Search Results for - Narrowed by: E-Book - Computer science. - Data Structures, Cryptology and Information Theory.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-BOOKS$002509E-Book$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026ps$003d300?2024-09-25T23:48:50ZHandbook of Biometricsent://SD_ILS/0/SD_ILS:5016622024-09-25T23:48:50Z2024-09-25T23:48:50Zby Jain, Anil K. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-71041-9">http://dx.doi.org/10.1007/978-0-387-71041-9</a><br/>Format: Electronic Resources<br/>Security for Telecommunications Networksent://SD_ILS/0/SD_ILS:5016992024-09-25T23:48:50Z2024-09-25T23:48:50Zby Traynor, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Securing Biometrics Applicationsent://SD_ILS/0/SD_ILS:5016522024-09-25T23:48:50Z2024-09-25T23:48:50Zby Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format: Electronic Resources<br/>Preferences and Similaritiesent://SD_ILS/0/SD_ILS:5025752024-09-25T23:48:50Z2024-09-25T23:48:50Zby Riccia, Giacomo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-211-85432-7">http://dx.doi.org/10.1007/978-3-211-85432-7</a><br/>Format: Electronic Resources<br/>Policies and Research in Identity Management First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007ent://SD_ILS/0/SD_ILS:5019392024-09-25T23:48:50Z2024-09-25T23:48:50Zby Leeuw, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77996-6">http://dx.doi.org/10.1007/978-0-387-77996-6</a><br/>Format: Electronic Resources<br/>Vulnerability Analysis and Defense for the Internetent://SD_ILS/0/SD_ILS:5017872024-09-25T23:48:50Z2024-09-25T23:48:50Zby Singh, Abhishek. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Botnet Detection Countering the Largest Security Threatent://SD_ILS/0/SD_ILS:5016272024-09-25T23:48:50Z2024-09-25T23:48:50Zby Lee, Wenke. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036702024-09-25T23:48:50Z2024-09-25T23:48:50Zby Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format: Electronic Resources<br/>Intrusion Detection Systemsent://SD_ILS/0/SD_ILS:5019102024-09-25T23:48:50Z2024-09-25T23:48:50Zby Mancini, Luigi V. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matchingent://SD_ILS/0/SD_ILS:5019782024-09-25T23:48:50Z2024-09-25T23:48:50Zby Adjeroh, Donald. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-78909-5">http://dx.doi.org/10.1007/978-0-387-78909-5</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:5016902024-09-25T23:48:50Z2024-09-25T23:48:50Zby Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norwayent://SD_ILS/0/SD_ILS:5015182024-09-25T23:48:50Z2024-09-25T23:48:50Zby Karabulut, Yücel. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09428-1">http://dx.doi.org/10.1007/978-0-387-09428-1</a><br/>Format: Electronic Resources<br/>Advances in Ad Hoc Networking Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25–27, 2008ent://SD_ILS/0/SD_ILS:5015232024-09-25T23:48:50Z2024-09-25T23:48:50Zby Cuenca, Pedro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09490-8">http://dx.doi.org/10.1007/978-0-387-09490-8</a><br/>Format: Electronic Resources<br/>Handbook of Database Security Applications and Trendsent://SD_ILS/0/SD_ILS:5015832024-09-25T23:48:50Z2024-09-25T23:48:50Zby Gertz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format: Electronic Resources<br/>Cryptanalytic Attacks on RSAent://SD_ILS/0/SD_ILS:5015842024-09-25T23:48:50Z2024-09-25T23:48:50Zby Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Insider Attack and Cyber Security Beyond the Hackerent://SD_ILS/0/SD_ILS:5019132024-09-25T23:48:50Z2024-09-25T23:48:50Zby Stolfo, Salvatore J. