Search Results for - Narrowed by: Computers and Society. - Data Encryption.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computers$002band$002bSociety.$002509Computers$002band$002bSociety.$0026qf$003dSUBJECT$002509Subject$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300$0026isd$003dtrue?2024-06-17T14:32:04ZTransactions on Data Hiding and Multimedia Security IIIent://SD_ILS/0/SD_ILS:5026992024-06-17T14:32:04Z2024-06-17T14:32:04Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format: Electronic Resources<br/>Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027502024-06-17T14:32:04Z2024-06-17T14:32:04Zby Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027562024-06-17T14:32:04Z2024-06-17T14:32:04Zby Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5036102024-06-17T14:32:04Z2024-06-17T14:32:04Zby Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5035332024-06-17T14:32:04Z2024-06-17T14:32:04Zby Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038212024-06-17T14:32:04Z2024-06-17T14:32:04Zby Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033722024-06-17T14:32:04Z2024-06-17T14:32:04Zby Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036842024-06-17T14:32:04Z2024-06-17T14:32:04Zby Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036002024-06-17T14:32:04Z2024-06-17T14:32:04Zby Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027322024-06-17T14:32:04Z2024-06-17T14:32:04Zby Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69304-8">http://dx.doi.org/10.1007/978-3-540-69304-8</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5028032024-06-17T14:32:04Z2024-06-17T14:32:04Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036642024-06-17T14:32:04Z2024-06-17T14:32:04Zby Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format: Electronic Resources<br/>Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035862024-06-17T14:32:04Z2024-06-17T14:32:04Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5037892024-06-17T14:32:04Z2024-06-17T14:32:04Zby Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036492024-06-17T14:32:04Z2024-06-17T14:32:04Zby Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036602024-06-17T14:32:04Z2024-06-17T14:32:04Zby Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037492024-06-17T14:32:04Z2024-06-17T14:32:04Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5034812024-06-17T14:32:04Z2024-06-17T14:32:04Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5037932024-06-17T14:32:04Z2024-06-17T14:32:04Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028272024-06-17T14:32:04Z2024-06-17T14:32:04Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026912024-06-17T14:32:04Z2024-06-17T14:32:04Zby Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035632024-06-17T14:32:04Z2024-06-17T14:32:04Zby Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>RFID Security and Privacy Concepts, Protocols, and Architecturesent://SD_ILS/0/SD_ILS:5034782024-06-17T14:32:04Z2024-06-17T14:32:04Zby Henrici, Dirk. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79076-1">http://dx.doi.org/10.1007/978-3-540-79076-1</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033872024-06-17T14:32:04Z2024-06-17T14:32:04Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124402024-06-17T14:32:04Z2024-06-17T14:32:04Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>Emerging Directions in Embedded and Ubiquitous Computing EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130092024-06-17T14:32:04Z2024-06-17T14:32:04Zby Denko, Mieso K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77090-9">http://dx.doi.org/10.1007/978-3-540-77090-9</a><br/>Format: Electronic Resources<br/>Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130172024-06-17T14:32:04Z2024-06-17T14:32:04Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123812024-06-17T14:32:04Z2024-06-17T14:32:04Zby Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format: Electronic Resources<br/>Decrypted Secrets Methods and Maxims of Cryptologyent://SD_ILS/0/SD_ILS:5118682024-06-17T14:32:04Z2024-06-17T14:32:04Zby Bauer, Friedrich L. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format: Electronic Resources<br/>Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papersent://SD_ILS/0/SD_ILS:5127562024-06-17T14:32:04Z2024-06-17T14:32:04Zby Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127612024-06-17T14:32:04Z2024-06-17T14:32:04Zby Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127772024-06-17T14:32:04Z2024-06-17T14:32:04Zby Kruegel, Christopher. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">http://dx.doi.org/10.1007/978-3-540-74320-0</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125292024-06-17T14:32:04Z2024-06-17T14:32:04Zby Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126602024-06-17T14:32:04Z2024-06-17T14:32:04Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129912024-06-17T14:32:04Z2024-06-17T14:32:04Zby Bao, Feng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papersent://SD_ILS/0/SD_ILS:5130332024-06-17T14:32:04Z2024-06-17T14:32:04Zby Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format: Electronic Resources<br/>E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130402024-06-17T14:32:04Z2024-06-17T14:32:04Zby Alkassar, Ammar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5128882024-06-17T14:32:04Z2024-06-17T14:32:04Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format: Electronic Resources<br/>Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130042024-06-17T14:32:04Z2024-06-17T14:32:04Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papersent://SD_ILS/0/SD_ILS:5129222024-06-17T14:32:04Z2024-06-17T14:32:04Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format: Electronic Resources<br/>Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130352024-06-17T14:32:04Z2024-06-17T14:32:04Zby