Data Encryption.
Overview
| Works: | 919 works in 558 publications in 558 languages | |
|---|---|---|
Titles
Public Key Cryptography - PKC 2008 :11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings /
by:
(Electronic resources)
Theory of Cryptography :Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings /
by:
(Electronic resources)
Information Security Practice and Experience4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings /
by:
(Electronic resources)
Advances in cryptology -- EUROCRYPT 200827th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008 : proceedings /
by:
(Electronic resources)
Certification and Security in Inter-Organizational E-ServicesIFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France /
by:
(Electronic resources)
Information Security Applications (vol. # 3786)6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers /
by:
(Electronic resources)
Topics in Cryptology -- CT-RSA 2006The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings /
by:
(Electronic resources)
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings /
by:
(Electronic resources)
Recent Advances in Intrusion Detection (vol. # 3858)8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers /
by:
(Electronic resources)
Formal Aspects in Security and Trust (vol. # 3866)Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers /
by:
(Electronic resources)
Theory of Cryptography (vol. # 3876)Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings /
by:
(Electronic resources)
Theoretical Computer Science (vol. # 3895)Essays in Memory of Shimon Even /
by:
(Electronic resources)
Information Security Practice and Experience (vol. # 3903)Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings /
by:
(Electronic resources)
Selected Areas in Cryptography (vol. # 3897)12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers /
by:
(Electronic resources)
Smart Card Research and Advanced Applications7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings /
by:
(Electronic resources)
Information Security and Cryptology - ICISC 20058th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers /
by:
(Electronic resources)
Public Key Cryptography - PKC 20069th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings /
by:
(Electronic resources)
Advances in Cryptology - EUROCRYPT 200625th International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings /
by:
(Electronic resources)
Emerging Trends in Information and Communication SecurityInternational Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings /
by:
(Electronic resources)
Applied Cryptography and Network Security (vol. # 3989)4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings /
by:
(Electronic resources)
Privacy Enhancing Technologies (vol. # 3856)5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers /
by:
(Electronic resources)
Public Key Infrastructure (vol. # 4043)Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings /
by:
(Electronic resources)
Information Security and Privacy (vol. # 4058)11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings /
by:
(Electronic resources)
Coding and CryptographyInternational Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005, Revised Selected Papers /
by:
(Electronic resources)
Detection of Intrusions and Malware, and Vulnerability AssessmentThird International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings /
by:
(Electronic resources)
Algorithmic Number Theory7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006, Proceedings /
by:
(Electronic resources)
Fast Software Encryption (vol. # 4047)13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers /
by:
(Electronic resources)
Secure Mobile Ad-hoc Networks and SensorsFirst International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers /
by:
(Electronic resources)
Data and Applications Security XX20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings /
by:
(Electronic resources)
Emerging Directions in Embedded and Ubiquitous ComputingEUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings /
by:
(Electronic resources)
Advances in Cryptology - CRYPTO 200626th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings /
by:
(Electronic resources)
Trust and Privacy in Digital BusinessThird International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings /
by:
(Electronic resources)
Security and Cryptography for Networks5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings /
by:
(Electronic resources)
Information Security (vol. # 4176)9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings /
by:
(Electronic resources)
Autonomic and Trusted ComputingThird International Conference, ATC 2006, Wuhan, China, September 3-6, 2006 /
by:
(Electronic resources)
Secure Data Management (vol. # 4165)Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings /
by:
(Electronic resources)
Recent Advances in Intrusion Detection (vol. # 4219)9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings /
by:
(Electronic resources)
Security Protocols (vol. # 3957)12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers /
by:
(Electronic resources)
Sequences and Their Applications u SETA 20064th International Conference, Beijing, China, September 24-28, 2006, Proceedings /
by:
(Electronic resources)
Computer Security u ESORICS 200611th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings /
by:
(Electronic resources)
Fault Diagnosis and Tolerance in CryptographyThird International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings /
by:
(Electronic resources)
Financial Cryptography and Data Security (vol. # 4107)10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers /
by:
(Electronic resources)
Cryptographic Hardware and Embedded Systems - CHES 20068th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings /
by:
(Electronic resources)
Advances in Information and Computer SecurityFirst International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings /
by:
(Electronic resources)
