Search Results for - Narrowed by: 2016 - Systems and Data Security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092016$0025092016$0026qf$003dSUBJECT$002509Subject$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300?2024-05-31T22:00:57ZElements of Cloud Computing Security A Survey of Key Practicalitiesent://SD_ILS/0/SD_ILS:20843352024-05-31T22:00:57Z2024-05-31T22:00:57Zby Alani, Mohammed M. author.<br/><a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015ent://SD_ILS/0/SD_ILS:20864712024-05-31T22:00:57Z2024-05-31T22:00:57Zby Senthilkumar, Muthukrishnan. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0251-9">https://doi.org/10.1007/978-981-10-0251-9</a><br/>Format: Electronic Resources<br/>Mobile Phone Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:20865152024-05-31T22:00:57Z2024-05-31T22:00:57Zby Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format: Electronic Resources<br/>Collaborative Computing: Networking, Applications, and Worksharing 11th International Conference, CollaborateCom 2015, Wuhan, November 10-11, 2015, China. Proceedingsent://SD_ILS/0/SD_ILS:20846392024-05-31T22:00:57Z2024-05-31T22:00:57Zby Guo, Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28910-6">https://doi.org/10.1007/978-3-319-28910-6</a><br/>Format: Electronic Resources<br/>Open Source Intelligence Investigation From Strategy to Implementationent://SD_ILS/0/SD_ILS:20842942024-05-31T22:00:57Z2024-05-31T22:00:57Zby Akhgar, Babak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format: Electronic Resources<br/>Elements of Cloud Storage Security Concepts, Designs and Optimized Practicesent://SD_ILS/0/SD_ILS:20842952024-05-31T22:00:57Z2024-05-31T22:00:57Zby Galibus, Tatiana. author.<br/><a href="https://doi.org/10.1007/978-3-319-44962-3">https://doi.org/10.1007/978-3-319-44962-3</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848392024-05-31T22:00:57Z2024-05-31T22:00:57Zby Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-05-31T22:00:57Z2024-05-31T22:00:57Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Big Data Concepts, Theories, and Applicationsent://SD_ILS/0/SD_ILS:20847512024-05-31T22:00:57Z2024-05-31T22:00:57Zby Yu, Shui. editor.<br/><a href="https://doi.org/10.1007/978-3-319-27763-9">https://doi.org/10.1007/978-3-319-27763-9</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854392024-05-31T22:00:57Z2024-05-31T22:00:57Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854422024-05-31T22:00:57Z2024-05-31T22:00:57Zby Buccafurri, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45507-5">https://doi.org/10.1007/978-3-319-45507-5</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854432024-05-31T22:00:57Z2024-05-31T22:00:57Zby Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format: Electronic Resources<br/>Technology and Intimacy: Choice or Coercion 12th IFIP TC 9 International Conference on Human Choice and Computers, HCC12 2016, Salford, UK, September 7-9, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20845052024-05-31T22:00:57Z2024-05-31T22:00:57Zby Kreps, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44805-3">https://doi.org/10.1007/978-3-319-44805-3</a><br/>Format: Electronic Resources<br/>Moving Target Defense for Distributed Systemsent://SD_ILS/0/SD_ILS:20845152024-05-31T22:00:57Z2024-05-31T22:00:57Zby Shetty, Sachin. author.<br/><a href="https://doi.org/10.1007/978-3-319-31032-9">https://doi.org/10.1007/978-3-319-31032-9</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-05-31T22:00:57Z2024-05-31T22:00:57Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Industrial IoT Technologies and Applications International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842042024-05-31T22:00:57Z2024-05-31T22:00:57Zby Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44350-8">https://doi.org/10.1007/978-3-319-44350-8</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:20840882024-05-31T22:00:57Z2024-05-31T22:00:57Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-05-31T22:00:57Z2024-05-31T22:00:57Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Android Application Security A Semantics and Context-Aware Approachent://SD_ILS/0/SD_ILS:20843662024-05-31T22:00:57Z2024-05-31T22:00:57Zby Zhang, Mu. author.<br/><a href="https://doi.org/10.1007/978-3-319-47812-8">https://doi.org/10.1007/978-3-319-47812-8</a><br/>Format: Electronic Resources<br/>Social Network Analysis in Predictive Policing Concepts, Models and Methodsent://SD_ILS/0/SD_ILS:20846272024-05-31T22:00:57Z2024-05-31T22:00:57Zby Tayebi, Mohammad A. author.