Search Results for - Narrowed by: 2005 - Data Encryption. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026qf$003dSUBJECT$002509Subject$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300? 2024-05-26T07:52:03Z Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510199 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Lim, Chae Hoon. editor.<br/><a href="http://dx.doi.org/10.1007/b103174">http://dx.doi.org/10.1007/b103174</a><br/>Format:&#160;Electronic Resources<br/> Computer viruses: from theory to applications ent://SD_ILS/0/SD_ILS:508732 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Filiol, Eric. author.<br/><a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms: Design and Applications ent://SD_ILS/0/SD_ILS:504243 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Smith, Sean W. author.<br/><a href="http://dx.doi.org/10.1007/b103637">http://dx.doi.org/10.1007/b103637</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15&ndash;18, 2004, Windermere, The Lake District, United Kingdom ent://SD_ILS/0/SD_ILS:504313 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/b105674">http://dx.doi.org/10.1007/b105674</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22&ndash;27, 2004, Toulouse, France ent://SD_ILS/0/SD_ILS:504264 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:509964 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11558859">http://dx.doi.org/10.1007/11558859</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510135 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2005 7th International Workshop, Edinburgh, UK, August 29 &ndash; September 1, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510312 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Rao, Josyula R. editor.<br/><a href="http://dx.doi.org/10.1007/11545262">http://dx.doi.org/10.1007/11545262</a><br/>Format:&#160;Electronic Resources<br/> Advanced Encryption Standard &ndash; AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers ent://SD_ILS/0/SD_ILS:510223 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Dobbertin, Hans. editor.<br/><a href="http://dx.doi.org/10.1007/b137765">http://dx.doi.org/10.1007/b137765</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510415 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11551492">http://dx.doi.org/10.1007/11551492</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509671 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Fridrich, Jessica. editor.<br/><a href="http://dx.doi.org/10.1007/b104759">http://dx.doi.org/10.1007/b104759</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510103 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Julisch, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/b137798">http://dx.doi.org/10.1007/b137798</a><br/>Format:&#160;Electronic Resources<br/> Embedded and Ubiquitous Computing &ndash; EUC 2005 Workshops EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510570 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Enokido, Tomoya. editor.<br/><a href="http://dx.doi.org/10.1007/11596042">http://dx.doi.org/10.1007/11596042</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510572 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format:&#160;Electronic Resources<br/> Complexity Theory and Cryptology An Introduction to Cryptocomplexity ent://SD_ILS/0/SD_ILS:509448 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Rothe, J&ouml;rg. author.<br/><a href="http://dx.doi.org/10.1007/3-540-28520-2">http://dx.doi.org/10.1007/3-540-28520-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510253 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Shoup, Victor. editor.<br/><a href="http://dx.doi.org/10.1007/11535218">http://dx.doi.org/10.1007/11535218</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-hoc and Sensor Networks First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510552 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Jia, Xiaohua. editor.<br/><a href="http://dx.doi.org/10.1007/11599463">http://dx.doi.org/10.1007/11599463</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510650 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Feng, Dengguo. editor.<br/><a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format:&#160;Electronic Resources<br/> Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509717 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Castelluccia, Claude. editor.<br/><a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2004 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedings ent://SD_ILS/0/SD_ILS:509738 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Canteaut, Anne. editor.<br/><a href="http://dx.doi.org/10.1007/b104579">http://dx.doi.org/10.1007/b104579</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509743 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Handschuh, Helena. editor.<br/><a href="http://dx.doi.org/10.1007/b105103">http://dx.doi.org/10.1007/b105103</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509757 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510020 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Ioannidis, John. editor.<br/><a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510331 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510344 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11552338">http://dx.doi.org/10.1007/11552338</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510063 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/11533733">http://dx.doi.org/10.1007/11533733</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; Mycrypt 2005 First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510427 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/11554868">http://dx.doi.org/10.1007/11554868</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510443 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Park, Choon-sik. editor.<br/><a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2005 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510554 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Maitra, Subhamoy. editor.<br/><a href="http://dx.doi.org/10.1007/11596219">http://dx.doi.org/10.1007/11596219</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510459 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format:&#160;Electronic Resources<br/> Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510302 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 &ndash; March 3, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:510132 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format:&#160;Electronic Resources<br/> Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509770 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Blundo, Carlo. editor.