Search Results for - Narrowed by: 2008 - Systems and Data Security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026qf$003dSUBJECT$002509Subject$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300?2024-06-13T18:31:46ZSmart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:5016902024-06-13T18:31:46Z2024-06-13T18:31:46Zby Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028122024-06-13T18:31:46Z2024-06-13T18:31:46Zby Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027302024-06-13T18:31:46Z2024-06-13T18:31:46Zby Rong, Chunming. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papersent://SD_ILS/0/SD_ILS:5028312024-06-13T18:31:46Z2024-06-13T18:31:46Zby Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format: Electronic Resources<br/>Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037672024-06-13T18:31:46Z2024-06-13T18:31:46Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035862024-06-13T18:31:46Z2024-06-13T18:31:46Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2008 OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5037842024-06-13T18:31:46Z2024-06-13T18:31:46Zby Meersman, Robert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88871-0">http://dx.doi.org/10.1007/978-3-540-88871-0</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2008 OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5037852024-06-13T18:31:46Z2024-06-13T18:31:46Zby Meersman, Robert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88873-4">http://dx.doi.org/10.1007/978-3-540-88873-4</a><br/>Format: Electronic Resources<br/>Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015462024-06-13T18:31:46Z2024-06-13T18:31:46Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>Security for Telecommunications Networksent://SD_ILS/0/SD_ILS:5016992024-06-13T18:31:46Z2024-06-13T18:31:46Zby Traynor, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Pervasive Computing 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5035432024-06-13T18:31:46Z2024-06-13T18:31:46Zby Indulska, Jadwiga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79576-6">http://dx.doi.org/10.1007/978-3-540-79576-6</a><br/>Format: Electronic Resources<br/>Insider Attack and Cyber Security Beyond the Hackerent://SD_ILS/0/SD_ILS:5019132024-06-13T18:31:46Z2024-06-13T18:31:46Zby Stolfo, Salvatore J. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Botnet Detection Countering the Largest Security Threatent://SD_ILS/0/SD_ILS:5016272024-06-13T18:31:46Z2024-06-13T18:31:46Zby Lee, Wenke. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028272024-06-13T18:31:46Z2024-06-13T18:31:46Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Ubiquitous Intelligence and Computing 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027292024-06-13T18:31:46Z2024-06-13T18:31:46Zby Sandnes, Frode Eika. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69293-5">http://dx.doi.org/10.1007/978-3-540-69293-5</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033872024-06-13T18:31:46Z2024-06-13T18:31:46Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5028032024-06-13T18:31:46Z2024-06-13T18:31:46Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036602024-06-13T18:31:46Z2024-06-13T18:31:46Zby Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036622024-06-13T18:31:46Z2024-06-13T18:31:46Zby Wu, Tzong-Chen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85886-7">http://dx.doi.org/10.1007/978-3-540-85886-7</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036642024-06-13T18:31:46Z2024-06-13T18:31:46Zby Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format: Electronic Resources<br/>Information Networking. Towards Ubiquitous Networking and Services International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papersent://SD_ILS/0/SD_ILS:5038152024-06-13T18:31:46Z2024-06-13T18:31:46Zby Vazão, Teresa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89524-4">http://dx.doi.org/10.1007/978-3-540-89524-4</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2008 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035762024-06-13T18:31:46Z2024-06-13T18:31:46Zby Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85053-3">http://dx.doi.org/10.1007/978-3-540-85053-3</a><br/>Format: Electronic Resources<br/>IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036802024-06-13T18:31:46Z2024-06-13T18:31:46Zby Akar, Nail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format: Electronic Resources<br/>Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5037892024-06-13T18:31:46Z2024-06-13T18:31:46Zby Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026912024-06-13T18:31:46Z2024-06-13T18:31:46Zby Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Dependability Metrics Advanced Lecturesent://SD_ILS/0/SD_ILS:5026932024-06-13T18:31:46Z2024-06-13T18:31:46Zby Eusgeld, Irene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68947-8">http://dx.doi.org/10.1007/978-3-540-68947-8</a><br/>Format: Electronic Resources<br/>Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026942024-06-13T18:31:46Z2024-06-13T18:31:46Zby Lipp, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68979-9">http://dx.doi.org/10.1007/978-3-540-68979-9</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 9th International Conference, ICDCN 2008, Kolkata, India, January 5-8, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5032422024-06-13T18:31:46Z2024-06-13T18:31:46Zby Rao, Shrisha. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77444-0">http://dx.doi.org/10.1007/978-3-540-77444-0</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037082024-06-13T18:31:46Z2024-06-13T18:31:46Zby Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5035332024-06-13T18:31:46Z2024-06-13T18:31:46Zby Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027932024-06-13T18:31:46Z2024-06-13T18:31:46Zby Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038182024-06-13T18:31:46Z2024-06-13T18:31:46Zby Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Ambient Intelligence European Conference, AmI 2008, Nuremberg, Germany, November 19-22, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038192024-06-13T18:31:46Z2024-06-13T18:31:46Zby Aarts, Emile. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89617-3">http://dx.doi.org/10.1007/978-3-540-89617-3</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038212024-06-13T18:31:46Z2024-06-13T18:31:46Zby Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036842024-06-13T18:31:46Z2024-06-13T18:31:46Zby Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038322024-06-13T18:31:46Z2024-06-13T18:31:46Zby Chowdhury, Dipanwita Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026232024-06-13T18:31:46Z2024-06-13T18:31:46Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format: Electronic Resources<br/>The Internet of Things First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5034172024-06-13T18:31:46Z2024-06-13T18:31:46Zby Floerkemeier, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78731-0">http://dx.doi.org/10.1007/978-3-540-78731-0</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5036102024-06-13T18:31:46Z2024-06-13T18:31:46Zby Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Network-Based Information Systems 2nd International Conference, NBiS 2008, Turin, Italy, September 1-5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036452024-06-13T18:31:46Z2024-06-13T18:31:46Zby Takizawa, Makoto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85693-1">http://dx.doi.org/10.1007/978-3-540-85693-1</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036492024-06-13T18:31:46Z2024-06-13T18:31:46Zby Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format: Electronic Resources<br/>Privacy-Preserving Data Mining Models and Algorithmsent://SD_ILS/0/SD_ILS:5016612024-06-13T18:31:46Z2024-06-13T18:31:46Zby Aggarwal, Charu C. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-70992-5">http://dx.doi.org/10.1007/978-0-387-70992-5</a><br/>Format: Electronic Resources<br/>Intrusion Detection Systemsent://SD_ILS/0/SD_ILS:5019102024-06-13T18:31:46Z2024-06-13T18:31:46Zby Mancini, Luigi V. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 6th International Conference, WWIC 2008 Tampere, Finland, May 28-30, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026762024-06-13T18:31:46Z2024-06-13T18:31:46Zby Harju, Jarmo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68807-5">http://dx.doi.org/10.1007/978-3-540-68807-5</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5034102024-06-13T18:31:46Z2024-06-13T18:31:46Zby Barthe, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78663-4">http://dx.doi.org/10.1007/978-3-540-78663-4</a><br/>Format: Electronic Resources<br/>Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027502024-06-13T18:31:46Z2024-06-13T18:31:46Zby Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IIIent://SD_ILS/0/SD_ILS:5026992024-06-13T18:31:46Z2024-06-13T18:31:46Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035632024-06-13T18:31:46Z2024-06-13T18:31:46Zby Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037772024-06-13T18:31:46Z2024-06-13T18:31:46Zby Baek, Joonsang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88733-1">http://dx.doi.org/10.1007/978-3-540-88733-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5034552024-06-13T18:31:46Z2024-06-13T18:31:46Zby Smart, Nigel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036002024-06-13T18:31:46Z2024-06-13T18:31:46Zby Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038002024-06-13T18:31:46Z2024-06-13T18:31:46Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Research in Cryptology Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5037512024-06-13T18:31:46Z2024-06-13T18:31:46Zby Lucks, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88353-1">http://dx.doi.org/10.1007/978-3-540-88353-1</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037532024-06-13T18:31:46Z2024-06-13T18:31:46Zby Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5037932024-06-13T18:31:46Z2024-06-13T18:31:46Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5034812024-06-13T18:31:46Z2024-06-13T18:31:46Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2008 The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035032024-06-13T18:31:46Z2024-06-13T18:31:46Zby Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format: Electronic Resources<br/>Vulnerability Analysis and Defense for the Internetent://SD_ILS/0/SD_ILS:5017872024-06-13T18:31:46Z2024-06-13T18:31:46Zby Singh, Abhishek. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norwayent://SD_ILS/0/SD_ILS:5015182024-06-13T18:31:46Z2024-06-13T18:31:46Zby Karabulut, Yücel. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09428-1">http://dx.doi.org/10.1007/978-0-387-09428-1</a><br/>Format: Electronic Resources<br/>Handbook of Database Security Applications and Trendsent://SD_ILS/0/SD_ILS:5015832024-06-13T18:31:46Z2024-06-13T18:31:46Zby Gertz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format: Electronic Resources<br/>Cryptanalytic Attacks on RSAent://SD_ILS/0/SD_ILS:5015842024-06-13T18:31:46Z2024-06-13T18:31:46Zby Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Towards Sustainable Society on Ubiquitous Networks The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24–16, 2008, Tokyo, Japanent://SD_ILS/0/SD_ILS:5020032024-06-13T18:31:46Z2024-06-13T18:31:46Zby Oya, Makoto. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-85691-9">http://dx.doi.org/10.1007/978-0-387-85691-9</a><br/>Format: Electronic Resources<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038392024-06-13T18:31:46Z2024-06-13T18:31:46Zby Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>