<br/><a href="https://doi.org/10.1007/978-3-319-41492-8">https://doi.org/10.1007/978-3-319-41492-8</a><br/>Format: Electronic Resources<br/>Digital Fingerprintingent://SD_ILS/0/SD_ILS:20847382024-05-31T22:00:57Z2024-05-31T22:00:57Zby Wang, Cliff. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854282024-05-31T22:00:57Z2024-05-31T22:00:57Zby Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format: Electronic Resources<br/>Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854302024-05-31T22:00:57Z2024-05-31T22:00:57Zby Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format: Electronic Resources<br/>Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847772024-05-31T22:00:57Z2024-05-31T22:00:57Zby Haltinner, Kristin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format: Electronic Resources<br/>Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20850852024-05-31T22:00:57Z2024-05-31T22:00:57Zby Brumley, Billy Bob. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862024-05-31T22:00:57Z2024-05-31T22:00:57Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850892024-05-31T22:00:57Z2024-05-31T22:00:57Zby Zhu, Quanyan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format: Electronic Resources<br/>Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850042024-05-31T22:00:57Z2024-05-31T22:00:57Zby Habib, Sheikh Mahbub. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41354-9">https://doi.org/10.1007/978-3-319-41354-9</a><br/>Format: Electronic Resources<br/>Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applicationsent://SD_ILS/0/SD_ILS:20850092024-05-31T22:00:57Z2024-05-31T22:00:57Zby Liu, Wen Ming. author.<br/><a href="https://doi.org/10.1007/978-3-319-42644-0">https://doi.org/10.1007/978-3-319-42644-0</a><br/>Format: Electronic Resources<br/>Introduction to Cyberdeceptionent://SD_ILS/0/SD_ILS:20847542024-05-31T22:00:57Z2024-05-31T22:00:57Zby Rowe, Neil C. author.<br/><a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Security and Resiliency Analytics for Smart Grids Static and Dynamic Approachesent://SD_ILS/0/SD_ILS:20847562024-05-31T22:00:57Z2024-05-31T22:00:57Zby Al-Shaer, Ehab. author.<br/><a href="https://doi.org/10.1007/978-3-319-32871-3">https://doi.org/10.1007/978-3-319-32871-3</a><br/>Format: Electronic Resources<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:20847572024-05-31T22:00:57Z2024-05-31T22:00:57Zby Colbert, Edward J. M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Cloud Computing 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849662024-05-31T22:00:57Z2024-05-31T22:00:57Zby Zhang, Yin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38904-2">https://doi.org/10.1007/978-3-319-38904-2</a><br/>Format: Electronic Resources<br/>Security-Aware Device-to-Device Communications Underlaying Cellular Networksent://SD_ILS/0/SD_ILS:20847872024-05-31T22:00:57Z2024-05-31T22:00:57Zby Zhang, Aiqing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32458-6">https://doi.org/10.1007/978-3-319-32458-6</a><br/>Format: Electronic Resources<br/>Security in Network Codingent://SD_ILS/0/SD_ILS:20850062024-05-31T22:00:57Z2024-05-31T22:00:57Zby Zhang, Peng. author.<br/><a href="https://doi.org/10.1007/978-3-319-31083-1">https://doi.org/10.1007/978-3-319-31083-1</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20855572024-05-31T22:00:57Z2024-05-31T22:00:57Zby Schiffner, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44760-5">https://doi.org/10.1007/978-3-319-44760-5</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855612024-05-31T22:00:57Z2024-05-31T22:00:57Zby Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44406-2">https://doi.org/10.1007/978-3-319-44406-2</a><br/>Format: Electronic Resources<br/>Advances in Visual Computing 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855682024-05-31T22:00:57Z2024-05-31T22:00:57Zby Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50832-0">https://doi.org/10.1007/978-3-319-50832-0</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848752024-05-31T22:00:57Z2024-05-31T22:00:57Zby Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33630-5">https://doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848772024-05-31T22:00:57Z2024-05-31T22:00:57Zby Doss, Robin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48021-3">https://doi.org/10.1007/978-3-319-48021-3</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850822024-05-31T22:00:57Z2024-05-31T22:00:57Zby Aiello, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44482-6">https://doi.org/10.1007/978-3-319-44482-6</a><br/>Format: Electronic Resources<br/>Boolean Functions and Their Applications in Cryptographyent://SD_ILS/0/SD_ILS:20845702024-05-31T22:00:57Z2024-05-31T22:00:57Zby Wu, Chuan-Kun. author.