Search Results for - Narrowed by: Computers and Society. - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computers$002band$002bSociety.$002509Computers$002band$002bSociety.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-06-08T07:33:54ZAdvances in Digital Forensics XIV 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842382024-06-08T07:33:54Z2024-06-08T07:33:54Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99277-8">https://doi.org/10.1007/978-3-319-99277-8</a><br/>Format: Electronic Resources<br/>Smart Grid and Innovative Frontiers in Telecommunications Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20849302024-06-08T07:33:54Z2024-06-08T07:33:54Zby Chong, Peter Han Joo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94965-9">https://doi.org/10.1007/978-3-319-94965-9</a><br/>Format: Electronic Resources<br/>Modeling Decisions for Artificial Intelligence 15th International Conference, MDAI 2018, Mallorca, Spain, October 15–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20850592024-06-08T07:33:54Z2024-06-08T07:33:54Zby Torra, Vicenç. editor. (orcid)0000-0002-0368-8037<br/><a href="https://doi.org/10.1007/978-3-030-00202-2">https://doi.org/10.1007/978-3-030-00202-2</a><br/>Format: Electronic Resources<br/>Handbook of Mobile Data Privacyent://SD_ILS/0/SD_ILS:20843032024-06-08T07:33:54Z2024-06-08T07:33:54Zby Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858542024-06-08T07:33:54Z2024-06-08T07:33:54Zby Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855762024-06-08T07:33:54Z2024-06-08T07:33:54Zby Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854992024-06-08T07:33:54Z2024-06-08T07:33:54Zby Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852992024-06-08T07:33:54Z2024-06-08T07:33:54Zby Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format: Electronic Resources<br/>Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20856232024-06-08T07:33:54Z2024-06-08T07:33:54Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2018, Valencia, Spain, September 26–28, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853522024-06-08T07:33:54Z2024-06-08T07:33:54Zby Domingo-Ferrer, Josep. editor. (orcid)0000-0001-7213-4962<br/><a href="https://doi.org/10.1007/978-3-319-99771-1">https://doi.org/10.1007/978-3-319-99771-1</a><br/>Format: Electronic Resources<br/>Cybersecurity in Germanyent://SD_ILS/0/SD_ILS:20841362024-06-08T07:33:54Z2024-06-08T07:33:54Zby Schallbruch, Martin. author.<br/><a href="https://doi.org/10.1007/978-3-319-90014-8">https://doi.org/10.1007/978-3-319-90014-8</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847972024-06-08T07:33:54Z2024-06-08T07:33:54Zby Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854642024-06-08T07:33:54Z2024-06-08T07:33:54Zby D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852132024-06-08T07:33:54Z2024-06-08T07:33:54Zby Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855232024-06-08T07:33:54Z2024-06-08T07:33:54Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26–27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858482024-06-08T07:33:54Z2024-06-08T07:33:54Zby Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format: Electronic Resources<br/>Symbiotic Interaction 6th International Workshop, Symbiotic 2017, Eindhoven, The Netherlands, December 18–19, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857602024-06-08T07:33:54Z2024-06-08T07:33:54Zby Ham, Jaap. editor. (orcid)0000-0003-1703-5165<br/><a href="https://doi.org/10.1007/978-3-319-91593-7">https://doi.org/10.1007/978-3-319-91593-7</a><br/>Format: Electronic Resources<br/>Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852122024-06-08T07:33:54Z2024-06-08T07:33:54Zby Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format: Electronic Resources<br/>Human Interface and the Management of Information. Information in Applications and Services 20th International Conference, HIMI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852892024-06-08T07:33:54Z2024-06-08T07:33:54Zby Yamamoto, Sakae. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92046-7">https://doi.org/10.1007/978-3-319-92046-7</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852982024-06-08T07:33:54Z2024-06-08T07:33:54Zby Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/><a href="https://doi.org/10.1007/978-3-030-00305-0">https://doi.org/10.1007/978-3-030-00305-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20856302024-06-08T07:33:54Z2024-06-08T07:33:54Zby Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Blockchain – ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860942024-06-08T07:33:54Z2024-06-08T07:33:54Zby Chen, Shiping. editor. (orcid)0000-0002-4603-0024<br/><a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format: Electronic Resources<br/>Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860192024-06-08T07:33:54Z2024-06-08T07:33:54Zby Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855382024-06-08T07:33:54Z2024-06-08T07:33:54Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthdayent://SD_ILS/0/SD_ILS:20853642024-06-08T07:33:54Z2024-06-08T07:33:54Zby Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format: Electronic Resources<br/>Mobile Networks and Management 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845422024-06-08T07:33:54Z2024-06-08T07:33:54Zby Hu, Jiankun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90775-8">https://doi.org/10.1007/978-3-319-90775-8</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842652024-06-08T07:33:54Z2024-06-08T07:33:54Zby Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852532024-06-08T07:33:54Z2024-06-08T07:33:54Zby Dinur, Itai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851712024-06-08T07:33:54Z2024-06-08T07:33:54Zby Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20851862024-06-08T07:33:54Z2024-06-08T07:33:54Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860402024-06-08T07:33:54Z2024-06-08T07:33:54Zby Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851982024-06-08T07:33:54Z2024-06-08T07:33:54Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Internet Science 5th International Conference, INSCI 2018, St. Petersburg, Russia, October 24–26, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855202024-06-08T07:33:54Z2024-06-08T07:33:54Zby Bodrunova, Svetlana S. editor. (orcid)0000-0003-0740-561X<br/><a href="https://doi.org/10.1007/978-3-030-01437-7">https://doi.org/10.1007/978-3-030-01437-7</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20847202024-06-08T07:33:54Z2024-06-08T07:33:54Zby Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844012024-06-08T07:33:54Z2024-06-08T07:33:54Zby Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846572024-06-08T07:33:54Z2024-06-08T07:33:54Zby Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Electronic