://SD_ILS/0/SD_ILS:5054642024-05-26T17:34:52Z2024-05-26T17:34:52Zby Ding, Jintai. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format: Electronic Resources<br/>Biometric User Authentication for it Security From Fundamentals to Handwritingent://SD_ILS/0/SD_ILS:5047302024-05-26T17:34:52Z2024-05-26T17:34:52Zby Vielhauer, Claus. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format: Electronic Resources<br/>Hop Integrity in the Internetent://SD_ILS/0/SD_ILS:5049162024-05-26T17:34:52Z2024-05-26T17:34:52Zby Huang, Chin-Tser. author.<br/><a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Applications for Communications Securityent://SD_ILS/0/SD_ILS:5044612024-05-26T17:34:52Z2024-05-26T17:34:52Zby Vaudenay, Serge. author.<br/><a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Exercise Bookent://SD_ILS/0/SD_ILS:5048372024-05-26T17:34:52Z2024-05-26T17:34:52Zby Baigèneres, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5121422024-05-26T17:34:52Z2024-05-26T17:34:52Zby Buttyán, Levente. editor.<br/><a href="http://dx.doi.org/10.1007/11964254">http://dx.doi.org/10.1007/11964254</a><br/>Format: Electronic Resources<br/>Security in E-Learningent://SD_ILS/0/SD_ILS:5044802024-05-26T17:34:52Z2024-05-26T17:34:52Zby Weippl, Edgar. author.<br/><a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format: Electronic Resources<br/>Multimedia Encryption and Watermarkingent://SD_ILS/0/SD_ILS:5044822024-05-26T17:34:52Z2024-05-26T17:34:52Zby Furht, Borko. author.<br/><a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format: Electronic Resources<br/>Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004ent://SD_ILS/0/SD_ILS:5064502024-05-26T17:34:52Z2024-05-26T17:34:52Zby Kowalik, Janusz S. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format: Electronic Resources<br/>Honeypots for Windowsent://SD_ILS/0/SD_ILS:5077072024-05-26T17:34:52Z2024-05-26T17:34:52Zby Grimes, Roger A. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-0007-9">http://dx.doi.org/10.1007/978-1-4302-0007-9</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5101212024-05-26T17:34:52Z2024-05-26T17:34:52Zby Gilbert, Henri. editor.<br/><a href="http://dx.doi.org/10.1007/b137506">http://dx.doi.org/10.1007/b137506</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications - SETA 2004 Third International Conference, Seoul, Korea, October 24-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5104112024-05-26T17:34:52Z2024-05-26T17:34:52Zby Helleseth, Tor. editor.<br/><a href="http://dx.doi.org/10.1007/b136167">http://dx.doi.org/10.1007/b136167</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104182024-05-26T17:34:52Z2024-05-26T17:34:52Zby Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/b136415">http://dx.doi.org/10.1007/b136415</a><br/>Format: Electronic Resources<br/>Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japanent://SD_ILS/0/SD_ILS:5044252024-05-26T17:34:52Z2024-05-26T17:34:52Zby Sasaki, Ryoichi. editor.<br/><a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)ent://SD_ILS/0/SD_ILS:5045242024-05-26T17:34:52Z2024-05-26T17:34:52Zby Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5101992024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lim, Chae Hoon. editor.<br/><a href="http://dx.doi.org/10.1007/b103174">http://dx.doi.org/10.1007/b103174</a><br/>Format: Electronic Resources<br/>Computer viruses: from theory to applicationsent://SD_ILS/0/SD_ILS:5087322024-05-26T17:34:52Z2024-05-26T17:34:52Zby Filiol, Eric. author.<br/><a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format: Electronic Resources<br/>Trusted Computing Platforms: Design and Applicationsent://SD_ILS/0/SD_ILS:5042432024-05-26T17:34:52Z2024-05-26T17:34:52Zby Smith, Sean W. author.<br/><a href="http://dx.doi.org/10.1007/b103637">http://dx.doi.org/10.1007/b103637</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdoment://SD_ILS/0/SD_ILS:5043132024-05-26T17:34:52Z2024-05-26T17:34:52Zby Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/b105674">http://dx.doi.org/10.1007/b105674</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, Franceent://SD_ILS/0/SD_ILS:5042642024-05-26T17:34:52Z2024-05-26T17:34:52Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format: Electronic Resources<br/>Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5099642024-05-26T17:34:52Z2024-05-26T17:34:52Zby Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11558859">http://dx.doi.org/10.1007/11558859</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101352024-05-26T17:34:52Z2024-05-26T17:34:52Zby Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2005 7th International Workshop, Edinburgh, UK, August 29 – September 1, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103122024-05-26T17:34:52Z2024-05-26T17:34:52Zby Rao, Josyula R. editor.<br/><a href="http://dx.doi.org/10.1007/11545262">http://dx.doi.org/10.1007/11545262</a><br/>Format: Electronic Resources<br/>Advanced Encryption Standard – AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papersent://SD_ILS/0/SD_ILS:5102232024-05-26T17:34:52Z2024-05-26T17:34:52Zby Dobbertin, Hans. editor.<br/><a href="http://dx.doi.org/10.1007/b137765">http://dx.doi.org/10.1007/b137765</a><br/>Format: Electronic Resources<br/>Digital Watermarking 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104152024-05-26T17:34:52Z2024-05-26T17:34:52Zby Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11551492">http://dx.doi.org/10.1007/11551492</a><br/>Format: Electronic Resources<br/>Information Hiding 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5096712024-05-26T17:34:52Z2024-05-26T17:34:52Zby Fridrich, Jessica. editor.