<br/><a href="https://doi.org/10.1007/978-3-662-48865-2">https://doi.org/10.1007/978-3-662-48865-2</a><br/>Format: Electronic Resources<br/>Understanding Social Engineering Based Scamsent://SD_ILS/0/SD_ILS:20847042024-05-31T22:00:57Z2024-05-31T22:00:57Zby Jakobsson, Markus. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format: Electronic Resources<br/>Physical-Layer Security for Cooperative Relay Networksent://SD_ILS/0/SD_ILS:20847092024-05-31T22:00:57Z2024-05-31T22:00:57Zby Zou, Yulong. author.<br/><a href="https://doi.org/10.1007/978-3-319-31174-6">https://doi.org/10.1007/978-3-319-31174-6</a><br/>Format: Electronic Resources<br/>Fundamentals of Network Forensics A Research Perspectiveent://SD_ILS/0/SD_ILS:20848672024-05-31T22:00:57Z2024-05-31T22:00:57Zby Joshi, R.C. author.<br/><a href="https://doi.org/10.1007/978-1-4471-7299-4">https://doi.org/10.1007/978-1-4471-7299-4</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847162024-05-31T22:00:57Z2024-05-31T22:00:57Zby Aspinall, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849982024-05-31T22:00:57Z2024-05-31T22:00:57Zby Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30222-5">https://doi.org/10.1007/978-3-319-30222-5</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854062024-05-31T22:00:57Z2024-05-31T22:00:57Zby Lambrinoudakis, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857282024-05-31T22:00:57Z2024-05-31T22:00:57Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857292024-05-31T22:00:57Z2024-05-31T22:00:57Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Ten Laws for Securityent://SD_ILS/0/SD_ILS:20845272024-05-31T22:00:57Z2024-05-31T22:00:57Zby Diehl, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format: Electronic Resources<br/>Trends and Applications in Software Engineering Proceedings of the 4th International Conference on Software Process Improvement CIMPS'2015ent://SD_ILS/0/SD_ILS:20846472024-05-31T22:00:57Z2024-05-31T22:00:57Zby Mejia, Jezreel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-26285-7">https://doi.org/10.1007/978-3-319-26285-7</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Aggregation Techniques for Smart Grid Communicationsent://SD_ILS/0/SD_ILS:20847852024-05-31T22:00:57Z2024-05-31T22:00:57Zby Lu, Rongxing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32899-7">https://doi.org/10.1007/978-3-319-32899-7</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852562024-05-31T22:00:57Z2024-05-31T22:00:57Zby Gierlichs, Benedikt. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53140-2">https://doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Advances in Visual Computing 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20852582024-05-31T22:00:57Z2024-05-31T22:00:57Zby Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50835-1">https://doi.org/10.1007/978-3-319-50835-1</a><br/>Format: Electronic Resources<br/>Computer Networks 23rd International Conference, CN 2016, Brunów, Poland, June 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848152024-05-31T22:00:57Z2024-05-31T22:00:57Zby Gaj, Piotr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39207-3">https://doi.org/10.1007/978-3-319-39207-3</a><br/>Format: Electronic Resources<br/>Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprisesent://SD_ILS/0/SD_ILS:20845762024-05-31T22:00:57Z2024-05-31T22:00:57Zby Pierer, Markus. author.<br/><a href="https://doi.org/10.1007/978-3-658-15046-4">https://doi.org/10.1007/978-3-658-15046-4</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850972024-05-31T22:00:57Z2024-05-31T22:00:57Zby Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking Second International Conference, MSPN 2016, Paris, France, June 1-3, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20851002024-05-31T22:00:57Z2024-05-31T22:00:57Zby Boumerdassi, Selma. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50463-6">https://doi.org/10.1007/978-3-319-50463-6</a><br/>Format: Electronic Resources<br/>Wireless Sensor Networks Security, Coverage, and Localizationent://SD_ILS/0/SD_ILS:20844362024-05-31T22:00:57Z2024-05-31T22:00:57Zby Selmic, Rastko R. author.