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IIent://SD_ILS/0/SD_ILS:5020092024-09-25T23:48:50Z2024-09-25T23:48:50Zby Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format: Electronic Resources<br/>New Stream Cipher Designs The eSTREAM Finalistsent://SD_ILS/0/SD_ILS:5026392024-09-25T23:48:50Z2024-09-25T23:48:50Zby Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68351-3">http://dx.doi.org/10.1007/978-3-540-68351-3</a><br/>Format: Electronic Resources<br/>Automata, Languages and Programming 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5028152024-09-25T23:48:50Z2024-09-25T23:48:50Zby Aceto, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70575-8">http://dx.doi.org/10.1007/978-3-540-70575-8</a><br/>Format: Electronic Resources<br/>Automata, Languages and Programming 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5028162024-09-25T23:48:50Z2024-09-25T23:48:50Zby Aceto, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70583-3">http://dx.doi.org/10.1007/978-3-540-70583-3</a><br/>Format: Electronic Resources<br/>Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5038592024-09-25T23:48:50Z2024-09-25T23:48:50Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format: Electronic Resources<br/>A Concise Introduction to Data Compressionent://SD_ILS/0/SD_ILS:5024802024-09-25T23:48:50Z2024-09-25T23:48:50Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-072-8">http://dx.doi.org/10.1007/978-1-84800-072-8</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5028552024-09-25T23:48:50Z2024-09-25T23:48:50Zby Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71039-4">http://dx.doi.org/10.1007/978-3-540-71039-4</a><br/>Format: Electronic Resources<br/>Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037672024-09-25T23:48:50Z2024-09-25T23:48:50Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Securityent://SD_ILS/0/SD_ILS:5033402024-09-25T23:48:50Z2024-09-25T23:48:50Zby Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format: Electronic Resources<br/>Network and Parallel Computing IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037402024-09-25T23:48:50Z2024-09-25T23:48:50Zby Cao, Jian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88140-7">http://dx.doi.org/10.1007/978-3-540-88140-7</a><br/>Format: Electronic Resources<br/>Mathematical Methods in Computer Science Essays in Memory of Thomas Bethent://SD_ILS/0/SD_ILS:5038492024-09-25T23:48:50Z2024-09-25T23:48:50Zby Calmet, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89994-5">http://dx.doi.org/10.1007/978-3-540-89994-5</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papersent://SD_ILS/0/SD_ILS:5028312024-09-25T23:48:50Z2024-09-25T23:48:50Zby Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036332024-09-25T23:48:50Z2024-09-25T23:48:50Zby Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format: Electronic Resources<br/>ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conferenceent://SD_ILS/0/SD_ILS:5133422024-09-25T23:48:50Z2024-09-25T23:48:50Zby Pohlmann, Norbert. author.<br/><a href="http://dx.doi.org/10.1007/978-3-8348-9418-2">http://dx.doi.org/10.1007/978-3-8348-9418-2</a><br/>Format: Electronic Resources<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129892024-09-25T23:48:50Z2024-09-25T23:48:50Zby Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130422024-09-25T23:48:50Z2024-09-25T23:48:50Zby Okada, Mitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77505-8">http://dx.doi.org/10.1007/978-3-540-77505-8</a><br/>Format: Electronic Resources<br/>Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129312024-09-25T23:48:50Z2024-09-25T23:48:50Zby Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format: Electronic Resources<br/>Reliable Face Recognition Methods System Design, Impementation and Evaluationent://SD_ILS/0/SD_ILS:5055222024-09-25T23:48:50Z2024-09-25T23:48:50Zby Wechsler, Harry. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-38464-1">http://dx.doi.org/10.1007/978-0-387-38464-1</a><br/>Format: Electronic Resources<br/>Synchronizing Internet Protocol Security (SIPSec)ent://SD_ILS/0/SD_ILS:5058142024-09-25T23:48:50Z2024-09-25T23:48:50Zby Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format: Electronic Resources<br/>Security for Wireless Sensor Networksent://SD_ILS/0/SD_ILS:5056282024-09-25T23:48:50Z2024-09-25T23:48:50Zby Liu, Donggang. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Privacy-Respecting Intrusion Detectionent://SD_ILS/0/SD_ILS:5057892024-09-25T23:48:50Z2024-09-25T23:48:50Zby Flegel, Ulrich. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Online Business Security Systemsent://SD_ILS/0/SD_ILS:5058322024-09-25T23:48:50Z2024-09-25T23:48:50Zby Williams, Godfried B. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Secure Data Management in Decentralized Systemsent://SD_ILS/0/SD_ILS:5046902024-09-25T23:48:50Z2024-09-25T23:48:50Zby Yu, Ting. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format: Electronic Resources<br/>Practical Internet Securityent://SD_ILS/0/SD_ILS:5049522024-09-25T23:48:50Z2024-09-25T23:48:50Zby Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format: Electronic Resources<br/>Data Warehousing and Data Mining Techniques for Cyber Securityent://SD_ILS/0/SD_ILS:5056472024-09-25T23:48:50Z2024-09-25T23:48:50Zby Singhal, Anoop. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Automata, Languages and Programming 34th International Colloquium, ICALP 2007, Wrocław, Poland, July 9-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126632024-09-25T23:48:50Z2024-09-25T23:48:50Zby Arge, Lars. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73420-8">http://dx.doi.org/10.1007/978-3-540-73420-8</a><br/>Format: Electronic Resources<br/>Security with Noisy Data On Private Biometrics, Secure Key Storage and Anti-Counterfeitingent://SD_ILS/0/SD_ILS:5087232024-09-25T23:48:50Z2024-09-25T23:48:50Zby Tuyls, Pim. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-984-2">http://dx.doi.org/10.1007/978-1-84628-984-2</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Trust in Modern Data Managementent://SD_ILS/0/SD_ILS:5121932024-09-25T23:48:50Z2024-09-25T23:48:50Zby Petković, Milan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69861-6">http://dx.doi.org/10.1007/978-3-540-69861-6</a><br/>Format: Electronic Resources<br/>Formal Correctness of Security Protocols With 62 Figures and 4 Tablesent://SD_ILS/0/SD_ILS:5120522024-09-25T23:48:50Z2024-09-25T23:48:50Zby Bella, Giampaolo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:5119462024-09-25T23:48:50Z2024-09-25T23:48:50Zby Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papersent://SD_ILS/0/SD_ILS:5129502024-09-25T23:48:50Z2024-09-25T23:48:50Zby Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format: Electronic Resources<br/>Advances in Information Processing and Protectionent://SD_ILS/0/SD_ILS:5060142024-09-25T23:48:50Z2024-09-25T23:48:50Zby Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format: Electronic Resources<br/>Preserving Privacy in On-Line Analytical Processing (OLAP)ent://SD_ILS/0/SD_ILS:5056112024-09-25T23:48:50Z2024-09-25T23:48:50Zby Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format: Electronic Resources<br/>Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networksent://SD_ILS/0/SD_ILS:5056122024-09-25T23:48:50Z2024-09-25T23:48:50Zby Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Oracle Database 11g New Features for DBAs and Developersent://SD_ILS/0/SD_ILS:5080092024-09-25T23:48:50Z2024-09-25T23:48:50Zby Alapati, Sam R. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-0469-5">http://dx.doi.org/10.1007/978-1-4302-0469-5</a><br/>Format: Electronic Resources<br/>Exploratory Data Analysis Using Fisher Informationent://SD_ILS/0/SD_ILS:5086792024-09-25T23:48:50Z2024-09-25T23:48:50Zby Frieden, B. Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-777-0">http://dx.doi.org/10.1007/978-1-84628-777-0</a><br/>Format: Electronic Resources<br/>Electronic Postage Systems Technology, Security, Economicsent://SD_ILS/0/SD_ILS:5055712024-09-25T23:48:50Z2024-09-25T23:48:50Zby Bleumer, Gerrit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Malware Detectionent://SD_ILS/0/SD_ILS:5055692024-09-25T23:48:50Z2024-09-25T23:48:50Zby Christodorescu, Mihai. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Network Security Policies and Proceduresent://SD_ILS/0/SD_ILS:5056592024-09-25T23:48:50Z2024-09-25T23:48:50Zby Frye, Douglas W. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format: Electronic Resources<br/>Power Analysis Attacks Revealing the Secrets of Smart Cardsent://SD_ILS/0/SD_ILS:5055042024-09-25T23:48:50Z2024-09-25T23:48:50Zby Mangard, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-38162-6">http://dx.doi.org/10.1007/978-0-387-38162-6</a><br/>Format: Electronic Resources<br/>ISSE 2006 — Securing Electronic Busines Processes Highlights of the Information Security Solutions Europe 2006 Conferenceent://SD_ILS/0/SD_ILS:5133402024-09-25T23:48:50Z2024-09-25T23:48:50Zby Paulus, Sachar. author.<br/><a href="http://dx.doi.org/10.1007/978-3-8348-9195-2">http://dx.doi.org/10.1007/978-3-8348-9195-2</a><br/>Format: Electronic Resources<br/>Biometrics, Computer Security Systems and Artificial Intelligence Applicationsent://SD_ILS/0/SD_ILS:5054262024-09-25T23:48:50Z2024-09-25T23:48:50Zby Saeed, Khalid. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format: Electronic Resources<br/>Quality of Protection Security Measurements and Metricsent://SD_ILS/0/SD_ILS:5054322024-09-25T23:48:50Z2024-09-25T23:48:50Zby Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Applications for Communications Securityent://SD_ILS/0/SD_ILS:5044612024-09-25T23:48:50Z2024-09-25T23:48:50Zby Vaudenay, Serge. author.<br/><a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Understanding Intrusion Detection Through Visualizationent://SD_ILS/0/SD_ILS:5046782024-09-25T23:48:50Z2024-09-25T23:48:50Zby Axelsson, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format: Electronic Resources<br/>Access Control Systems Security, Identity Management and Trust Modelsent://SD_ILS/0/SD_ILS:5046922024-09-25T23:48:50Z2024-09-25T23:48:50Zby Benantar, Messaoud. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format: Electronic Resources<br/>Algebraic Aspects of the Advanced Encryption Standardent://SD_ILS/0/SD_ILS:5054512024-09-25T23:48:50Z2024-09-25T23:48:50Zby Cid, Carlos. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36842-9">http://dx.doi.org/10.1007/978-0-387-36842-9</a><br/>Format: Electronic Resources<br/>Guide to Wireless Network Securityent://SD_ILS/0/SD_ILS:5049532024-09-25T23:48:50Z2024-09-25T23:48:50Zby Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>Foundations of Computer Securityent://SD_ILS/0/SD_ILS:5085252024-09-25T23:48:50Z2024-09-25T23:48:50Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Concurrent Zero-Knowledge With Additional Background by Oded Goldreichent://SD_ILS/0/SD_ILS:5107942024-09-25T23:48:50Z2024-09-25T23:48:50Zby Rosen, Alon. author.<br/><a href="http://dx.doi.org/10.1007/3-540-32939-0">http://dx.doi.org/10.1007/3-540-32939-0</a><br/>Format: Electronic Resources<br/>Automata, Languages and Programming 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5113332024-09-25T23:48:50Z2024-09-25T23:48:50Zby Bugliesi, Michele. editor.<br/><a href="http://dx.doi.org/10.1007/11786986">http://dx.doi.org/10.1007/11786986</a><br/>Format: Electronic Resources<br/>Automata, Languages and Programming 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5113342024-09-25T23:48:50Z2024-09-25T23:48:50Zby Bugliesi, Michele. editor.<br/><a href="http://dx.doi.org/10.1007/11787006">http://dx.doi.org/10.1007/11787006</a><br/>Format: Electronic Resources<br/>Theoretical Computer Science Essays in Memory of Shimon Evenent://SD_ILS/0/SD_ILS:5107832024-09-25T23:48:50Z2024-09-25T23:48:50Zby Goldreich, Oded. editor.