Search Results for - Narrowed by: Springer Collection - Computers and Society. - Cryptology.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINESPR$002509Springer$002bCollection$0026qf$003dSUBJECT$002509Subject$002509Computers$002band$002bSociety.$002509Computers$002band$002bSociety.$0026qf$003dSUBJECT$002509Subject$002509Cryptology.$002509Cryptology.$0026ps$003d300?2024-06-16T06:22:43ZComputer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860192024-06-16T06:22:43Z2024-06-16T06:22:43Zby Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format: Electronic Resources<br/>Mobile Networks and Management 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845422024-06-16T06:22:43Z2024-06-16T06:22:43Zby Hu, Jiankun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90775-8">https://doi.org/10.1007/978-3-319-90775-8</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842652024-06-16T06:22:43Z2024-06-16T06:22:43Zby Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20847202024-06-16T06:22:43Z2024-06-16T06:22:43Zby Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthdayent://SD_ILS/0/SD_ILS:20853642024-06-16T06:22:43Z2024-06-16T06:22:43Zby Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format: Electronic Resources<br/>Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852122024-06-16T06:22:43Z2024-06-16T06:22:43Zby Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852902024-06-16T06:22:43Z2024-06-16T06:22:43Zby Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854992024-06-16T06:22:43Z2024-06-16T06:22:43Zby Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855232024-06-16T06:22:43Z2024-06-16T06:22:43Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20861932024-06-16T06:22:43Z2024-06-16T06:22:43Zby Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853432024-06-16T06:22:43Z2024-06-16T06:22:43Zby Camenisch, Jan. editor. (orcid)0000-0001-6654-9459<br/><a href="https://doi.org/10.1007/978-3-030-00434-7">https://doi.org/10.1007/978-3-030-00434-7</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20856302024-06-16T06:22:43Z2024-06-16T06:22:43Zby Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20851812024-06-16T06:22:43Z2024-06-16T06:22:43Zby Capkun, Srdjan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02641-7">https://doi.org/10.1007/978-3-030-02641-7</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20851862024-06-16T06:22:43Z2024-06-16T06:22:43Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860402024-06-16T06:22:43Z2024-06-16T06:22:43Zby Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855102024-06-16T06:22:43Z2024-06-16T06:22:43Zby Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format: Electronic Resources<br/>Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859042024-06-16T06:22:43Z2024-06-16T06:22:43Zby Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852132024-06-16T06:22:43Z2024-06-16T06:22:43Zby Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851712024-06-16T06:22:43Z2024-06-16T06:22:43Zby Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854642024-06-16T06:22:43Z2024-06-16T06:22:43Zby D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20855912024-06-16T06:22:43Z2024-06-16T06:22:43Zby Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78372-7">https://doi.org/10.1007/978-3-319-78372-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855922024-06-16T06:22:43Z2024-06-16T06:22:43Zby Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78375-8">https://doi.org/10.1007/978-3-319-78375-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855932024-06-16T06:22:43Z2024-06-16T06:22:43Zby Nielsen, Jesper Buus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78381-9">https://doi.org/10.1007/978-3-319-78381-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855382024-06-16T06:22:43Z2024-06-16T06:22:43Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851982024-06-16T06:22:43Z2024-06-16T06:22:43Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855762024-06-16T06:22:43Z2024-06-16T06:22:43Zby Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858542024-06-16T06:22:43Z2024-06-16T06:22:43Zby Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Blockchain – ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860942024-06-16T06:22:43Z2024-06-16T06:22:43Zby Chen, Shiping. editor. (orcid)0000-0002-4603-0024<br/><a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format: Electronic Resources<br/>Ethics in Computing A Concise Moduleent://SD_ILS/0/SD_ILS:20847392024-06-16T06:22:43Z2024-06-16T06:22:43Zby Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-319-29106-2">https://doi.org/10.1007/978-3-319-29106-2</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2–8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857442024-06-16T06:22:43Z2024-06-16T06:22:43Zby Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20850852024-06-16T06:22:43Z2024-06-16T06:22:43Zby Brumley, Billy Bob. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20855262024-06-16T06:22:43Z2024-06-16T06:22:43Zby Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852302024-06-16T06:22:43Z2024-06-16T06:22:43Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846202024-06-16T06:22:43Z2024-06-16T06:22:43Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852382024-06-16T06:22:43Z2024-06-16T06:22:43Zby Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:20855672024-06-16T06:22:43Z2024-06-16T06:22:43Zby Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48674-1">https://doi.org/10.1007/978-3-319-48674-1</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:20858582024-06-16T06:22:43Z2024-06-16T06:22:43Zby Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858882024-06-16T06:22:43Z2024-06-16T06:22:43Zby Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861512024-06-16T06:22:43Z2024-06-16T06:22:43Zby Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45381-1">https://doi.org/10.1007/978-3-319-45381-1</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859282024-06-16T06:22:43Z2024-06-16T06:22:43Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20852462024-06-16T06:22:43Z2024-06-16T06:22:43Zby Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48671-0">https://doi.org/10.1007/978-3-319-48671-0</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856762024-06-16T06:22:43Z2024-06-16T06:22:43Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852252024-06-16T06:22:43Z2024-06-16T06:22:43Zby Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848752024-06-16T06:22:43Z2024-06-16T06:22:43Zby Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33630-5">https://doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854302024-06-16T06:22:43Z2024-06-16T06:22:43Zby Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854392024-06-16T06:22:43Z2024-06-16T06:22:43Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857292024-06-16T06:22:43Z2024-06-16T06:22:43Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20856852024-06-16T06:22:43Z2024-06-16T06:22:43Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20856592024-06-16T06:22:43Z2024-06-16T06:22:43Zby Ranise, Silvio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41483-6">https://doi.org/10.1007/978-3-319-41483-6</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861862024-06-16T06:22:43Z2024-06-16T06:22:43Zby Clark, Jeremy. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20854172024-06-16T06:22:43Z2024-06-16T06:22:43Zby Bishop, Matt. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45871-7">https://doi.org/10.1007/978-3-319-45871-7</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858122024-06-16T06:22:43Z2024-06-16T06:22:43Zby Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:20860622024-06-16T06:22:43Z2024-06-16T06:22:43Zby Bécue, Adrien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20860632024-06-16T06:22:43Z2024-06-16T06:22:43Zby Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Electronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20862082024-06-16T06:22:43Z2024-06-16T06:22:43Zby Kő, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44159-7">https://doi.org/10.1007/978-3-319-44159-7</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861262024-06-16T06:22:43Z2024-06-16T06:22:43Zby Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>