<br/><a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lectures ent://SD_ILS/0/SD_ILS:510308 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/11554578">http://dx.doi.org/10.1007/11554578</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510309 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 &ndash; 21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510348 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Dittmann, Jana. editor.<br/><a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510349 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510351 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Vimercati, Sabrina de Capitani. editor.<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510364 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510087 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Molva, Refik. editor.<br/><a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510543 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Roy, Bimal. editor.<br/><a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510186 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Third International Workshop, IWDW 2004, Seoul, South Korea, October 30 - November 1, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510189 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Cox, Ingemar J. editor.<br/><a href="http://dx.doi.org/10.1007/b106346">http://dx.doi.org/10.1007/b106346</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making 9th Asian Computing Science Conference. Dedicated to Jean-Louis Lassez on the Occasion of His 5th Birthday. Chiang Mai, Thailand, December 8-10, 2004. Proceedings ent://SD_ILS/0/SD_ILS:509721 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Maher, Michael J. editor.<br/><a href="http://dx.doi.org/10.1007/b103476">http://dx.doi.org/10.1007/b103476</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2005 The Cryptographers&rsquo; Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509752 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/b105222">http://dx.doi.org/10.1007/b105222</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509753 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Kilian, Joe. editor.<br/><a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510219 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510644 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Smart, Nigel P. editor.<br/><a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510648 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format:&#160;Electronic Resources<br/> Secure Group Communications over Data Networks ent://SD_ILS/0/SD_ILS:504082 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Zou, Xukai. author.<br/><a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format:&#160;Electronic Resources<br/> Brute Force Cracking the Data Encryption Standard ent://SD_ILS/0/SD_ILS:504600 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Curtin, Matt. author.<br/><a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format:&#160;Electronic Resources<br/> Image and Video Encryption From Digital Rights Management to Secured Personal Communication. ent://SD_ILS/0/SD_ILS:504166 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;SpringerLink (Online service)<br/><a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format:&#160;Electronic Resources<br/> Coding for Data and Computer Communications ent://SD_ILS/0/SD_ILS:504226 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format:&#160;Electronic Resources<br/> Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E&rsquo;2005), October 28&ndash;30, 2005, Poznan, Poland ent://SD_ILS/0/SD_ILS:504944 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Funabashi, Matohisa. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-29773-1">http://dx.doi.org/10.1007/0-387-29773-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Security in the 21st Century ent://SD_ILS/0/SD_ILS:504252 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Lee, D. T. editor.<br/><a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:504165 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Kruegel, Christopher. author.<br/><a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Electronic Resources<br/> Security in E-Learning ent://SD_ILS/0/SD_ILS:504480 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Weippl, Edgar. author.<br/><a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Encryption and Watermarking ent://SD_ILS/0/SD_ILS:504482 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Furht, Borko. author.<br/><a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6&ndash;9 September 2004 ent://SD_ILS/0/SD_ILS:506450 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Kowalik, Janusz S. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format:&#160;Electronic Resources<br/> Honeypots for Windows ent://SD_ILS/0/SD_ILS:507707 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Grimes, Roger A. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-0007-9">http://dx.doi.org/10.1007/978-1-4302-0007-9</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510121 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Gilbert, Henri. editor.<br/><a href="http://dx.doi.org/10.1007/b137506">http://dx.doi.org/10.1007/b137506</a><br/>Format:&#160;Electronic Resources<br/> Sequences and Their Applications - SETA 2004 Third International Conference, Seoul, Korea, October 24-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510411 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Helleseth, Tor. editor.<br/><a href="http://dx.doi.org/10.1007/b136167">http://dx.doi.org/10.1007/b136167</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510418 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/b136415">http://dx.doi.org/10.1007/b136415</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 &ndash; June 1, 2005, Chiba, Japan ent://SD_ILS/0/SD_ILS:504425 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Sasaki, Ryoichi. editor.<br/><a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format:&#160;Electronic Resources<br/> Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) ent://SD_ILS/0/SD_ILS:504524 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security and Trust within the Context of Pervasive Computing ent://SD_ILS/0/SD_ILS:504171 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Robinson, Philip. editor.<br/><a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format:&#160;Electronic Resources<br/> Certification and Security in Inter-Organizational E-Service ent://SD_ILS/0/SD_ILS:504345 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Nardelli, Enrico. editor.<br/><a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:504178 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Modern Number Theory Fundamental Problems, Ideas and Theories ent://SD_ILS/0/SD_ILS:509290 2024-05-26T07:52:03Z 2024-05-26T07:52:03Z by&#160;Manin, Yuri Ivanovic. author.<br/><a href="http://dx.doi.org/10.1007/3-540-27692-0">http://dx.doi.org/10.1007/3-540-27692-0</a><br/>Format:&#160;Electronic Resources<br/>