<br/><a href="http://dx.doi.org/10.1007/b104759">http://dx.doi.org/10.1007/b104759</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101032024-05-26T17:34:52Z2024-05-26T17:34:52Zby Julisch, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/b137798">http://dx.doi.org/10.1007/b137798</a><br/>Format: Electronic Resources<br/>Embedded and Ubiquitous Computing – EUC 2005 Workshops EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105702024-05-26T17:34:52Z2024-05-26T17:34:52Zby Enokido, Tomoya. editor.<br/><a href="http://dx.doi.org/10.1007/11596042">http://dx.doi.org/10.1007/11596042</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105722024-05-26T17:34:52Z2024-05-26T17:34:52Zby Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format: Electronic Resources<br/>Complexity Theory and Cryptology An Introduction to Cryptocomplexityent://SD_ILS/0/SD_ILS:5094482024-05-26T17:34:52Z2024-05-26T17:34:52Zby Rothe, Jörg. author.<br/><a href="http://dx.doi.org/10.1007/3-540-28520-2">http://dx.doi.org/10.1007/3-540-28520-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5102532024-05-26T17:34:52Z2024-05-26T17:34:52Zby Shoup, Victor. editor.<br/><a href="http://dx.doi.org/10.1007/11535218">http://dx.doi.org/10.1007/11535218</a><br/>Format: Electronic Resources<br/>Mobile Ad-hoc and Sensor Networks First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105522024-05-26T17:34:52Z2024-05-26T17:34:52Zby Jia, Xiaohua. editor.<br/><a href="http://dx.doi.org/10.1007/11599463">http://dx.doi.org/10.1007/11599463</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106502024-05-26T17:34:52Z2024-05-26T17:34:52Zby Feng, Dengguo. editor.<br/><a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format: Electronic Resources<br/>Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5097172024-05-26T17:34:52Z2024-05-26T17:34:52Zby Castelluccia, Claude. editor.<br/><a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2004 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedingsent://SD_ILS/0/SD_ILS:5097382024-05-26T17:34:52Z2024-05-26T17:34:52Zby Canteaut, Anne. editor.<br/><a href="http://dx.doi.org/10.1007/b104579">http://dx.doi.org/10.1007/b104579</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5097432024-05-26T17:34:52Z2024-05-26T17:34:52Zby Handschuh, Helena. editor.<br/><a href="http://dx.doi.org/10.1007/b105103">http://dx.doi.org/10.1007/b105103</a><br/>Format: Electronic Resources<br/>Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097572024-05-26T17:34:52Z2024-05-26T17:34:52Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5100202024-05-26T17:34:52Z2024-05-26T17:34:52Zby Ioannidis, John. editor.<br/><a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5103312024-05-26T17:34:52Z2024-05-26T17:34:52Zby Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format: Electronic Resources<br/>Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103442024-05-26T17:34:52Z2024-05-26T17:34:52Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11552338">http://dx.doi.org/10.1007/11552338</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5100632024-05-26T17:34:52Z2024-05-26T17:34:52Zby Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/11533733">http://dx.doi.org/10.1007/11533733</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – Mycrypt 2005 First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104272024-05-26T17:34:52Z2024-05-26T17:34:52Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/11554868">http://dx.doi.org/10.1007/11554868</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5104432024-05-26T17:34:52Z2024-05-26T17:34:52Zby Park, Choon-sik. editor.<br/><a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2005 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105542024-05-26T17:34:52Z2024-05-26T17:34:52Zby Maitra, Subhamoy. editor.<br/><a href="http://dx.doi.org/10.1007/11596219">http://dx.doi.org/10.1007/11596219</a><br/>Format: Electronic Resources<br/>Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104592024-05-26T17:34:52Z2024-05-26T17:34:52Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format: Electronic Resources<br/>Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103022024-05-26T17:34:52Z2024-05-26T17:34:52Zby Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 – March 3, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5101322024-05-26T17:34:52Z2024-05-26T17:34:52Zby Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format: Electronic Resources<br/>Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5097702024-05-26T17:34:52Z2024-05-26T17:34:52Zby Blundo, Carlo. editor.<br/><a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lecturesent://SD_ILS/0/SD_ILS:5103082024-05-26T17:34:52Z2024-05-26T17:34:52Zby Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/11554578">http://dx.doi.org/10.1007/11554578</a><br/>Format: Electronic Resources<br/>Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103092024-05-26T17:34:52Z2024-05-26T17:34:52Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 – 21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103482024-05-26T17:34:52Z2024-05-26T17:34:52Zby Dittmann, Jana. editor.