<br/><a href="https://doi.org/10.1007/978-3-319-46769-6">https://doi.org/10.1007/978-3-319-46769-6</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20860632024-05-31T22:00:57Z2024-05-31T22:00:57Zby Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856752024-05-31T22:00:57Z2024-05-31T22:00:57Zby Li, Wenfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45940-0">https://doi.org/10.1007/978-3-319-45940-0</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857902024-05-31T22:00:57Z2024-05-31T22:00:57Zby Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29485-8">https://doi.org/10.1007/978-3-319-29485-8</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860062024-05-31T22:00:57Z2024-05-31T22:00:57Zby Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857092024-05-31T22:00:57Z2024-05-31T22:00:57Zby Pointcheval, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857132024-05-31T22:00:57Z2024-05-31T22:00:57Zby Standaert, François-Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43283-0">https://doi.org/10.1007/978-3-319-43283-0</a><br/>Format: Electronic Resources<br/>Information Technology: New Generations 13th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:20868842024-05-31T22:00:57Z2024-05-31T22:00:57Zby Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32467-8">https://doi.org/10.1007/978-3-319-32467-8</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857222024-05-31T22:00:57Z2024-05-31T22:00:57Zby Mitton, Nathalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40509-4">https://doi.org/10.1007/978-3-319-40509-4</a><br/>Format: Electronic Resources<br/>Industrial Espionage and Technical Surveillance Counter Measurersent://SD_ILS/0/SD_ILS:20877332024-05-31T22:00:57Z2024-05-31T22:00:57Zby Androulidakis, Iosif. author.<br/><a href="https://doi.org/10.1007/978-3-319-28666-2">https://doi.org/10.1007/978-3-319-28666-2</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20–22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859532024-05-31T22:00:57Z2024-05-31T22:00:57Zby Kim, Ho-won. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31875-2">https://doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861862024-05-31T22:00:57Z2024-05-31T22:00:57Zby Clark, Jeremy. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20855262024-05-31T22:00:57Z2024-05-31T22:00:57Zby Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2016 Conferences Confederated International Conferences: CoopIS, C&TC, and ODBASE 2016, Rhodes, Greece, October 24-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856662024-05-31T22:00:57Z2024-05-31T22:00:57Zby Debruyne, Christophe. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48472-3">https://doi.org/10.1007/978-3-319-48472-3</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846192024-05-31T22:00:57Z2024-05-31T22:00:57Zby Batten, Lynn. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2741-3">https://doi.org/10.1007/978-981-10-2741-3</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846202024-05-31T22:00:57Z2024-05-31T22:00:57Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format: Electronic Resources<br/>VoIP and PBX Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:20863812024-05-31T22:00:57Z2024-05-31T22:00:57Zby Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29721-7">https://doi.org/10.1007/978-3-319-29721-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20858002024-05-31T22:00:57Z2024-05-31T22:00:57Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20858012024-05-31T22:00:57Z2024-05-31T22:00:57Zby Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49096-9">https://doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860172024-05-31T22:00:57Z2024-05-31T22:00:57Zby Nascimento, Anderson C.A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49175-2">https://doi.org/10.1007/978-3-319-49175-2</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858052024-05-31T22:00:57Z2024-05-31T22:00:57Zby Skavhaug, Amund. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 13th International Conference, ICIAR 2016, in Memory of Mohamed Kamel, Póvoa de Varzim, Portugal, July 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858062024-05-31T22:00:57Z2024-05-31T22:00:57Zby Campilho, Aurélio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41501-7">https://doi.org/10.1007/978-3-319-41501-7</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860952024-05-31T22:00:57Z2024-05-31T22:00:57Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860962024-05-31T22:00:57Z2024-05-31T22:00:57Zby Berendt, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31456-3">https://doi.org/10.1007/978-3-319-31456-3</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXVIII Special Issue on Cyberworlds and Cybersecurityent://SD_ILS/0/SD_ILS:20860982024-05-31T22:00:57Z2024-05-31T22:00:57Zby Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53090-0">https://doi.org/10.1007/978-3-662-53090-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860992024-05-31T22:00:57Z2024-05-31T22:00:57Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII Selected Papers from FDSE 