Communications and Multimedia Security (vol. # 4237)10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings /
by:
(Electronic resources)
Digital Watermarking (vol. # 4283)5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings /
by:
(Electronic resources)
Information Security and Cryptology - ICISC 20069th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings /
by:
(Electronic resources)
Cryptology and Network Security (vol. # 4301)5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings /
by:
(Electronic resources)
Advances in Cryptology -- ASIACRYPT 200612th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings /
by:
(Electronic resources)
Information and Communications Security (vol. # 4307)8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings /
by:
(Electronic resources)
Information Security and Cryptology (vol. # 4318)Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings /
by:
(Electronic resources)
Progress in Cryptology - INDOCRYPT 20067th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings /
by:
(Electronic resources)
Mobile Ad-hoc and Sensor Networks (vol. # 4325)Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings /
by:
(Electronic resources)
Privacy Enhancing Technologies (vol. # 4258)6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers /
by:
(Electronic resources)
Progress in Cryptology - VIETCRYPT 2006First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers /
by:
(Electronic resources)
Information Systems Security (vol. # 4332)Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings /
by:
(Electronic resources)
Critical Information Infrastructured SecurityFirst International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006 /
by:
(Electronic resources)
Security and Privacy in Ad-hoc and Sensor Networks (vol. # 4357)Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers /
by:
(Electronic resources)
Topics in Cryptology ? CT-RSA 2007The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings /
by:
(Electronic resources)
Autonomic and Trusted Computing5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings /
by:
(Electronic resources)
Public Key Infrastructure5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings /
by:
(Electronic resources)
Information Security and Privacy13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings /
by:
(Electronic resources)
Global E-Security4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings /
by:
(Electronic resources)
Information Security Applications5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers /
by:
(Electronic resources)
Security in Communication Networks4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers /
by:
(Electronic resources)
Security in Ad-hoc and Sensor NetworksFirst European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers /
by:
(Electronic resources)
Topics in Cryptology -- CT-RSA 2005The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings /
by:
(Electronic resources)
Public Key Cryptography - PKC 20058th International Workshop on Theory and Practice in Public Key Cryptography /
by:
(Electronic resources)
Theory of CryptographySecond Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings /
by:
(Electronic resources)
Digital WatermarkingThird International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers /
by:
(Electronic resources)
Information Security Practice and ExperienceFirst International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings /
by:
(Electronic resources)
Advances in Cryptology - EUROCRYPT 200524th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings /
by:
(Electronic resources)
Sequences and Their Applications - SETA 2004Third International Conference, Seoul, Korea, October 24-28, 2004, Revised Selected Papers /
by:
(Electronic resources)
Privacy Enhancing Technologies4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers /
by:
(Electronic resources)
Applied Cryptography and Network SecurityThird International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings /
by:
(Electronic resources)
Information Security and Cryptology - ICISC 20047th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers /
by:
(Electronic resources)
Fast Software Encryption12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers /
by:
(Electronic resources)
Information Security and Privacy10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings /
by:
(Electronic resources)
Advanced Encryption Standard - AES4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers /
by:
(Electronic resources)
Intrusion and Malware Detection and Vulnerability AssessmentSecond International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings /
by:
(Electronic resources)
Financial Cryptography and Data Security9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 - March 3, 2005, Revised Papers /
by:
(Electronic resources)
Public Key InfrastructureSecond European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30- July 1, 2005, Revised Selected Papers /
by:
(Electronic resources)
Advances in Cryptology - CRYPTO 200525th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings /
by:
(Electronic resources)
Data and Applications Security XIX19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings /
by:
(Electronic resources)
Trust, Privacy, and Security in Digital BusinessSecond International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings /
by:
(Electronic resources)
Security Protocols11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers /
by:
(Electronic resources)
Cryptographic Hardware and Embedded Systems - CHES 20057th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings /
by:
(Electronic resources)
Digital Watermarking :4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings
by:
(Electronic resources)
Communications and Multimedia Security :9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings
by:
(Electronic resources)
Secure Data Management :Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings
by:
(Electronic resources)
