Search Results for - Narrowed by: 2016 - Computer Communication Networks. - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092016$0025092016$0026qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-06-22T23:27:11ZOpen Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861262024-06-22T23:27:11Z2024-06-22T23:27:11Zby Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860062024-06-22T23:27:11Z2024-06-22T23:27:11Zby Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format: Electronic Resources<br/>Elements of Cloud Storage Security Concepts, Designs and Optimized Practicesent://SD_ILS/0/SD_ILS:20842952024-06-22T23:27:11Z2024-06-22T23:27:11Zby Galibus, Tatiana. author.<br/><a href="https://doi.org/10.1007/978-3-319-44962-3">https://doi.org/10.1007/978-3-319-44962-3</a><br/>Format: Electronic Resources<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:20847572024-06-22T23:27:11Z2024-06-22T23:27:11Zby Colbert, Edward J. M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprisesent://SD_ILS/0/SD_ILS:20845762024-06-22T23:27:11Z2024-06-22T23:27:11Zby Pierer, Markus. author.<br/><a href="https://doi.org/10.1007/978-3-658-15046-4">https://doi.org/10.1007/978-3-658-15046-4</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850452024-06-22T23:27:11Z2024-06-22T23:27:11Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49148-6">https://doi.org/10.1007/978-3-319-49148-6</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Aggregation Techniques for Smart Grid Communicationsent://SD_ILS/0/SD_ILS:20847852024-06-22T23:27:11Z2024-06-22T23:27:11Zby Lu, Rongxing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32899-7">https://doi.org/10.1007/978-3-319-32899-7</a><br/>Format: Electronic Resources<br/>Security-Aware Device-to-Device Communications Underlaying Cellular Networksent://SD_ILS/0/SD_ILS:20847872024-06-22T23:27:11Z2024-06-22T23:27:11Zby Zhang, Aiqing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32458-6">https://doi.org/10.1007/978-3-319-32458-6</a><br/>Format: Electronic Resources<br/>Security in Network Codingent://SD_ILS/0/SD_ILS:20850062024-06-22T23:27:11Z2024-06-22T23:27:11Zby Zhang, Peng. author.<br/><a href="https://doi.org/10.1007/978-3-319-31083-1">https://doi.org/10.1007/978-3-319-31083-1</a><br/>Format: Electronic Resources<br/>Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applicationsent://SD_ILS/0/SD_ILS:20850092024-06-22T23:27:11Z2024-06-22T23:27:11Zby Liu, Wen Ming. author.<br/><a href="https://doi.org/10.1007/978-3-319-42644-0">https://doi.org/10.1007/978-3-319-42644-0</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2–8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857442024-06-22T23:27:11Z2024-06-22T23:27:11Zby Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20857452024-06-22T23:27:11Z2024-06-22T23:27:11Zby Karagiannis, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30505-9">https://doi.org/10.1007/978-3-319-30505-9</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856752024-06-22T23:27:11Z2024-06-22T23:27:11Zby Li, Wenfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45940-0">https://doi.org/10.1007/978-3-319-45940-0</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860172024-06-22T23:27:11Z2024-06-22T23:27:11Zby Nascimento, Anderson C.A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49175-2">https://doi.org/10.1007/978-3-319-49175-2</a><br/>Format: Electronic Resources<br/>Industrial IoT Technologies and Applications International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842042024-06-22T23:27:11Z2024-06-22T23:27:11Zby Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44350-8">https://doi.org/10.1007/978-3-319-44350-8</a><br/>Format: Electronic Resources<br/>Introduction to Cyberdeceptionent://SD_ILS/0/SD_ILS:20847542024-06-22T23:27:11Z2024-06-22T23:27:11Zby Rowe, Neil C. author.<br/><a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Security and Resiliency Analytics for Smart Grids Static and Dynamic Approachesent://SD_ILS/0/SD_ILS:20847562024-06-22T23:27:11Z2024-06-22T23:27:11Zby Al-Shaer, Ehab. author.<br/><a href="https://doi.org/10.1007/978-3-319-32871-3">https://doi.org/10.1007/978-3-319-32871-3</a><br/>Format: Electronic Resources<br/>Android Application Security A Semantics and Context-Aware Approachent://SD_ILS/0/SD_ILS:20843662024-06-22T23:27:11Z2024-06-22T23:27:11Zby Zhang, Mu. author.<br/><a href="https://doi.org/10.1007/978-3-319-47812-8">https://doi.org/10.1007/978-3-319-47812-8</a><br/>Format: Electronic Resources<br/>Big Data Concepts, Theories, and Applicationsent://SD_ILS/0/SD_ILS:20847512024-06-22T23:27:11Z2024-06-22T23:27:11Zby Yu, Shui. editor.