<br/><a href="http://dx.doi.org/10.1007/11685654">http://dx.doi.org/10.1007/11685654</a><br/>Format: Electronic Resources<br/>Multivariate Public Key Cryptosystemsent://SD_ILS/0/SD_ILS:5054642024-09-25T23:48:50Z2024-09-25T23:48:50Zby Ding, Jintai. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format: Electronic Resources<br/>Data Analysis, Classification and the Forward Search Proceedings of the Meeting of the Classification and Data Analysis Group (CLADAG) of the Italian Statistical Society, University of Parma, June 6–8, 2005ent://SD_ILS/0/SD_ILS:5113372024-09-25T23:48:50Z2024-09-25T23:48:50Zby Zani, Sergio. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-35978-8">http://dx.doi.org/10.1007/3-540-35978-8</a><br/>Format: Electronic Resources<br/>General Theory of Information Transfer and Combinatoricsent://SD_ILS/0/SD_ILS:5117682024-09-25T23:48:50Z2024-09-25T23:48:50Zby Ahlswede, Rudolf. editor.<br/><a href="http://dx.doi.org/10.1007/11889342">http://dx.doi.org/10.1007/11889342</a><br/>Format: Electronic Resources<br/>Developing Ambient Intelligence Proceedings of the First International Conference on Ambient Intelligence Developments (AmID’06)ent://SD_ILS/0/SD_ILS:5087382024-09-25T23:48:50Z2024-09-25T23:48:50Zby Maña, Antonio. author.<br/><a href="http://dx.doi.org/10.1007/978-2-287-47610-5">http://dx.doi.org/10.1007/978-2-287-47610-5</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics for International Security Information Sharing and Data Miningent://SD_ILS/0/SD_ILS:5049852024-09-25T23:48:50Z2024-09-25T23:48:50Zby Chen, Hsinchun. author.<br/><a href="http://dx.doi.org/10.1007/0-387-30332-4">http://dx.doi.org/10.1007/0-387-30332-4</a><br/>Format: Electronic Resources<br/>CryptoGraphics Exploiting Graphics Cards for Securityent://SD_ILS/0/SD_ILS:5052852024-09-25T23:48:50Z2024-09-25T23:48:50Zby Cook, Debra L. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>Unconstrained Face Recognitionent://SD_ILS/0/SD_ILS:5049212024-09-25T23:48:50Z2024-09-25T23:48:50Zby Zhou, Shaohua Kevin. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29486-5">http://dx.doi.org/10.1007/978-0-387-29486-5</a><br/>Format: Electronic Resources<br/>Human Identification Based on Gaitent://SD_ILS/0/SD_ILS:5049232024-09-25T23:48:50Z2024-09-25T23:48:50Zby Nixon, Mark S. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29488-9">http://dx.doi.org/10.1007/978-0-387-29488-9</a><br/>Format: Electronic Resources<br/>Privacy Preserving Data Miningent://SD_ILS/0/SD_ILS:5049242024-09-25T23:48:50Z2024-09-25T23:48:50Zby Vaidya, Jaideep. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format: Electronic Resources<br/>Biometric User Authentication for it Security From Fundamentals to Handwritingent://SD_ILS/0/SD_ILS:5047302024-09-25T23:48:50Z2024-09-25T23:48:50Zby Vielhauer, Claus. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format: Electronic Resources<br/>Handbook of Multibiometricsent://SD_ILS/0/SD_ILS:5051862024-09-25T23:48:50Z2024-09-25T23:48:50Zby Ross, Arun A. author.<br/><a href="http://dx.doi.org/10.1007/0-387-33123-9">http://dx.doi.org/10.1007/0-387-33123-9</a><br/>Format: Electronic Resources<br/>Computer Viruses and Malwareent://SD_ILS/0/SD_ILS:5052842024-09-25T23:48:50Z2024-09-25T23:48:50Zby Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>Hop Integrity in the Internetent://SD_ILS/0/SD_ILS:5049162024-09-25T23:48:50Z2024-09-25T23:48:50Zby Huang, Chin-Tser. author.<br/><a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Exercise Bookent://SD_ILS/0/SD_ILS:5048372024-09-25T23:48:50Z2024-09-25T23:48:50Zby Baigèneres, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Contemporary Cryptologyent://SD_ILS/0/SD_ILS:5130992024-09-25T23:48:50Z2024-09-25T23:48:50Zby Catalano, Dario. author.