Progress in Cryptology - Mycrypt 2005 :First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings
by:
(Electronic resources)
Foundations of Security Analysis and Design III :FOSAD 2004/2005 Tutorial Lectures
by:
(Electronic resources)
Computer Security - ESORICS 2005 :10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings
by:
(Electronic resources)
Information Security :8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings
by:
(Electronic resources)
Information Hiding :7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers
by:
(Electronic resources)
Computer Network Security :Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings
by:
(Electronic resources)
Cryptography and Coding :10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings
by:
(Electronic resources)
Advances in Cryptology - ASIACRYPT 2005 :11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings
by:
(Electronic resources)
Information Systems Security :First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
by:
(Electronic resources)
Embedded and Ubiquitous Computing - EUC 2005 Workshops :EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 8-9, 2005
by:
(Electronic resources)
Progress in Cryptology - INDOCRYPT 2005 :6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings
by:
(Electronic resources)
Cryptology and Network Security :4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings
by:
(Electronic resources)
Information Security and Cryptology :First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
by:
(Electronic resources)
Mobile Ad-hoc and Sensor Networks :First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings
by:
(Electronic resources)
Security and Privacy in Ad-hoc and Sensor Networks :Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers
by:
(Electronic resources)
Information and Communications Security :7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings
by:
(Electronic resources)
Arithmetic of Finite Fields2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings /
by:
(Electronic resources)
Detection of Intrusions and Malware, and Vulnerability Assessment5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings /
by:
(Electronic resources)
Data and Applications Security XXII22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings /
by:
(Electronic resources)
Privacy Enhancing Technologies8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings /
by:
(Electronic resources)
Fast Software Encryption15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers /
by:
(Electronic resources)
Trusted Computing - Challenges and ApplicationsFirst International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings /
by:
(Electronic resources)
Information Security and CryptologyThird SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers /
by:
(Electronic resources)
Cryptographic Hardware and Embedded Systems -- CHES 200810th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings /
by:
(Electronic resources)
Information Theoretic SecurityThird International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings /
by:
(Electronic resources)
Advances in Cryptology -- CRYPTO 200828th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings /
by:
(Electronic resources)
Financial Cryptography and Data Security12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers /
by:
(Electronic resources)
Secure Data Management5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings /
by:
(Electronic resources)
Pairing-Based Cryptography -- Pairing 2008Second International Conference, Egham, UK, September 1-3, 2008. Proceedings /
by:
(Electronic resources)
Trust, Privacy and Security in Digital Business5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings /
by:
(Electronic resources)
Security and Cryptography for Networks6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings /
by:
(Electronic resources)
Coding Theory and ApplicationsSecond International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings /
by:
(Electronic resources)
Information Security11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings /
by:
(Language materials, printed)
Smart card research and advanced applications8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings /
by:
(Language materials, printed)
Sequences and Their Applications - SETA 20085th International Conference Lexington, KY, USA, September 14-18, 2008 Proceedings /
by:
(Language materials, printed)
IP operations and management8th IEEE international workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008 : proceedings /
by:
(Language materials, printed)
Recent advances in intrusion detection11th international symposium, RAID 2008 : Cambridge, MA, USA September 15-17 2008 : proceedings /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 200814th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings /
by:
(Language materials, printed)
Cryptology and network security7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008, proceedings /
by:
(Language materials, printed)
Progress in cryptology - INDOCRYPT 20089th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008, proceedings /
by:
(Language materials, printed)
Information systems security4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings /
by:
(Language materials, printed)
Mathematical methods in computer scienceessays in memory of Thomas Beth /
by:
(Language materials, printed)
Digital watermarking6th international workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 proceedings /
by:
(Language materials, printed)
Information security applications9th international workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, revised selected papers /
by:
(Electronic resources)
Theory of cryptography6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings /
by:
(Electronic resources)
Trusted computingsecond international conference, Trust 2009, Oxford, UK, April 6-8, 2009 ; Proceedings /
by:
(Electronic resources)
