Search Results for - Narrowed by: 2016 - Cryptology. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092016$0025092016$0026qf$003dSUBJECT$002509Subject$002509Cryptology.$002509Cryptology.$0026ps$003d300? 2024-06-07T13:11:42Z Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084619 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Batten, Lynn. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2741-3">https://doi.org/10.1007/978-981-10-2741-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084620 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format:&#160;Electronic Resources<br/> Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applications ent://SD_ILS/0/SD_ILS:2085009 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Liu, Wen Ming. author.<br/><a href="https://doi.org/10.1007/978-3-319-42644-0">https://doi.org/10.1007/978-3-319-42644-0</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebasti&aacute;n, Spain, July 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085015 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Caballero, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format:&#160;Electronic Resources<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085561 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44406-2">https://doi.org/10.1007/978-3-319-44406-2</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21&ndash;22, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085728 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085729 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Enhancing Aggregation Techniques for Smart Grid Communications ent://SD_ILS/0/SD_ILS:2084785 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Lu, Rongxing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32899-7">https://doi.org/10.1007/978-3-319-32899-7</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:2085567 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48674-1">https://doi.org/10.1007/978-3-319-48674-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085747 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Homma, Naofumi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31271-2">https://doi.org/10.1007/978-3-319-31271-2</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085659 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Ranise, Silvio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41483-6">https://doi.org/10.1007/978-3-319-41483-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085417 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Bishop, Matt. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45871-7">https://doi.org/10.1007/978-3-319-45871-7</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085676 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085677 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49099-0">https://doi.org/10.1007/978-3-662-49099-0</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085709 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Pointcheval, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086151 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45381-1">https://doi.org/10.1007/978-3-319-45381-1</a><br/>Format:&#160;Electronic Resources<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:2084088 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/> Digital Fingerprinting ent://SD_ILS/0/SD_ILS:2084738 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Wang, Cliff. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format:&#160;Electronic Resources<br/> Ethics in Computing A Concise Module ent://SD_ILS/0/SD_ILS:2084739 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-319-29106-2">https://doi.org/10.1007/978-3-319-29106-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085230 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085238 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085085 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Brumley, Billy Bob. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085928 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085732 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085585 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085406 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Lambrinoudakis, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:2085526 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085685 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085704 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086143 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086144 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Bao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49151-6">https://doi.org/10.1007/978-3-319-49151-6</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086126 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086209 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44403-1">https://doi.org/10.1007/978-3-319-44403-1</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086208 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Kő, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44159-7">https://doi.org/10.1007/978-3-319-44159-7</a><br/>Format:&#160;Electronic Resources<br/> Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches ent://SD_ILS/0/SD_ILS:2084756 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Al-Shaer, Ehab. author.<br/><a href="https://doi.org/10.1007/978-3-319-32871-3">https://doi.org/10.1007/978-3-319-32871-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:2084757 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Colbert, Edward J. M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085430 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085016 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Peyrin, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-52993-5">https://doi.org/10.1007/978-3-662-52993-5</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems 8th International Symposium, ESSoS 2016, London, UK, April 6&ndash;8, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085559 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Caballero, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30806-7">https://doi.org/10.1007/978-3-319-30806-7</a><br/>Format:&#160;Electronic Resources<br/> SOFSEM 2016: Theory and Practice of Computer Science 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085743 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Freivalds, Rūsiņ&scaron; Mārtiņ&scaron;. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49192-8">https://doi.org/10.1007/978-3-662-49192-8</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2&ndash;8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085744 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5&ndash;6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085888 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085790 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29485-8">https://doi.org/10.1007/978-3-319-29485-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085800 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085801 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49096-9">https://doi.org/10.1007/978-3-662-49096-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 &ndash; September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085802 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085812 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 &ndash; December 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085698 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2086079 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085713 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Standaert, Fran&ccedil;ois-Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43283-0">https://doi.org/10.1007/978-3-319-43283-0</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cyberdeception ent://SD_ILS/0/SD_ILS:2084754 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Rowe, Neil C. author.