<br/><a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format: Electronic Resources<br/>Codici Cifrati Arne Beurling e la crittografia nella II guerra mondialeent://SD_ILS/0/SD_ILS:5135372024-09-25T23:48:50Z2024-09-25T23:48:50Zby Beckman, Bengt. author.<br/><a href="http://dx.doi.org/10.1007/88-470-0395-4">http://dx.doi.org/10.1007/88-470-0395-4</a><br/>Format: Electronic Resources<br/>Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004ent://SD_ILS/0/SD_ILS:5064502024-09-25T23:48:50Z2024-09-25T23:48:50Zby Kowalik, Janusz S. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format: Electronic Resources<br/>Evolutionary Multiobjective Optimization Theoretical Advances and Applicationsent://SD_ILS/0/SD_ILS:5083922024-09-25T23:48:50Z2024-09-25T23:48:50Zby Abraham, Ajith. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-137-7">http://dx.doi.org/10.1007/1-84628-137-7</a><br/>Format: Electronic Resources<br/>Intelligent Knowledge-Based Systems Business and Technology in the New Millenniument://SD_ILS/0/SD_ILS:5076822024-09-25T23:48:50Z2024-09-25T23:48:50Zby Leondes, Cornelius T. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-7829-3">http://dx.doi.org/10.1007/978-1-4020-7829-3</a><br/>Format: Electronic Resources<br/>Secure Group Communications over Data Networksent://SD_ILS/0/SD_ILS:5040822024-09-25T23:48:50Z2024-09-25T23:48:50Zby Zou, Xukai. author.<br/><a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format: Electronic Resources<br/>The Austin Protocol Compilerent://SD_ILS/0/SD_ILS:5041212024-09-25T23:48:50Z2024-09-25T23:48:50Zby McGuire, Tommy M. author.<br/><a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdoment://SD_ILS/0/SD_ILS:5043132024-09-25T23:48:50Z2024-09-25T23:48:50Zby Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/b105674">http://dx.doi.org/10.1007/b105674</a><br/>Format: Electronic Resources<br/>Enterprise Information Systems Vent://SD_ILS/0/SD_ILS:5062622024-09-25T23:48:50Z2024-09-25T23:48:50Zby Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-2673-0">http://dx.doi.org/10.1007/1-4020-2673-0</a><br/>Format: Electronic Resources<br/>Coding for Data and Computer Communicationsent://SD_ILS/0/SD_ILS:5042262024-09-25T23:48:50Z2024-09-25T23:48:50Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format: Electronic Resources<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:5041782024-09-25T23:48:50Z2024-09-25T23:48:50Zby Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systemsent://SD_ILS/0/SD_ILS:5041792024-09-25T23:48:50Z2024-09-25T23:48:50Zby Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Electronic Resources<br/>Semistructured Database Designent://SD_ILS/0/SD_ILS:5041912024-09-25T23:48:50Z2024-09-25T23:48:50Zby Ling, Tok Wang. author.<br/><a href="http://dx.doi.org/10.1007/b101873">http://dx.doi.org/10.1007/b101873</a><br/>Format: Electronic Resources<br/>Algorithmic Learning in a Random Worldent://SD_ILS/0/SD_ILS:5043422024-09-25T23:48:50Z2024-09-25T23:48:50Zby Vovk, Vladimir. author.<br/><a href="http://dx.doi.org/10.1007/b106715">http://dx.doi.org/10.1007/b106715</a><br/>Format: Electronic Resources<br/>Intrusion Detection and Correlation Challenges and Solutionsent://SD_ILS/0/SD_ILS:5041652024-09-25T23:48:50Z2024-09-25T23:48:50Zby Kruegel, Christopher. author.<br/><a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Image and Video Encryption From Digital Rights Management to Secured Personal Communication.ent://SD_ILS/0/SD_ILS:5041662024-09-25T23:48:50Z2024-09-25T23:48:50Zby SpringerLink (Online service)<br/><a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format: Electronic Resources<br/>Privacy, Security and Trust within the Context of Pervasive Computingent://SD_ILS/0/SD_ILS:5041712024-09-25T23:48:50Z2024-09-25T23:48:50Zby Robinson, Philip. editor.<br/><a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format: Electronic Resources<br/>Computer viruses: from theory to applicationsent://SD_ILS/0/SD_ILS:5087322024-09-25T23:48:50Z2024-09-25T23:48:50Zby Filiol, Eric. author.