Furon, Teddy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127842024-06-17T14:32:04Z2024-06-17T14:32:04Zby Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IIent://SD_ILS/0/SD_ILS:5125942024-06-17T14:32:04Z2024-06-17T14:32:04Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5127032024-06-17T14:32:04Z2024-06-17T14:32:04Zby Hämmerli, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128462024-06-17T14:32:04Z2024-06-17T14:32:04Zby Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format: Electronic Resources<br/>Ethical and Social Issues in the Information Ageent://SD_ILS/0/SD_ILS:5086252024-06-17T14:32:04Z2024-06-17T14:32:04Zby Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-659-9">http://dx.doi.org/10.1007/978-1-84628-659-9</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124602024-06-17T14:32:04Z2024-06-17T14:32:04Zby Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Electronic Resources<br/>Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130072024-06-17T14:32:04Z2024-06-17T14:32:04Zby McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5122482024-06-17T14:32:04Z2024-06-17T14:32:04Zby Vadhan, Salil P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5107202024-06-17T14:32:04Z2024-06-17T14:32:04Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/11679219">http://dx.doi.org/10.1007/11679219</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5112082024-06-17T14:32:04Z2024-06-17T14:32:04Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11767831">http://dx.doi.org/10.1007/11767831</a><br/>Format: Electronic Resources<br/>Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5116632024-06-17T14:32:04Z2024-06-17T14:32:04Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11861386">http://dx.doi.org/10.1007/11861386</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security Ient://SD_ILS/0/SD_ILS:5119372024-06-17T14:32:04Z2024-06-17T14:32:04Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/11926214">http://dx.doi.org/10.1007/11926214</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5113452024-06-17T14:32:04Z2024-06-17T14:32:04Zby Büschkes, Roland. editor.<br/><a href="http://dx.doi.org/10.1007/11790754">http://dx.doi.org/10.1007/11790754</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111992024-06-17T14:32:04Z2024-06-17T14:32:04Zby Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5121072024-06-17T14:32:04Z2024-06-17T14:32:04Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papersent://SD_ILS/0/SD_ILS:5121352024-06-17T14:32:04Z2024-06-17T14:32:04Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format: Electronic Resources<br/>Trust and Privacy in Digital Business Third International Conference, TrustBus 2006, Kraków, Poland, September 4-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115662024-06-17T14:32:04Z2024-06-17T14:32:04Zby Fischer-Hübner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/11824633">http://dx.doi.org/10.1007/11824633</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118522024-06-17T14:32:04Z2024-06-17T14:32:04Zby Yoshiura, Hiroshi. editor.<br/><a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116812024-06-17T14:32:04Z2024-06-17T14:32:04Zby Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2006 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114992024-06-17T14:32:04Z2024-06-17T14:32:04Zby Dwork, Cynthia. editor.<br/><a href="http://dx.doi.org/10.1007/11818175">http://dx.doi.org/10.1007/11818175</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119612024-06-17T14:32:04Z2024-06-17T14:32:04Zby Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119832024-06-17T14:32:04Z2024-06-17T14:32:04Zby Lipmaa, Helger. editor.<br/><a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format: Electronic Resources<br/>Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117712024-06-17T14:32:04Z2024-06-17T14:32:04Zby Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5117732024-06-17T14:32:04Z2024-06-17T14:32:04Zby Crescenzo, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format: Electronic Resources<br/>Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119672024-06-17T14:32:04Z2024-06-17T14:32:04Zby Ning, Peng. editor.<br/><a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115862024-06-17T14:32:04Z2024-06-17T14:32:04Zby Prisco, Roberto. editor.<br/><a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format: Electronic Resources<br/>Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5121252024-06-17T14:32:04Z2024-06-17T14:32:04Zby Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Electronic Resources<br/>Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5113422024-06-17T14:32:04Z2024-06-17T14:32:04Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/11787952">http://dx.doi.org/10.1007/11787952</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5112442024-06-17T14:32:04Z2024-06-17T14:32:04Zby Atzeni, Andrea S. editor.<br/><a href="http://dx.doi.org/10.1007/11774716">http://dx.doi.org/10.1007/11774716</a><br/>Format: Electronic Resources<br/>Emerging Directions in Embedded and Ubiquitous Computing EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114342024-06-17T14:32:04Z2024-06-17T14:32:04Zby Zhou, Xiaobo. editor.<br/><a href="http://dx.doi.org/10.1007/11807964">http://dx.doi.org/10.1007/11807964</a><br/>Format: Electronic Resources<br/>Emerging Trends in Information and Communication Security International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111822024-06-17T14:32:04Z2024-06-17T14:32:04Zby Müller, Günter. editor.<br/><a href="http://dx.doi.org/10.1007/11766155">http://dx.doi.org/10.1007/11766155</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5101792024-06-17T14:32:04Z2024-06-17T14:32:04Zby Valdes, Alfonso. editor.