Search Results for - Narrowed by: Data protection. - Computer Communication Networks.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026ps$003d300?2024-06-03T18:37:42ZSecurity in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849922024-06-03T18:37:42Z2024-06-03T18:37:42Zby Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201<br/><a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853022024-06-03T18:37:42Z2024-06-03T18:37:42Zby Saracino, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845302024-06-03T18:37:42Z2024-06-03T18:37:42Zby Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74439-1">https://doi.org/10.1007/978-3-319-74439-1</a><br/>Format: Electronic Resources<br/>Versatile Cybersecurityent://SD_ILS/0/SD_ILS:20842922024-06-03T18:37:42Z2024-06-03T18:37:42Zby Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20844812024-06-03T18:37:42Z2024-06-03T18:37:42Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>Engineering Applications of Neural Networks 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842982024-06-03T18:37:42Z2024-06-03T18:37:42Zby Pimenidis, Elias. editor. (orcid)0000-0003-3593-8640<br/><a href="https://doi.org/10.1007/978-3-319-98204-5">https://doi.org/10.1007/978-3-319-98204-5</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI International Conference, ChinaCom 2016, Chongqing, China, September 24-26, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20848502024-06-03T18:37:42Z2024-06-03T18:37:42Zby Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66625-9">https://doi.org/10.1007/978-3-319-66625-9</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848802024-06-03T18:37:42Z2024-06-03T18:37:42Zby Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Cyber Threat Intelligenceent://SD_ILS/0/SD_ILS:20845032024-06-03T18:37:42Z2024-06-03T18:37:42Zby Dehghantanha, Ali. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845112024-06-03T18:37:42Z2024-06-03T18:37:42Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Future Internet Technologies and Trends First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847722024-06-03T18:37:42Z2024-06-03T18:37:42Zby Patel, Zuber. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73712-6">https://doi.org/10.1007/978-3-319-73712-6</a><br/>Format: Electronic Resources<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:20844732024-06-03T18:37:42Z2024-06-03T18:37:42Zby Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848582024-06-03T18:37:42Z2024-06-03T18:37:42Zby Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI international Conference, ChinaCom 2016 Chongqing, China, September 24-26, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20848512024-06-03T18:37:42Z2024-06-03T18:37:42Zby Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66628-0">https://doi.org/10.1007/978-3-319-66628-0</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848882024-06-03T18:37:42Z2024-06-03T18:37:42Zby Chen, Yuanfang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74176-5">https://doi.org/10.1007/978-3-319-74176-5</a><br/>Format: Electronic Resources<br/>Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11–12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848902024-06-03T18:37:42Z2024-06-03T18:37:42Zby M. F. Kebe, Cheikh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format: Electronic Resources<br/>Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854042024-06-03T18:37:42Z2024-06-03T18:37:42Zby Ganapathy, Vinod. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedingsent://SD_ILS/0/SD_ILS:20847182024-06-03T18:37:42Z2024-06-03T18:37:42Zby Belqasmi, Fatna. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67837-5">https://doi.org/10.1007/978-3-319-67837-5</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20847202024-06-03T18:37:42Z2024-06-03T18:37:42Zby Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Security Protocols XXVI 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20855322024-06-03T18:37:42Z2024-06-03T18:37:42Zby Matyáš, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03251-7">https://doi.org/10.1007/978-3-030-03251-7</a><br/>Format: Electronic Resources<br/>Innovations for Community Services 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846442024-06-03T18:37:42Z2024-06-03T18:37:42Zby Fahrnberger, Günter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49466-1">https://doi.org/10.1007/978-3-319-49466-1</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-06-03T18:37:42Z2024-06-03T18:37:42Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862024-06-03T18:37:42Z2024-06-03T18:37:42Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856982024-06-03T18:37:42Z2024-06-03T18:37:42Zby Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-06-03T18:37:42Z2024-06-03T18:37:42Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858882024-06-03T18:37:42Z2024-06-03T18:37:42Zby Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format: Electronic Resources<br/>Network-Based Information Systems 2nd International Conference, NBiS 2008, Turin, Italy, September 1-5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036452024-06-03T18:37:42Z2024-06-03T18:37:42Zby Takizawa, Makoto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85693-1">http://dx.doi.org/10.1007/978-3-540-85693-1</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036602024-06-03T18:37:42Z2024-06-03T18:37:42Zby Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036842024-06-03T18:37:42Z2024-06-03T18:37:42Zby Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format: Electronic Resources<br/>Intrusion Detection Systemsent://SD_ILS/0/SD_ILS:5019102024-06-03T18:37:42Z2024-06-03T18:37:42Zby Mancini, Luigi V. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papersent://SD_ILS/0/SD_ILS:5028312024-06-03T18:37:42Z2024-06-03T18:37:42Zby Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format: Electronic Resources<br/>Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027502024-06-03T18:37:42Z2024-06-03T18:37:42Zby Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format: Electronic Resources<br/>Vulnerability Analysis and Defense for the Internetent://SD_ILS/0/SD_ILS:5017872024-06-03T18:37:42Z2024-06-03T18:37:42Zby Singh, Abhishek. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 6th International Conference, WWIC 2008 Tampere, Finland, May 28-30, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026762024-06-03T18:37:42Z2024-06-03T18:37:42Zby Harju, Jarmo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68807-5">http://dx.doi.org/10.1007/978-3-540-68807-5</a><br/>Format: Electronic Resources<br/>Insider Attack and Cyber Security Beyond the Hackerent://SD_ILS/0/SD_ILS:5019132024-06-03T18:37:42Z2024-06-03T18:37:42Zby Stolfo, Salvatore J. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Handbook of Database Security Applications and Trendsent://SD_ILS/0/SD_ILS:5015832024-06-03T18:37:42Z2024-06-03T18:37:42Zby Gertz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format: Electronic Resources<br/>Cryptanalytic Attacks on RSAent://SD_ILS/0/SD_ILS:5015842024-06-03T18:37:42Z2024-06-03T18:37:42Zby Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Botnet Detection Countering the Largest Security Threatent://SD_ILS/0/SD_ILS:5016272024-06-03T18:37:42Z2024-06-03T18:37:42Zby Lee, Wenke. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:5016902024-06-03T18:37:42Z2024-06-03T18:37:42Zby Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Towards Sustainable Society on Ubiquitous Networks The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24–16, 2008, Tokyo, Japanent://SD_ILS/0/SD_ILS:5020032024-06-03T18:37:42Z2024-06-03T18:37:42Zby Oya, Makoto. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-85691-9">http://dx.doi.org/10.1007/978-0-387-85691-9</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5034102024-06-03T18:37:42Z2024-06-03T18:37:42Zby Barthe, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78663-4">http://dx.doi.org/10.1007/978-3-540-78663-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026912024-06-03T18:37:42Z2024-06-03T18:37:42Zby Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026942024-06-03T18:37:42Z2024-06-03T18:37:42Zby Lipp, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68979-9">http://dx.doi.org/10.1007/978-3-540-68979-9</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038212024-06-03T18:37:42Z2024-06-03T18:37:42Zby Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026232024-06-03T18:37:42Z2024-06-03T18:37:42Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format: Electronic Resources<br/>Ubiquitous Intelligence and Computing 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027292024-06-03T18:37:42Z2024-06-03T18:37:42Zby Sandnes, Frode Eika. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69293-5">http://dx.doi.org/10.1007/978-3-540-69293-5</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 9th International Conference, ICDCN 2008, Kolkata, India, January 5-8, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5032422024-06-03T18:37:42Z2024-06-03T18:37:42Zby Rao, Shrisha. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77444-0">http://dx.doi.org/10.1007/978-3-540-77444-0</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5036102024-06-03T18:37:42Z2024-06-03T18:37:42Zby Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Security for Telecommunications Networksent://SD_ILS/0/SD_ILS:5016992024-06-03T18:37:42Z2024-06-03T18:37:42Zby Traynor, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028122024-06-03T18:37:42Z2024-06-03T18:37:42Zby Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027932024-06-03T18:37:42Z2024-06-03T18:37:42Zby Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>The Internet of Things First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5034172024-06-03T18:37:42Z2024-06-03T18:37:42Zby Floerkemeier, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78731-0">http://dx.doi.org/10.1007/978-3-540-78731-0</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5028032024-06-03T18:37:42Z2024-06-03T18:37:42Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5035332024-06-03T18:37:42Z2024-06-03T18:37:42Zby Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5034552024-06-03T18:37:42Z2024-06-03T18:37:42Zby Smart, Nigel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2008 The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035032024-06-03T18:37:42Z2024-06-03T18:37:42Zby Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5037932024-06-03T18:37:42Z2024-06-03T18:37:42Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027302024-06-03T18:37:42Z2024-06-03T18:37:42Zby Rong, Chunming. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028272024-06-03T18:37:42Z2024-06-03T18:37:42Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Information Networking. Towards Ubiquitous Networking and Services International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papersent://SD_ILS/0/SD_ILS:5038152024-06-03T18:37:42Z2024-06-03T18:37:42Zby Vazão, Teresa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89524-4">http://dx.doi.org/10.1007/978-3-540-89524-4</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038182024-06-03T18:37:42Z2024-06-03T18:37:42Zby Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Ambient Intelligence European Conference, AmI 2008, Nuremberg, Germany, November 19-22, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038192024-06-03T18:37:42Z2024-06-03T18:37:42Zby Aarts, Emile. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89617-3">http://dx.doi.org/10.1007/978-3-540-89617-3</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038322024-06-03T18:37:42Z2024-06-03T18:37:42Zby Chowdhury, Dipanwita Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035632024-06-03T18:37:42Z2024-06-03T18:37:42Zby Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5037892024-06-03T18:37:42Z2024-06-03T18:37:42Zby Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036492024-06-03T18:37:42Z2024-06-03T18:37:42Zby Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format: Electronic Resources<br/>Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036622024-06-03T18:37:42Z2024-06-03T18:37:42Zby Wu, Tzong-Chen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85886-7">http://dx.doi.org/10.1007/978-3-540-85886-7</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036642024-06-03T18:37:42Z2024-06-03T18:37:42Zby Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5034812024-06-03T18:37:42Z2024-06-03T18:37:42Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038392024-06-03T18:37:42Z2024-06-03T18:37:42Zby Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036802024-06-03T18:37:42Z2024-06-03T18:37:42Zby Akar, Nail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037532024-06-03T18:37:42Z2024-06-03T18:37:42Zby Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035862024-06-03T18:37:42Z2024-06-03T18:37:42Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036002024-06-03T18:37:42Z2024-06-03T18:37:42Zby Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038002024-06-03T18:37:42Z2024-06-03T18:37:42Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Pervasive Computing 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5035432024-06-03T18:37:42Z2024-06-03T18:37:42Zby Indulska, Jadwiga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79576-6">http://dx.doi.org/10.1007/978-3-540-79576-6</a><br/>Format: Electronic Resources<br/>Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037672024-06-03T18:37:42Z2024-06-03T18:37:42Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2008 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035762024-06-03T18:37:42Z2024-06-03T18:37:42Zby Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85053-3">http://dx.doi.org/10.1007/978-3-540-85053-3</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2008 OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5037842024-06-03T18:37:42Z2024-06-03T18:37:42Zby Meersman, Robert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88871-0">http://dx.doi.org/10.1007/978-3-540-88871-0</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2008 OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5037852024-06-03T18:37:42Z2024-06-03T18:37:42Zby Meersman, Robert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88873-4">http://dx.doi.org/10.1007/978-3-540-88873-4</a><br/>Format: Electronic Resources<br/>Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130072024-06-03T18:37:42Z2024-06-03T18:37:42Zby McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Electronic Resources<br/>Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130352024-06-03T18:37:42Z2024-06-03T18:37:42Zby Furon, Teddy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format: Electronic Resources<br/>E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130402024-06-03T18:37:42Z2024-06-03T18:37:42Zby Alkassar, Ammar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format: Electronic Resources<br/>Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130422024-06-03T18:37:42Z2024-06-03T18:37:42Zby Okada, Mitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77505-8">http://dx.doi.org/10.1007/978-3-540-77505-8</a><br/>Format: Electronic Resources<br/>Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130432024-06-03T18:37:42Z2024-06-03T18:37:42Zby Kim, Sehun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format: Electronic Resources<br/>Pervasive Computing 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 13-16, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124302024-06-03T18:37:42Z2024-06-03T18:37:42Zby LaMarca, Anthony. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72037-9">http://dx.doi.org/10.1007/978-3-540-72037-9</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125292024-06-03T18:37:42Z2024-06-03T18:37:42Zby Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format: Electronic Resources<br/>Network-Based Information Systems First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128072024-06-03T18:37:42Z2024-06-03T18:37:42Zby Enokido, Tomoya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74573-0">http://dx.doi.org/10.1007/978-3-540-74573-0</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124602024-06-03T18:37:42Z2024-06-03T18:37:42Zby Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130322024-06-03T18:37:42Z2024-06-03T18:37:42Zby Adams, Carlisle. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papersent://SD_ILS/0/SD_ILS:5130332024-06-03T18:37:42Z2024-06-03T18:37:42Zby Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format: Electronic Resources<br/>Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130042024-06-03T18:37:42Z2024-06-03T18:37:42Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130232024-06-03T18:37:42Z2024-06-03T18:37:42Zby Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papersent://SD_ILS/0/SD_ILS:5129222024-06-03T18:37:42Z2024-06-03T18:37:42Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126752024-06-03T18:37:42Z2024-06-03T18:37:42Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5129792024-06-03T18:37:42Z2024-06-03T18:37:42Zby Meersman, Robert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76843-2">http://dx.doi.org/10.1007/978-3-540-76843-2</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5129802024-06-03T18:37:42Z2024-06-03T18:37:42Zby Meersman, Robert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76848-7">http://dx.doi.org/10.1007/978-3-540-76848-7</a><br/>Format: Electronic Resources<br/>Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129332024-06-03T18:37:42Z2024-06-03T18:37:42Zby Clemm, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124922024-06-03T18:37:42Z2024-06-03T18:37:42Zby Naor, Moni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126872024-06-03T18:37:42Z2024-06-03T18:37:42Zby Barker, Steve. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126902024-06-03T18:37:42Z2024-06-03T18:37:42Zby Xiao, Bin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129862024-06-03T18:37:42Z2024-06-03T18:37:42Zby Kurosawa, Kaoru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127842024-06-03T18:37:42Z2024-06-03T18:37:42Zby Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124402024-06-03T18:37:42Z2024-06-03T18:37:42Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130172024-06-03T18:37:42Z2024-06-03T18:37:42Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5127032024-06-03T18:37:42Z2024-06-03T18:37:42Zby Hämmerli, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129742024-06-03T18:37:42Z2024-06-03T18:37:42Zby Nam, Kil-Hyun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format: Electronic Resources<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129892024-06-03T18:37:42Z2024-06-03T18:37:42Zby Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129912024-06-03T18:37:42Z2024-06-03T18:37:42Zby Bao, Feng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format: Electronic Resources<br/>Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129982024-06-03T18:37:42Z2024-06-03T18:37:42Zby Zhang, Hongke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129992024-06-03T18:37:42Z2024-06-03T18:37:42Zby Srinathan, K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77026-8">http://dx.doi.org/10.1007/978-3-540-77026-8</a><br/>Format: Electronic Resources<br/>Privacy-Respecting Intrusion Detectionent://SD_ILS/0/SD_ILS:5057892024-06-03T18:37:42Z2024-06-03T18:37:42Zby Flegel, Ulrich. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Grid Computing Securityent://SD_ILS/0/SD_ILS:5116722024-06-03T18:37:42Z2024-06-03T18:37:42Zby Chakrabarti, Anirban. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125182024-06-03T18:37:42Z2024-06-03T18:37:42Zby Boavida, Fernando. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72697-5">http://dx.doi.org/10.1007/978-3-540-72697-5</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126262024-06-03T18:37:42Z2024-06-03T18:37:42Zby Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129272024-06-03T18:37:42Z2024-06-03T18:37:42Zby Miyaji, Atsuko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Electronic Resources<br/>Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papersent://SD_ILS/0/SD_ILS:5127562024-06-03T18:37:42Z2024-06-03T18:37:42Zby Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format: Electronic Resources<br/>E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papersent://SD_ILS/0/SD_ILS:5129502024-06-03T18:37:42Z2024-06-03T18:37:42Zby Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format: Electronic Resources<br/>Ubiquitous Intelligence and Computing 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126912024-06-03T18:37:42Z2024-06-03T18:37:42Zby Indulska, Jadwiga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73549-6">http://dx.doi.org/10.1007/978-3-540-73549-6</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5129002024-06-03T18:37:42Z2024-06-03T18:37:42Zby Montanari, Ugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75336-0">http://dx.doi.org/10.1007/978-3-540-75336-0</a><br/>Format: Electronic Resources<br/>UbiComp 2007: Ubiquitous Computing 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128492024-06-03T18:37:42Z2024-06-03T18:37:42Zby Krumm, John. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74853-3">http://dx.doi.org/10.1007/978-3-540-74853-3</a><br/>Format: Electronic Resources<br/>Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5122762024-06-03T18:37:42Z2024-06-03T18:37:42Zby Lee, Jae Kwang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127612024-06-03T18:37:42Z2024-06-03T18:37:42Zby Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5127932024-06-03T18:37:42Z2024-06-03T18:37:42Zby Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format: Electronic Resources<br/>Power Analysis Attacks Revealing the Secrets of Smart Cardsent://SD_ILS/0/SD_ILS:5055042024-06-03T18:37:42Z2024-06-03T18:37:42Zby Mangard, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-38162-6">http://dx.doi.org/10.1007/978-0-387-38162-6</a><br/>Format: Electronic Resources<br/>Online Business Security Systemsent://SD_ILS/0/SD_ILS:5058322024-06-03T18:37:42Z2024-06-03T18:37:42Zby Williams, Godfried B. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Economics of Identity Theft: Avoidance, Causes and Possible Curesent://SD_ILS/0/SD_ILS:5058172024-06-03T18:37:42Z2024-06-03T18:37:42Zby Camp, L. Jean. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119662024-06-03T18:37:42Z2024-06-03T18:37:42Zby Lai, Xuejia. editor.<br/><a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format: Electronic Resources<br/>Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119672024-06-03T18:37:42Z2024-06-03T18:37:42Zby Ning, Peng. editor.<br/><a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5121102024-06-03T18:37:42Z2024-06-03T18:37:42Zby Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/11958239">http://dx.doi.org/10.1007/11958239</a><br/>Format: Electronic Resources<br/>Distributed Computing and Networking 8th International Conference, ICDCN 2006, Guwahati, India, December 27-30, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5120532024-06-03T18:37:42Z2024-06-03T18:37:42Zby Chaudhuri, Soma. editor.<br/><a href="http://dx.doi.org/10.1007/11947950">http://dx.doi.org/10.1007/11947950</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119612024-06-03T18:37:42Z2024-06-03T18:37:42Zby Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format: Electronic Resources<br/>Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5121252024-06-03T18:37:42Z2024-06-03T18:37:42Zby Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119832024-06-03T18:37:42Z2024-06-03T18:37:42Zby Lipmaa, Helger. editor.<br/><a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2006 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5120002024-06-03T18:37:42Z2024-06-03T18:37:42Zby Barua, Rana. editor.<br/><a href="http://dx.doi.org/10.1007/11941378">http://dx.doi.org/10.1007/11941378</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papersent://SD_ILS/0/SD_ILS:5121352024-06-03T18:37:42Z2024-06-03T18:37:42Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119422024-06-03T18:37:42Z2024-06-03T18:37:42Zby Rhee, Min Surp. editor.<br/><a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5121072024-06-03T18:37:42Z2024-06-03T18:37:42Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5121422024-06-03T18:37:42Z2024-06-03T18:37:42Zby Buttyán, Levente. editor.<br/><a href="http://dx.doi.org/10.1007/11964254">http://dx.doi.org/10.1007/11964254</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2007 The Cryptographers’ Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5121532024-06-03T18:37:42Z2024-06-03T18:37:42Zby Abe, Masayuki. editor.<br/><a href="http://dx.doi.org/10.1007/11967668">http://dx.doi.org/10.1007/11967668</a><br/>Format: Electronic Resources<br/>