Engineering secure software and systemsFirst international symposium, ESSoS 2009, Leuven, Belgium, February 4-6, 2009, proceedings /
by:
(Electronic resources)
Public Key Cryptography - PKC 200912th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings /
by:
(Electronic resources)
Information security and cryptology - ICISC 200811th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers /
by:
(Electronic resources)
Information systems, technology and managementThird International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings /
by:
(Electronic resources)
Information security practice and experience5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 ; proceedings /
by:
(Electronic resources)
Topics in cryptology--CT-RSA 2009the Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009 ; proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 200928th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 : proceedings /
by:
(Electronic resources)
Information Security and Cryptology4th international conference, Inscrypt 2008, Beijing, China, December 14-17, 2008 ; revised selected papers /
by:
(Electronic resources)
Formal aspects in security and trust5th international workshop, FAST 2008, Malaga, Spain, October 9-10, 2008 ; revised selected papers /
by:
(Electronic resources)
Applied cryptography and network security7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 ; proceedings /
by:
(Electronic resources)
Formal to practical securitypapers issued from the 2005 - 2008 French Japanese collaboration /
by:
(Electronic resources)
Emerging challenges for security, privacy and trust24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings /
by:
(Electronic resources)
Forensics in Telecommunications, Information and MultimediaSecond International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers /
by:
(Electronic resources)
Trust Management IIIThird IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings /
by:
(Electronic resources)
Advances in information security and its applicationthird international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 ; proceedings /
by:
(Electronic resources)
Coding and cryptologysecond international workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009 : proceedings /
by:
(Electronic resources)
Applied algebra, algebraic algorithms and error-correcting codes18th international symposium, AAECC-18, Tarragona, Spain, June 8-12, 2009 : proceedings /
by:
(Electronic resources)
Progress in cryptology - AFRICACRYPT 2009Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21 - 25, 2009 : Proceedings /
by:
(Electronic resources)
Advances in information security and assurancethird international conference and workshops, ISA 2009, Seoul, Korea, June 25-27, 2009 ; proceedings /
by:
(Electronic resources)
Information security and privacy14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009 : proceedings /
by:
(Electronic resources)
Autonomic and trusted computing6th international conference, ATC 2009, Brisbane, Australia, July 7-9, 2009 ; proceedings /
by:
(Electronic resources)
Detection of intrusions and malware, and vulnerability assessment6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings /
by:
(Electronic resources)
The future of identity in the information society4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008 : Revised Selected Papers /
by:
(Electronic resources)
Data and applications security XXIII23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 : proceedings /
by:
(Electronic resources)
Privacy enhancing technologies9th international symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009 : proceedings /
by:
(Electronic resources)
Fast Software Encryption16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers /
by:
(Electronic resources)
Financial cryptography and data security13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009 : revised selected papers /
by:
(Electronic resources)
Global security, safety, and sustainability5th international conference, ICGS3 2009, London, UK, September 1-2, 2009 : proceedings /
by:
(Electronic resources)
Personal Satellite ServicesInternational Conference, PSATS 2009, Rome, Italy, March 18-19, 2009 : revised selected papers /
by:
(Electronic resources)
Pairing-based cryptography - Pairing 2009Third International Conference Palo Alto, CA, USA, August 12-14, 2009 : Proceedings /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 200929th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009 : Proceedings /
by:
(Electronic resources)
Digital watermarking8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings /
by:
(Electronic resources)
Trust, privacy and security in digital business6th international conference, TrustBus 2009, Linz, Austria, September 3-4, 2009 : proceedings /
by:
(Electronic resources)
Foundations of security analysis and design VFOSAD 2007/2008/2009 tutorial lectures /
by:
(Electronic resources)
Selected Areas in Cryptography15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, revised selected papers /
by:
(Electronic resources)
Wireless and mobile networkingSecond IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009 : proceedings /
by:
(Electronic resources)
Security and privacy in mobile information and communication systemsFirst International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009 : revised selected papers /
by:
(Electronic resources)
Foundations and applications of security analysisJoint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009 : revised selected papers /
by:
(Electronic resources)
Information security theory and practicesmart devices, pervasive systems, and ubiquitous networks ; third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 ; proceedings /
by:
(Electronic resources)
E-voting and identitysecond international conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 200911th international workshop, Lausanne, Switzerland, September 6-9, 2009 : proceedings /
by:
(Electronic resources)