2014ent://SD_ILS/0/SD_ILS:20858102024-05-31T22:00:57Z2024-05-31T22:00:57Zby Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49175-1">https://doi.org/10.1007/978-3-662-49175-1</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858122024-05-31T22:00:57Z2024-05-31T22:00:57Zby Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 2ent://SD_ILS/0/SD_ILS:20874412024-05-31T22:00:57Z2024-05-31T22:00:57Zby Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0755-2">https://doi.org/10.1007/978-981-10-0755-2</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 1ent://SD_ILS/0/SD_ILS:20874432024-05-31T22:00:57Z2024-05-31T22:00:57Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-81-322-2650-5">https://doi.org/10.1007/978-81-322-2650-5</a><br/>Format: Electronic Resources<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USAent://SD_ILS/0/SD_ILS:20872452024-05-31T22:00:57Z2024-05-31T22:00:57Zby Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41932-9">https://doi.org/10.1007/978-3-319-41932-9</a><br/>Format: Electronic Resources<br/>Recent Advances in Systems Safety and Securityent://SD_ILS/0/SD_ILS:20877052024-05-31T22:00:57Z2024-05-31T22:00:57Zby Pricop, Emil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32525-5">https://doi.org/10.1007/978-3-319-32525-5</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859282024-05-31T22:00:57Z2024-05-31T22:00:57Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859372024-05-31T22:00:57Z2024-05-31T22:00:57Zby Pasalic, Enes. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29172-7">https://doi.org/10.1007/978-3-319-29172-7</a><br/>Format: Electronic Resources<br/>Autonomous Agents and Multiagent Systems AAMAS 2016 Workshops, Visionary Papers, Singapore, Singapore, May 9-10, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20858272024-05-31T22:00:57Z2024-05-31T22:00:57Zby Osman, Nardine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46840-2">https://doi.org/10.1007/978-3-319-46840-2</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857322024-05-31T22:00:57Z2024-05-31T22:00:57Zby Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20859622024-05-31T22:00:57Z2024-05-31T22:00:57Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20857452024-05-31T22:00:57Z2024-05-31T22:00:57Zby Karagiannis, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30505-9">https://doi.org/10.1007/978-3-319-30505-9</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857472024-05-31T22:00:57Z2024-05-31T22:00:57Zby Homma, Naofumi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31271-2">https://doi.org/10.1007/978-3-319-31271-2</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:20860622024-05-31T22:00:57Z2024-05-31T22:00:57Zby Bécue, Adrien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format: Electronic Resources<br/>Graphical Models for Security Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20856802024-05-31T22:00:57Z2024-05-31T22:00:57Zby Kordy, Barbara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46263-9">https://doi.org/10.1007/978-3-319-46263-9</a><br/>Format: Electronic Resources<br/>Information Science and Applications (ICISA) 2016ent://SD_ILS/0/SD_ILS:20876082024-05-31T22:00:57Z2024-05-31T22:00:57Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0557-2">https://doi.org/10.1007/978-981-10-0557-2</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20856852024-05-31T22:00:57Z2024-05-31T22:00:57Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861262024-05-31T22:00:57Z2024-05-31T22:00:57Zby Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Watermarking Securityent://SD_ILS/0/SD_ILS:20870952024-05-31T22:00:57Z2024-05-31T22:00:57Zby Bas, Patrick. author.<br/><a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format: Electronic Resources<br/>Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20854172024-05-31T22:00:57Z2024-05-31T22:00:57Zby Bishop, Matt. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45871-7">https://doi.org/10.1007/978-3-319-45871-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855852024-05-31T22:00:57Z2024-05-31T22:00:57Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861442024-05-31T22:00:57Z2024-05-31T22:00:57Zby Bao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49151-6">https://doi.org/10.1007/978-3-319-49151-6</a><br/>Format: Electronic Resources<br/>Current Trends in Web Engineering ICWE 2016 International Workshops, DUI, TELERISE, SoWeMine, and Liquid Web, Lugano, Switzerland, June 6-9, 2016. Revised Selected Papersent://SD_ILS/0/SD_ILS:20861472024-05-31T22:00:57Z2024-05-31T22:00:57Zby