<br/><a href="https://doi.org/10.1007/978-3-319-27763-9">https://doi.org/10.1007/978-3-319-27763-9</a><br/>Format: Electronic Resources<br/>Collaborative Computing: Networking, Applications, and Worksharing 11th International Conference, CollaborateCom 2015, Wuhan, November 10-11, 2015, China. Proceedingsent://SD_ILS/0/SD_ILS:20846392024-06-22T23:27:11Z2024-06-22T23:27:11Zby Guo, Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28910-6">https://doi.org/10.1007/978-3-319-28910-6</a><br/>Format: Electronic Resources<br/>Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN & PDCAT 2015ent://SD_ILS/0/SD_ILS:20849492024-06-22T23:27:11Z2024-06-22T23:27:11Zby Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-0068-3">https://doi.org/10.1007/978-981-10-0068-3</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854432024-06-22T23:27:11Z2024-06-22T23:27:11Zby Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856772024-06-22T23:27:11Z2024-06-22T23:27:11Zby Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49099-0">https://doi.org/10.1007/978-3-662-49099-0</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858872024-06-22T23:27:11Z2024-06-22T23:27:11Zby Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857902024-06-22T23:27:11Z2024-06-22T23:27:11Zby Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29485-8">https://doi.org/10.1007/978-3-319-29485-8</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859802024-06-22T23:27:11Z2024-06-22T23:27:11Zby Katsikas, Sokratis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44341-6">https://doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20858012024-06-22T23:27:11Z2024-06-22T23:27:11Zby Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49096-9">https://doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858022024-06-22T23:27:11Z2024-06-22T23:27:11Zby Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858122024-06-22T23:27:11Z2024-06-22T23:27:11Zby Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-06-22T23:27:11Z2024-06-22T23:27:11Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852342024-06-22T23:27:11Z2024-06-22T23:27:11Zby Lecomte, Thierry. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33951-1">https://doi.org/10.1007/978-3-319-33951-1</a><br/>Format: Electronic Resources<br/>Cloud Computing 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849662024-06-22T23:27:11Z2024-06-22T23:27:11Zby Zhang, Yin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38904-2">https://doi.org/10.1007/978-3-319-38904-2</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848752024-06-22T23:27:11Z2024-06-22T23:27:11Zby Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33630-5">https://doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848772024-06-22T23:27:11Z2024-06-22T23:27:11Zby Doss, Robin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48021-3">https://doi.org/10.1007/978-3-319-48021-3</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking Second International Conference, MSPN 2016, Paris, France, June 1-3, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20851002024-06-22T23:27:11Z2024-06-22T23:27:11Zby Boumerdassi, Selma. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50463-6">https://doi.org/10.1007/978-3-319-50463-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860952024-06-22T23:27:11Z2024-06-22T23:27:11Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format: Electronic Resources<br/>Moving Target Defense for Distributed Systemsent://SD_ILS/0/SD_ILS:20845152024-06-22T23:27:11Z2024-06-22T23:27:11Zby Shetty, Sachin. author.<br/><a href="https://doi.org/10.1007/978-3-319-31032-9">https://doi.org/10.1007/978-3-319-31032-9</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862024-06-22T23:27:11Z2024-06-22T23:27:11Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850892024-06-22T23:27:11Z2024-06-22T23:27:11Zby Zhu, Quanyan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format: Electronic Resources<br/>Wireless Sensor Networks Security, Coverage, and Localizationent://SD_ILS/0/SD_ILS:20844362024-06-22T23:27:11Z2024-06-22T23:27:11Zby Selmic, Rastko R. author.<br/><a href="https://doi.org/10.1007/978-3-319-46769-6">https://doi.org/10.1007/978-3-319-46769-6</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:20840882024-06-22T23:27:11Z2024-06-22T23:27:11Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-06-22T23:27:11Z2024-06-22T23:27:11Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Fundamentals of Network Forensics A Research Perspectiveent://SD_ILS/0/SD_ILS:20848672024-06-22T23:27:11Z2024-06-22T23:27:11Zby Joshi, R.C. author.