<br/><a href="http://dx.doi.org/10.1007/11663812">http://dx.doi.org/10.1007/11663812</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5109082024-06-17T14:32:04Z2024-06-17T14:32:04Zby Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/11733447">http://dx.doi.org/10.1007/11733447</a><br/>Format: Electronic Resources<br/>Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5110072024-06-17T14:32:04Z2024-06-17T14:32:04Zby Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5108252024-06-17T14:32:04Z2024-06-17T14:32:04Zby Chen, Kefei. editor.<br/><a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5107492024-06-17T14:32:04Z2024-06-17T14:32:04Zby Halevi, Shai. editor.<br/><a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 9th International Symposium, RAID 2006 Hamburg, Germany, September 20-22, 2006 Proceedingsent://SD_ILS/0/SD_ILS:5116522024-06-17T14:32:04Z2024-06-17T14:32:04Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/11856214">http://dx.doi.org/10.1007/11856214</a><br/>Format: Electronic Resources<br/>Digital Watermarking 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119152024-06-17T14:32:04Z2024-06-17T14:32:04Zby Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/11922841">http://dx.doi.org/10.1007/11922841</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5103312024-06-17T14:32:04Z2024-06-17T14:32:04Zby Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103492024-06-17T14:32:04Z2024-06-17T14:32:04Zby Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103512024-06-17T14:32:04Z2024-06-17T14:32:04Zby Vimercati, Sabrina de Capitani. editor.<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Electronic Resources<br/>Digital Watermarking Third International Workshop, IWDW 2004, Seoul, South Korea, October 30 - November 1, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5101892024-06-17T14:32:04Z2024-06-17T14:32:04Zby Cox, Ingemar J. editor.<br/><a href="http://dx.doi.org/10.1007/b106346">http://dx.doi.org/10.1007/b106346</a><br/>Format: Electronic Resources<br/>Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103022024-06-17T14:32:04Z2024-06-17T14:32:04Zby Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format: Electronic Resources<br/>Brute Force Cracking the Data Encryption Standardent://SD_ILS/0/SD_ILS:5046002024-06-17T14:32:04Z2024-06-17T14:32:04Zby Curtin, Matt. author.<br/><a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105722024-06-17T14:32:04Z2024-06-17T14:32:04Zby Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format: Electronic Resources<br/>Digital Watermarking 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104152024-06-17T14:32:04Z2024-06-17T14:32:04Zby Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11551492">http://dx.doi.org/10.1007/11551492</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 – 21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103482024-06-17T14:32:04Z2024-06-17T14:32:04Zby Dittmann, Jana. editor.<br/><a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101032024-06-17T14:32:04Z2024-06-17T14:32:04Zby Julisch, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/b137798">http://dx.doi.org/10.1007/b137798</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 – March 3, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5101322024-06-17T14:32:04Z2024-06-17T14:32:04Zby Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097532024-06-17T14:32:04Z2024-06-17T14:32:04Zby Kilian, Joe. editor.<br/><a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format: Electronic Resources<br/>Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097572024-06-17T14:32:04Z2024-06-17T14:32:04Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format: Electronic Resources<br/>Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104592024-06-17T14:32:04Z2024-06-17T14:32:04Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format: Electronic Resources<br/>Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106482024-06-17T14:32:04Z2024-06-17T14:32:04Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106502024-06-17T14:32:04Z2024-06-17T14:32:04Zby Feng, Dengguo. editor.<br/><a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format: Electronic Resources<br/>Information Hiding 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5096712024-06-17T14:32:04Z2024-06-17T14:32:04Zby Fridrich, Jessica. editor.<br/><a href="http://dx.doi.org/10.1007/b104759">http://dx.doi.org/10.1007/b104759</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5100632024-06-17T14:32:04Z2024-06-17T14:32:04Zby Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/11533733">http://dx.doi.org/10.1007/11533733</a><br/>Format: Electronic Resources<br/>Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5097702024-06-17T14:32:04Z2024-06-17T14:32:04Zby Blundo, Carlo. editor.<br/><a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format: Electronic Resources<br/>Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papersent://SD_ILS/0/SD_ILS:5102192024-06-17T14:32:04Z2024-06-17T14:32:04Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format: Electronic Resources<br/>Embedded and Ubiquitous Computing – EUC 2005 Workshops EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105702024-06-17T14:32:04Z2024-06-17T14:32:04Zby Enokido, Tomoya. editor.<br/><a href="http://dx.doi.org/10.1007/11596042">http://dx.doi.org/10.1007/11596042</a><br/>Format: Electronic Resources<br/>Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5099642024-06-17T14:32:04Z2024-06-17T14:32:04Zby Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11558859">http://dx.doi.org/10.1007/11558859</a><br/>Format: Electronic Resources<br/>Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101862024-06-17T14:32:04Z2024-06-17T14:32:04Zby Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format: Electronic Resources<br/>Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103642024-06-17T14:32:04Z2024-06-17T14:32:04Zby Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5102532024-06-17T14:32:04Z2024-06-17T14:32:04Zby Shoup, Victor. editor.<br/><a href="http://dx.doi.org/10.1007/11535218">http://dx.doi.org/10.1007/11535218</a><br/>Format: Electronic Resources<br/>