<br/><a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103492024-05-26T17:34:52Z2024-05-26T17:34:52Zby Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103512024-05-26T17:34:52Z2024-05-26T17:34:52Zby Vimercati, Sabrina de Capitani. editor.<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Electronic Resources<br/>Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103642024-05-26T17:34:52Z2024-05-26T17:34:52Zby Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5100872024-05-26T17:34:52Z2024-05-26T17:34:52Zby Molva, Refik. editor.<br/><a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105432024-05-26T17:34:52Z2024-05-26T17:34:52Zby Roy, Bimal. editor.<br/><a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format: Electronic Resources<br/>Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101862024-05-26T17:34:52Z2024-05-26T17:34:52Zby Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format: Electronic Resources<br/>Digital Watermarking Third International Workshop, IWDW 2004, Seoul, South Korea, October 30 - November 1, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5101892024-05-26T17:34:52Z2024-05-26T17:34:52Zby Cox, Ingemar J. editor.<br/><a href="http://dx.doi.org/10.1007/b106346">http://dx.doi.org/10.1007/b106346</a><br/>Format: Electronic Resources<br/>Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making 9th Asian Computing Science Conference. Dedicated to Jean-Louis Lassez on the Occasion of His 5th Birthday. Chiang Mai, Thailand, December 8-10, 2004. Proceedingsent://SD_ILS/0/SD_ILS:5097212024-05-26T17:34:52Z2024-05-26T17:34:52Zby Maher, Michael J. editor.<br/><a href="http://dx.doi.org/10.1007/b103476">http://dx.doi.org/10.1007/b103476</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2005 The Cryptographers’ Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097522024-05-26T17:34:52Z2024-05-26T17:34:52Zby Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/b105222">http://dx.doi.org/10.1007/b105222</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097532024-05-26T17:34:52Z2024-05-26T17:34:52Zby Kilian, Joe. editor.<br/><a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format: Electronic Resources<br/>Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papersent://SD_ILS/0/SD_ILS:5102192024-05-26T17:34:52Z2024-05-26T17:34:52Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106442024-05-26T17:34:52Z2024-05-26T17:34:52Zby Smart, Nigel P. editor.<br/><a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format: Electronic Resources<br/>Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106482024-05-26T17:34:52Z2024-05-26T17:34:52Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Electronic Resources<br/>Secure Group Communications over Data Networksent://SD_ILS/0/SD_ILS:5040822024-05-26T17:34:52Z2024-05-26T17:34:52Zby Zou, Xukai. author.<br/><a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format: Electronic Resources<br/>Brute Force Cracking the Data Encryption Standardent://SD_ILS/0/SD_ILS:5046002024-05-26T17:34:52Z2024-05-26T17:34:52Zby Curtin, Matt. author.<br/><a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format: Electronic Resources<br/>Image and Video Encryption From Digital Rights Management to Secured Personal Communication.ent://SD_ILS/0/SD_ILS:5041662024-05-26T17:34:52Z2024-05-26T17:34:52Zby SpringerLink (Online service)<br/><a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format: Electronic Resources<br/>Coding for Data and Computer Communicationsent://SD_ILS/0/SD_ILS:5042262024-05-26T17:34:52Z2024-05-26T17:34:52Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format: Electronic Resources<br/>Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E’2005), October 28–30, 2005, Poznan, Polandent://SD_ILS/0/SD_ILS:5049442024-05-26T17:34:52Z2024-05-26T17:34:52Zby Funabashi, Matohisa. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-29773-1">http://dx.doi.org/10.1007/0-387-29773-1</a><br/>Format: Electronic Resources<br/>Computer Security in the 21st Centuryent://SD_ILS/0/SD_ILS:5042522024-05-26T17:34:52Z2024-05-26T17:34:52Zby Lee, D. T. editor.<br/><a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Intrusion Detection and Correlation Challenges and Solutionsent://SD_ILS/0/SD_ILS:5041652024-05-26T17:34:52Z2024-05-26T17:34:52Zby Kruegel, Christopher. author.<br/><a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Privacy, Security and Trust within the Context of Pervasive Computingent://SD_ILS/0/SD_ILS:5041712024-05-26T17:34:52Z2024-05-26T17:34:52Zby Robinson, Philip. editor.<br/><a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format: Electronic Resources<br/>Certification and Security in Inter-Organizational E-Serviceent://SD_ILS/0/SD_ILS:5043452024-05-26T17:34:52Z2024-05-26T17:34:52Zby Nardelli, Enrico. editor.<br/><a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format: Electronic Resources<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:5041782024-05-26T17:34:52Z2024-05-26T17:34:52Zby Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Introduction to Modern Number Theory Fundamental Problems, Ideas and Theoriesent://SD_ILS/0/SD_ILS:5092902024-05-26T17:34:52Z2024-05-26T17:34:52Zby Manin, Yuri Ivanovic. author.<br/><a href="http://dx.doi.org/10.1007/3-540-27692-0">http://dx.doi.org/10.1007/3-540-27692-0</a><br/>Format: Electronic Resources<br/>