<br/><a href="https://doi.org/10.1007/978-1-4471-7299-4">https://doi.org/10.1007/978-1-4471-7299-4</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852562024-06-22T23:27:11Z2024-06-22T23:27:11Zby Gierlichs, Benedikt. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53140-2">https://doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Computer Networks 23rd International Conference, CN 2016, Brunów, Poland, June 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848152024-06-22T23:27:11Z2024-06-22T23:27:11Zby Gaj, Piotr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39207-3">https://doi.org/10.1007/978-3-319-39207-3</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849982024-06-22T23:27:11Z2024-06-22T23:27:11Zby Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30222-5">https://doi.org/10.1007/978-3-319-30222-5</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854282024-06-22T23:27:11Z2024-06-22T23:27:11Zby Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850972024-06-22T23:27:11Z2024-06-22T23:27:11Zby Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846852024-06-22T23:27:11Z2024-06-22T23:27:11Zby Mueller, Peter. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2738-3">https://doi.org/10.1007/978-981-10-2738-3</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852152024-06-22T23:27:11Z2024-06-22T23:27:11Zby Panayiotou, Christos G. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31664-2">https://doi.org/10.1007/978-3-319-31664-2</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852182024-06-22T23:27:11Z2024-06-22T23:27:11Zby Bjørner, Nikolaj. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28034-9">https://doi.org/10.1007/978-3-319-28034-9</a><br/>Format: Electronic Resources<br/>Graphical Models for Security Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20856802024-06-22T23:27:11Z2024-06-22T23:27:11Zby Kordy, Barbara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46263-9">https://doi.org/10.1007/978-3-319-46263-9</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20860632024-06-22T23:27:11Z2024-06-22T23:27:11Zby Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20860792024-06-22T23:27:11Z2024-06-22T23:27:11Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857292024-06-22T23:27:11Z2024-06-22T23:27:11Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856052024-06-22T23:27:11Z2024-06-22T23:27:11Zby Galinina, Olga. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46301-8">https://doi.org/10.1007/978-3-319-46301-8</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854062024-06-22T23:27:11Z2024-06-22T23:27:11Zby Lambrinoudakis, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859862024-06-22T23:27:11Z2024-06-22T23:27:11Zby Badonnel, Rémi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39814-3">https://doi.org/10.1007/978-3-319-39814-3</a><br/>Format: Electronic Resources<br/>Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852242024-06-22T23:27:11Z2024-06-22T23:27:11Zby Mauw, Sjouke. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29968-6">https://doi.org/10.1007/978-3-319-29968-6</a><br/>Format: Electronic Resources<br/>Elements of Cloud Computing Security A Survey of Key Practicalitiesent://SD_ILS/0/SD_ILS:20843352024-06-22T23:27:11Z2024-06-22T23:27:11Zby Alani, Mohammed M. author.<br/><a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Physical-Layer Security for Cooperative Relay Networksent://SD_ILS/0/SD_ILS:20847092024-06-22T23:27:11Z2024-06-22T23:27:11Zby Zou, Yulong. author.<br/><a href="https://doi.org/10.1007/978-3-319-31174-6">https://doi.org/10.1007/978-3-319-31174-6</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20–22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859532024-06-22T23:27:11Z2024-06-22T23:27:11Zby Kim, Ho-won. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31875-2">https://doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857782024-06-22T23:27:11Z2024-06-22T23:27:11Zby Güneysu, Tim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29078-2">https://doi.org/10.1007/978-3-319-29078-2</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857222024-06-22T23:27:11Z2024-06-22T23:27:11Zby Mitton, Nathalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40509-4">https://doi.org/10.1007/978-3-319-40509-4</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857262024-06-22T23:27:11Z2024-06-22T23:27:11Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20855262024-06-22T23:27:11Z2024-06-22T23:27:11Zby Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859212024-06-22T23:27:11Z2024-06-22T23:27:11Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30303-1">https://doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>