<br/><a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085036 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085235 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38898-4">https://doi.org/10.1007/978-3-319-38898-4</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Techniques in Curvelet and Ridgelet Domain ent://SD_ILS/0/SD_ILS:2084424 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Rao, Channapragada Rama Seshagiri. author.<br/><a href="https://doi.org/10.1007/978-3-319-32951-2">https://doi.org/10.1007/978-3-319-32951-2</a><br/>Format:&#160;Electronic Resources<br/> Elements of Cloud Storage Security Concepts, Designs and Optimized Practices ent://SD_ILS/0/SD_ILS:2084295 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Galibus, Tatiana. author.<br/><a href="https://doi.org/10.1007/978-3-319-44962-3">https://doi.org/10.1007/978-3-319-44962-3</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:2085246 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48671-0">https://doi.org/10.1007/978-3-319-48671-0</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085256 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Gierlichs, Benedikt. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53140-2">https://doi.org/10.1007/978-3-662-53140-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085439 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26&ndash;27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085465 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45931-8">https://doi.org/10.1007/978-3-319-45931-8</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085937 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Pasalic, Enes. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29172-7">https://doi.org/10.1007/978-3-319-29172-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085735 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III ent://SD_ILS/0/SD_ILS:2085736 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085737 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20&ndash;22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085953 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Kim, Ho-won. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31875-2">https://doi.org/10.1007/978-3-319-31875-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085962 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:2085858 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085647 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Duquesne, Sylvain. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55227-9">https://doi.org/10.1007/978-3-319-55227-9</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography &ndash; SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12&ndash;14, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085972 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31301-6">https://doi.org/10.1007/978-3-319-31301-6</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085980 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Katsikas, Sokratis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44341-6">https://doi.org/10.1007/978-3-319-44341-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085887 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10&ndash;11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085778 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;G&uuml;neysu, Tim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29078-2">https://doi.org/10.1007/978-3-319-29078-2</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086186 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Clark, Jeremy. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086017 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Nascimento, Anderson C.A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49175-2">https://doi.org/10.1007/978-3-319-49175-2</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086087 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Livraga, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085921 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30303-1">https://doi.org/10.1007/978-3-319-30303-1</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086095 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086099 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format:&#160;Electronic Resources<br/> Watermarking Security ent://SD_ILS/0/SD_ILS:2087095 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Bas, Patrick. author.<br/><a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085086 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format:&#160;Electronic Resources<br/> Understanding Social Engineering Based Scams ent://SD_ILS/0/SD_ILS:2084704 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Jakobsson, Markus. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format:&#160;Electronic Resources<br/> Ten Laws for Security ent://SD_ILS/0/SD_ILS:2084527 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Diehl, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084685 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Mueller, Peter. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2738-3">https://doi.org/10.1007/978-981-10-2738-3</a><br/>Format:&#160;Electronic Resources<br/> Elements of Cloud Computing Security A Survey of Key Practicalities ent://SD_ILS/0/SD_ILS:2084335 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Alani, Mohammed M. author.<br/><a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085045 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49148-6">https://doi.org/10.1007/978-3-319-49148-6</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084875 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33630-5">https://doi.org/10.1007/978-3-319-33630-5</a><br/>Format:&#160;Electronic Resources<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085442 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Buccafurri, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45507-5">https://doi.org/10.1007/978-3-319-45507-5</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085443 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085225 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format:&#160;Electronic Resources<br/> Mobile and Wireless Technologies 2016 ent://SD_ILS/0/SD_ILS:2087893 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1409-3">https://doi.org/10.1007/978-981-10-1409-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086059 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format:&#160;Electronic Resources<br/> Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21&ndash;22, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086062 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;B&eacute;cue, Adrien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2086063 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086066 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086070 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format:&#160;Electronic Resources<br/> The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday ent://SD_ILS/0/SD_ILS:2086154 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086158 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Kwon, Soonhak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30840-1">https://doi.org/10.1007/978-3-319-30840-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085726 2024-06-07T13:11:42Z 2024-06-07T13:11:42Z by&#160;Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format:&#160;Electronic Resources<br/>