Smart spaces and next generation wired/wireless networking9th international conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009 : proceedings /
by:
(Electronic resources)
Secure data management6th VLDB workshop, SDM 2009, Lyon, France, August 28, 2009 : proceedings /
by:
(Electronic resources)
Ad-hoc, mobile, and wireless networks8th international conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009 : proceedings /
by:
(Electronic resources)
Information hiding11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers /
by:
(Electronic resources)
Computer security - ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009 : proceedings /
by:
(Electronic resources)
Information security12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 : proceedings /
by:
(Electronic resources)
Recent advances in intrusion detection12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 : proceedings /
by:
(Electronic resources)
Digital watermarking7th international workshop, IWDW 2008, Busan, Korea, November 10-12, 2008 : selected papers /
by:
(Electronic resources)
Identity and privacy in the internet age14th Nordic Conference on Secure It Systems, Nordsec 2009, Oslo, Norway, 14-16 October 2009 : proceedings /
by:
(Electronic resources)
Safety and security in multiagen systemsresearch results from 2004-2006 /
by:
(Electronic resources)
Security protocols14th international workshop, Cambridge, UK, March 27-29 2006 : revised selected papers /
by:
(Electronic resources)
Software and data technologiesThird International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008 : revised selected papers /
by:
(Electronic resources)
Security and Privacy in Communication Networks5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009 : revised selected papers /
by:
(Electronic resources)
Provable securitythird international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings /
by:
(Electronic resources)
Selected Areas in Cryptography16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers /
by:
(Electronic resources)
Information theoretic securitysecond international conference, ICITS 2007, Madrid, Spain, May 25-29, 2007 : revised selected papers /
by:
(Electronic resources)
Protecting persons while protecting the peoplesecond annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 200915th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings /
by:
(Electronic resources)
Cryptology and Network Security8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings /
by:
(Electronic resources)
Future generation information technologyfirst international conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 : proceedings /
by:
(Electronic resources)
Information systems security5th international conference, ICISS 2009, Kolkata, India, December 14-18, 2009 : proceedings /
by:
(Electronic resources)
Cryptography and coding12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 : proceedings /
by:
(Electronic resources)
E-business and telecommunicationsinternational conference, ICETE 2008, Porto, Portugal, July 26 - 29, 2008 : revised selected papers /
by:
(Electronic resources)
iNetSec 2009 - Open Research Problems in Network SecurityIFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009 : revised selected papers /
by:
(Electronic resources)
Advances in security technologyInternational Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008 : revised selected papers /
by:
(Electronic resources)
Security TechnologyInternational Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 200910th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009 : proceedings /
by:
(Electronic resources)
Information security applications10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers /
by:
(Electronic resources)
Information and communications security11th international conference, ICICS 2009, Beijing, China, December 14-17, 2009 : proceedings /
by:
(Electronic resources)
Security in emerging wireless communication and networking systemsFirst International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009 : revised selected papers /
by:
(Electronic resources)
Information security and digital forensicsFirst International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009 : revised selected papers /
by:
(Electronic resources)
Quantum communication and quantum networkingFirst International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systemssecond international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 : proceedings /
by:
(Electronic resources)
Data privacy management and autonomous spontaneous security4th international workshop, DPM 2009, and second international workshop, SETOP 2009, St. Malo, France, September 24-25, 2009 : revised selected papers /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2010the Cryptographers' track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010 : proceedings /
by:
(Electronic resources)
Post-quantum cryptographythird international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 : proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 201029th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 : proceedings /
by:
(Electronic resources)
Communications and multimedia security11th IFIP TC 6/TC ; 11 international conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010 : proceedings /
by:
(Electronic resources)
Architecting critical systemsfirst international symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 : proceedings /
by:
(Electronic resources)
Intelligence and security informaticsPacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security8th international conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings /
by:
(Electronic resources)
Arithmetic of finite fieldsthird international workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings /
by:
(Electronic resources)
Fast software encryption17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 : revised selected papers /
by:
(Electronic resources)
Trust and trustworthy computingthird international conference, TRUST 2010, Berlin, Germany, June 21-23, 2010 : proceedings /