Casteleyn, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46963-8">https://doi.org/10.1007/978-3-319-46963-8</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861512024-05-31T22:00:57Z2024-05-31T22:00:57Zby Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45381-1">https://doi.org/10.1007/978-3-319-45381-1</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861532024-05-31T22:00:57Z2024-05-31T22:00:57Zby Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthdayent://SD_ILS/0/SD_ILS:20861542024-05-31T22:00:57Z2024-05-31T22:00:57Zby Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861582024-05-31T22:00:57Z2024-05-31T22:00:57Zby Kwon, Soonhak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30840-1">https://doi.org/10.1007/978-3-319-30840-1</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:20858582024-05-31T22:00:57Z2024-05-31T22:00:57Zby Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20856592024-05-31T22:00:57Z2024-05-31T22:00:57Zby Ranise, Silvio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41483-6">https://doi.org/10.1007/978-3-319-41483-6</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859802024-05-31T22:00:57Z2024-05-31T22:00:57Zby Katsikas, Sokratis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44341-6">https://doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857782024-05-31T22:00:57Z2024-05-31T22:00:57Zby Güneysu, Tim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29078-2">https://doi.org/10.1007/978-3-319-29078-2</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860662024-05-31T22:00:57Z2024-05-31T22:00:57Zby Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860702024-05-31T22:00:57Z2024-05-31T22:00:57Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format: Electronic Resources<br/>Advances in Neural Networks – ISNN 2016 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857032024-05-31T22:00:57Z2024-05-31T22:00:57Zby Cheng, Long. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40663-3">https://doi.org/10.1007/978-3-319-40663-3</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857042024-05-31T22:00:57Z2024-05-31T22:00:57Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Physical and Data-Link Security Techniques for Future Communication Systemsent://SD_ILS/0/SD_ILS:20873752024-05-31T22:00:57Z2024-05-31T22:00:57Zby Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-23609-4">https://doi.org/10.1007/978-3-319-23609-4</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852152024-05-31T22:00:57Z2024-05-31T22:00:57Zby Panayiotou, Christos G. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31664-2">https://doi.org/10.1007/978-3-319-31664-2</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850152024-05-31T22:00:57Z2024-05-31T22:00:57Zby Caballero, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850162024-05-31T22:00:57Z2024-05-31T22:00:57Zby Peyrin, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-52993-5">https://doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854652024-05-31T22:00:57Z2024-05-31T22:00:57Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45931-8">https://doi.org/10.1007/978-3-319-45931-8</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856052024-05-31T22:00:57Z2024-05-31T22:00:57Zby Galinina, Olga. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46301-8">https://doi.org/10.1007/978-3-319-46301-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857352024-05-31T22:00:57Z2024-05-31T22:00:57Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20857362024-05-31T22:00:57Z2024-05-31T22:00:57Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20857372024-05-31T22:00:57Z2024-05-31T22:00:57Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXVI Special Issue on Cyberworlds and Cybersecurityent://SD_ILS/0/SD_ILS:20857382024-05-31T22:00:57Z2024-05-31T22:00:57Zby Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49247-5">https://doi.org/10.1007/978-3-662-49247-5</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2–8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857442024-05-31T22:00:57Z2024-05-31T22:00:57Zby Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12–14, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859722024-05-31T22:00:57Z2024-05-31T22:00:57Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31301-6">https://doi.org/10.1007/978-3-319-31301-6</a><br/>Format: Electronic Resources<br/>Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859862024-05-31T22:00:57Z2024-05-31T22:00:57Zby Badonnel, Rémi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39814-3">https://doi.org/10.1007/978-3-319-39814-3</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856762024-05-31T22:00:57Z2024-05-31T22:00:57Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856772024-05-31T22:00:57Z2024-05-31T22:00:57Zby Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49099-0">https://doi.org/10.1007/978-3-662-49099-0</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860872024-05-31T22:00:57Z2024-05-31T22:00:57Zby