Resources<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20848132024-06-08T07:33:54Z2024-06-08T07:33:54Zby Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 15th International Conference, ICIAR 2018, Póvoa de Varzim, Portugal, June 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858832024-06-08T07:33:54Z2024-06-08T07:33:54Zby Campilho, Aurélio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93000-8">https://doi.org/10.1007/978-3-319-93000-8</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858932024-06-08T07:33:54Z2024-06-08T07:33:54Zby Giuffrida, Cristiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format: Electronic Resources<br/>Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859042024-06-08T07:33:54Z2024-06-08T07:33:54Zby Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20861932024-06-08T07:33:54Z2024-06-08T07:33:54Zby Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format: Electronic Resources<br/>Computational Data and Social Networks 7th International Conference, CSoNet 2018, Shanghai, China, December 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854242024-06-08T07:33:54Z2024-06-08T07:33:54Zby Chen, Xuemin. editor. (orcid)0000-0003-3820-9195<br/><a href="https://doi.org/10.1007/978-3-030-04648-4">https://doi.org/10.1007/978-3-030-04648-4</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-06-08T07:33:54Z2024-06-08T07:33:54Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848392024-06-08T07:33:54Z2024-06-08T07:33:54Zby Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-06-08T07:33:54Z2024-06-08T07:33:54Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854392024-06-08T07:33:54Z2024-06-08T07:33:54Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20850852024-06-08T07:33:54Z2024-06-08T07:33:54Zby Brumley, Billy Bob. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2–8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857442024-06-08T07:33:54Z2024-06-08T07:33:54Zby Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856762024-06-08T07:33:54Z2024-06-08T07:33:54Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852152024-06-08T07:33:54Z2024-06-08T07:33:54Zby Panayiotou, Christos G. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31664-2">https://doi.org/10.1007/978-3-319-31664-2</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:20860622024-06-08T07:33:54Z2024-06-08T07:33:54Zby Bécue, Adrien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20860632024-06-08T07:33:54Z2024-06-08T07:33:54Zby Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861862024-06-08T07:33:54Z2024-06-08T07:33:54Zby Clark, Jeremy. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20856592024-06-08T07:33:54Z2024-06-08T07:33:54Zby Ranise, Silvio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41483-6">https://doi.org/10.1007/978-3-319-41483-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20856852024-06-08T07:33:54Z2024-06-08T07:33:54Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852252024-06-08T07:33:54Z2024-06-08T07:33:54Zby Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861512024-06-08T07:33:54Z2024-06-08T07:33:54Zby Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45381-1">https://doi.org/10.1007/978-3-319-45381-1</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848772024-06-08T07:33:54Z2024-06-08T07:33:54Zby Doss, Robin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48021-3">https://doi.org/10.1007/978-3-319-48021-3</a><br/>Format: Electronic Resources<br/>Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847772024-06-08T07:33:54Z2024-06-08T07:33:54Zby Haltinner, Kristin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852302024-06-08T07:33:54Z2024-06-08T07:33:54Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859282024-06-08T07:33:54Z2024-06-08T07:33:54Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860962024-06-08T07:33:54Z2024-06-08T07:33:54Zby Berendt, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31456-3">https://doi.org/10.1007/978-3-319-31456-3</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848752024-06-08T07:33:54Z2024-06-08T07:33:54Zby Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33630-5">https://doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Information Literacy: Key to an Inclusive Society 4th European Conference, ECIL 2016, Prague, Czech Republic, October 10-13, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842072024-06-08T07:33:54Z2024-06-08T07:33:54Zby Kurbanoğlu, Serap. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52162-6">https://doi.org/10.1007/978-3-319-52162-6</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846202024-06-08T07:33:54Z2024-06-08T07:33:54Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852382024-06-08T07:33:54Z2024-06-08T07:33:54Zby Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Technology and Intimacy: Choice or Coercion 12th IFIP TC 9 International Conference on Human Choice and Computers, HCC12 2016, Salford, UK, September 7-9, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20845052024-06-08T07:33:54Z2024-06-08T07:33:54Zby Kreps, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44805-3">https://doi.org/10.1007/978-3-319-44805-3</a><br/>Format: Electronic Resources<br/>Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854302024-06-08T07:33:54Z2024-06-08T07:33:54Zby Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857292024-06-08T07:33:54Z2024-06-08T07:33:54Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:20858582024-06-08T07:33:54Z2024-06-08T07:33:54Zby Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20855262024-06-08T07:33:54Z2024-06-08T07:33:54Zby Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850042024-06-08T07:33:54Z2024-06-08T07:33:54Zby Habib, Sheikh Mahbub. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41354-9">https://doi.org/10.1007/978-3-319-41354-9</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850972024-06-08T07:33:54Z2024-06-08T07:33:54Zby Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20855572024-06-08T07:33:54Z2024-06-08T07:33:54Zby Schiffner, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44760-5">https://doi.org/10.1007/978-3-319-44760-5</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847162024-06-08T07:33:54Z2024-06-08T07:33:54Zby Aspinall, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852192024-06-08T07:33:54Z2024-06-08T07:33:54Zby Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31863-9">https://doi.org/10.1007/978-3-319-31863-9</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858122024-06-08T07:33:54Z2024-06-08T07:33:54Zby Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861262024-06-08T07:33:54Z2024-06-08T07:33:54Zby Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20854172024-06-08T07:33:54Z2024-06-08T07:33:54Zby Bishop, Matt. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45871-7">https://doi.org/10.1007/978-3-319-45871-7</a><br/>Format: Electronic Resources<br/>