by:
(Electronic resources)
Networked services and applications - engineering, control and management16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010 : proceedings /
by:
(Electronic resources)
Information, Security and Cryptology - ICISC 200912th International Conference, Seoul, Korea, December 2-4, 2009 : revised selected papers /
by:
(Electronic resources)
Trust Management IV4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010 : proceedings /
by:
(Electronic resources)
Privacy and identity management for life5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers /
by:
(Electronic resources)
Critical information infrastructures securitysecond international workshop, CRITIS 2007, Malaga, Spain, October 3-5, 2007 : revised papers /
by:
(Electronic resources)
Information systems, technology and management4th international conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010 : proceedings /
by:
(Electronic resources)
Trusted systemsFirst International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009 : revised selected papers /
by:
(Electronic resources)
Privacy enhancing technologies10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010 : revised selected papers /
by:
(Electronic resources)
Critical information infrastructures security4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 : revised papers /
by:
(Electronic resources)
Algorithmic number theory9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010 : proceedings /
by:
(Electronic resources)
Detection of intrusions and malware, and vulnerability assessment7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 : proceedings /
by:
(Electronic resources)
Public key cryptography - PKC 201013th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings /
by:
(Electronic resources)
NETWORKING 20109th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010 : proceedings /
by:
(Electronic resources)
Information security, practice and experience6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010 : proceedings /
by:
(Electronic resources)
Progress in cryptology, AFRICACRYPT 2010Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010 : proceedings /
by:
(Electronic resources)
Ethics and policy of biometricsThird International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010 : revised papers /
by:
(Electronic resources)
Formal aspects in security and trust6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009 revised selected papers /
by:
(Electronic resources)
Smart card research and advanced application9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proceedings /
by:
(Electronic resources)
Information security theory and practicessecurity and privacy of pervasive systems and smart devices : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010 : proceedings /
by:
(Electronic resources)
Distributed computing and networking11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010 : proceedings /
by:
(Electronic resources)
Theory of cryptography7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 201030th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXIV24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, proceedings /
by:
(Electronic resources)
Progress in cryptology - LATINCRYPT 2010First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedings /
by:
(Electronic resources)
Financial cryptography and data securityFC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, revised selected papers /
by:
(Electronic resources)
E-government, e-services and global processesJoint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010, proceedings /
by:
(Electronic resources)
Security and privacy - silver linings in the cloud25th IFIP TC-11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010, proceedings /
by:
(Electronic resources)
Recent trends in network security and applicationsthird International Conference, CNSA 2010, Chennai, India, July 23-25, 2010, proceedings /
by:
(Electronic resources)
Secure data management7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, proceedings /
by:
(Electronic resources)
Computer security - ESORICS 201015th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, proceedings /
by:
(Electronic resources)
Trustworthly global computing5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, revised selected papers /
by:
(Electronic resources)
Sequences and their applications - SETA 20106th International Conference, Paris, France, September 13-17, 2010, proceedings /
by:
(Electronic resources)
Information theoretic security4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, revised selected papers /
by:
(Electronic resources)
Information security and privacy15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, proceedings /
by:
(Electronic resources)
Trust, privacy and security in digital business7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, proceedings /
by:
(Electronic resources)
Recent advances in intrusion detection13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, proceedings /
by:
(Electronic resources)
Multiple access communicationsThird International Workshop, MACOM 2010, Barcelona, Spain, September 13-14, 2010, proceedings /
by:
(Electronic resources)
Security and cryptography for networks7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, proceedings /
by:
(Electronic resources)
Information security and assurance4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, proceedings /
by:
(Electronic resources)
Global security, safety, and sustainability6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, proceedings /
by:
(Electronic resources)
Provable security4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings /
by:
(Electronic resources)
Autonomic and trusted computing7th international conference, ATC 2010, Xi'an, China, October 26-29, 2010 : proceedings /
by:
(Electronic resources)
Radio frequency identificationsecurity and privacy issues : 6th international workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010 : revised selected papers /