Livraga, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857262024-05-31T22:00:57Z2024-05-31T22:00:57Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format: Electronic Resources<br/>Mobile and Wireless Technologies 2016ent://SD_ILS/0/SD_ILS:20878932024-05-31T22:00:57Z2024-05-31T22:00:57Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1409-3">https://doi.org/10.1007/978-981-10-1409-3</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852302024-05-31T22:00:57Z2024-05-31T22:00:57Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN & PDCAT 2015ent://SD_ILS/0/SD_ILS:20849492024-05-31T22:00:57Z2024-05-31T22:00:57Zby Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-0068-3">https://doi.org/10.1007/978-981-10-0068-3</a><br/>Format: Electronic Resources<br/>Subjective Logic A Formalism for Reasoning Under Uncertaintyent://SD_ILS/0/SD_ILS:20849502024-05-31T22:00:57Z2024-05-31T22:00:57Zby Jøsang, Audun. author.<br/><a href="https://doi.org/10.1007/978-3-319-42337-1">https://doi.org/10.1007/978-3-319-42337-1</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846852024-05-31T22:00:57Z2024-05-31T22:00:57Zby Mueller, Peter. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2738-3">https://doi.org/10.1007/978-981-10-2738-3</a><br/>Format: Electronic Resources<br/>Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852342024-05-31T22:00:57Z2024-05-31T22:00:57Zby Lecomte, Thierry. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33951-1">https://doi.org/10.1007/978-3-319-33951-1</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852352024-05-31T22:00:57Z2024-05-31T22:00:57Zby Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38898-4">https://doi.org/10.1007/978-3-319-38898-4</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852382024-05-31T22:00:57Z2024-05-31T22:00:57Zby Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860592024-05-31T22:00:57Z2024-05-31T22:00:57Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858872024-05-31T22:00:57Z2024-05-31T22:00:57Zby Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20862092024-05-31T22:00:57Z2024-05-31T22:00:57Zby Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44403-1">https://doi.org/10.1007/978-3-319-44403-1</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20860792024-05-31T22:00:57Z2024-05-31T22:00:57Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858022024-05-31T22:00:57Z2024-05-31T22:00:57Zby Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859212024-05-31T22:00:57Z2024-05-31T22:00:57Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30303-1">https://doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>Secure System Design and Trustable Computingent://SD_ILS/0/SD_ILS:20875142024-05-31T22:00:57Z2024-05-31T22:00:57Zby Chang, Chip-Hong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-14971-4">https://doi.org/10.1007/978-3-319-14971-4</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 2ent://SD_ILS/0/SD_ILS:20883582024-05-31T22:00:57Z2024-05-31T22:00:57Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-81-322-2653-6">https://doi.org/10.1007/978-81-322-2653-6</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852182024-05-31T22:00:57Z2024-05-31T22:00:57Zby Bjørner, Nikolaj. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28034-9">https://doi.org/10.1007/978-3-319-28034-9</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852192024-05-31T22:00:57Z2024-05-31T22:00:57Zby Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31863-9">https://doi.org/10.1007/978-3-319-31863-9</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:20852222024-05-31T22:00:57Z2024-05-31T22:00:57Zby Ganty, Pierre. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28766-9">https://doi.org/10.1007/978-3-319-28766-9</a><br/>Format: Electronic Resources<br/>Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852242024-05-31T22:00:57Z2024-05-31T22:00:57Zby Mauw, Sjouke. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29968-6">https://doi.org/10.1007/978-3-319-29968-6</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852252024-05-31T22:00:57Z2024-05-31T22:00:57Zby Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format: Electronic Resources<br/>Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1ent://SD_ILS/0/SD_ILS:20883622024-05-31T22:00:57Z2024-05-31T22:00:57Zby Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0767-5">https://doi.org/10.1007/978-981-10-0767-5</a><br/>Format: Electronic Resources<br/>