<br/><a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, Franceent://SD_ILS/0/SD_ILS:5042642024-09-25T23:48:50Z2024-09-25T23:48:50Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format: Electronic Resources<br/>Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japanent://SD_ILS/0/SD_ILS:5044252024-09-25T23:48:50Z2024-09-25T23:48:50Zby Sasaki, Ryoichi. editor.<br/><a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13–16, 2005ent://SD_ILS/0/SD_ILS:5050592024-09-25T23:48:50Z2024-09-25T23:48:50Zby Pollitt, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-31163-7">http://dx.doi.org/10.1007/0-387-31163-7</a><br/>Format: Electronic Resources<br/>Net-Centric Approaches to Intelligence and National Securityent://SD_ILS/0/SD_ILS:5044992024-09-25T23:48:50Z2024-09-25T23:48:50Zby Ladner, Roy. editor.<br/><a href="http://dx.doi.org/10.1007/b137009">http://dx.doi.org/10.1007/b137009</a><br/>Format: Electronic Resources<br/>Parallel and Distributed Computing: Applications and Technologies 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004. Proceedingsent://SD_ILS/0/SD_ILS:5097202024-09-25T23:48:50Z2024-09-25T23:48:50Zby Liew, Kim-Meow. editor.<br/><a href="http://dx.doi.org/10.1007/b103538">http://dx.doi.org/10.1007/b103538</a><br/>Format: Electronic Resources<br/>Cryptography in C and C++ent://SD_ILS/0/SD_ILS:5077262024-09-25T23:48:50Z2024-09-25T23:48:50Zby Welschenbach, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-0026-0">http://dx.doi.org/10.1007/978-1-4302-0026-0</a><br/>Format: Electronic Resources<br/>Classification — the Ubiquitous Challenge Proceedings of the 28th Annual Conference of the Gesellschaft für Klassifikation e.V. University of Dortmund, March 9–11, 2004ent://SD_ILS/0/SD_ILS:5093612024-09-25T23:48:50Z2024-09-25T23:48:50Zby Weihs, Claus. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-28084-7">http://dx.doi.org/10.1007/3-540-28084-7</a><br/>Format: Electronic Resources<br/>Advanced Techniques in Knowledge Discovery and Data Miningent://SD_ILS/0/SD_ILS:5084272024-09-25T23:48:50Z2024-09-25T23:48:50Zby Pal, Nikhil R. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-183-0">http://dx.doi.org/10.1007/1-84628-183-0</a><br/>Format: Electronic Resources<br/>Computer Security in the 21st Centuryent://SD_ILS/0/SD_ILS:5042522024-09-25T23:48:50Z2024-09-25T23:48:50Zby Lee, D. T. editor.<br/><a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)ent://SD_ILS/0/SD_ILS:5045242024-09-25T23:48:50Z2024-09-25T23:48:50Zby Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Trusted Computing Platforms: Design and Applicationsent://SD_ILS/0/SD_ILS:5042432024-09-25T23:48:50Z2024-09-25T23:48:50Zby Smith, Sean W. author.<br/><a href="http://dx.doi.org/10.1007/b103637">http://dx.doi.org/10.1007/b103637</a><br/>Format: Electronic Resources<br/>Security in E-Learningent://SD_ILS/0/SD_ILS:5044802024-09-25T23:48:50Z2024-09-25T23:48:50Zby Weippl, Edgar. author.<br/><a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format: Electronic Resources<br/>Multimedia Encryption and Watermarkingent://SD_ILS/0/SD_ILS:5044822024-09-25T23:48:50Z2024-09-25T23:48:50Zby Furht, Borko. author.<br/><a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format: Electronic Resources<br/>Automata, Languages and Programming 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101392024-09-25T23:48:50Z2024-09-25T23:48:50Zby Caires, Luís. editor.<br/><a href="http://dx.doi.org/10.1007/11523468">http://dx.doi.org/10.1007/11523468</a><br/>Format: Electronic Resources<br/>Certification and Security in Inter-Organizational E-Serviceent://SD_ILS/0/SD_ILS:5043452024-09-25T23:48:50Z2024-09-25T23:48:50Zby Nardelli, Enrico. editor.<br/><a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format: Electronic Resources<br/>