by:
(Electronic resources)
Information hiding12th international conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010 : revised selected papers /
by:
(Electronic resources)
Public key infrastructures, services and applications6th European workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009 : revised selected papers /
by:
(Electronic resources)
Collaborative networks for a sustainable world11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010 : proceedings /
by:
(Electronic resources)
Advances in information technology4th international conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010 : proceedings /
by:
(Electronic resources)
Decision and game theory for securityFirst International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010, proceedings /
by:
(Electronic resources)
Advances in Information and computer security5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, proceedings /
by:
(Electronic resources)
Pairing-based cryptography - Pairing 20104th international conference, Yamanaka Hot Spring, Japan, December 2010, proceedings /
by:
(Electronic resources)
Cryptology and network security9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, proceedings /
by:
(Electronic resources)
Advances in digital forensics VISixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, revised selected papers /
by:
(Electronic resources)
Web application securityIberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009, revised selected papers /
by:
(Electronic resources)
Communication and networkingInternational Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010, proceedings.Part I /
by:
(Electronic resources)
Ad hoc networksSecond International Conference, ADHOCNETS 2010, Victoria, BC, Canada, August 18-20, 2010, revised selected papers /
by:
(Electronic resources)
Security and privacy in communication networks6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, proceedings /
by:
(Electronic resources)
Security and privacy in mobile information and communication systemsSecond International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, revised selected papers /
by:
(Electronic resources)
Personal satellite servicessecond international ICST confernce, PSATS 2010, Rome, Italy, February 2010 : revised selected papers /
by:
(Electronic resources)
Security protocols15th international workshop, Brno, Czech Republic, April 18-20, 2007 : revised selected papers /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 201011th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010 : proceedings /
by:
(Electronic resources)
Information and communications security12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 : proceedings /
by:
(Electronic resources)
Transactions on computational science Xspecial issue on security in computing, part I /
by:
(Electronic resources)
Transactions on computational science XIspecial issue on security in computing, part II /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201016th international conference on the theory and application of cryptology and information security, Singapore, December 5-9, 2010 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 201012th international workshop, Santa Barbara, USA, August 17-20, 2010 : proceedings /
by:
(Electronic resources)
Digital watermarking9th international workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 : revised selected papers /
by:
(Electronic resources)
Information security13th international conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systemsthird International symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011 : proceedings /
by:
(Electronic resources)
Information security applications11th international workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010 : revised selected papers /
by:
(Electronic resources)
Topics in cryptologyCT-RSA 2011 : the cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14-18, 2011 : proceedings /
by:
(Electronic resources)
Open research problems in network securityIFIP WG 11.4 international workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010 : revised selected papers /
by:
(Electronic resources)
Data privacy management and autonomous spontaneous security5th international workshop, DPM 2010 and 3rd international workshop, SETOP 2010, Athens, Greece, September 23, 2010 : revised selected papers /
by:
(Electronic resources)
Formal aspects of security and trust7th international workshop, FAST 2010, Pisa, Italy, September 16-17, 2010 : revised selected papers /
by:
(Electronic resources)
Public key cryptographyPKC 2011 : 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6-9, 2011 : proceedings /
by:
(Electronic resources)
Selected areas in cryptography17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010 : revised selected papers /
by:
(Electronic resources)
Theory of cryptography8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011 : proceedings /
by:
(Electronic resources)
e-Business and telecommunications6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009 : revised selected papers /
by:
(Electronic resources)
Voice over IP securitya comprehensive survey of vulnerabilities and academic research /
by:
(Electronic resources)
NETWORKING 201110th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011 : proceedings.Part II /
by:
(Electronic resources)
NETWORKING 201110th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011 : proceedings.Part I /
by:
(Electronic resources)
Information and automationinternational symposium, ISIA 2010, Guangzhou, China, November 10-11, 2010 : revised selected papers /
by:
(Electronic resources)
Privacy and identity management for life6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 201130th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011 : proceedings /
by:
(Electronic resources)
Information theoretic security5th international conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011 : proceedings /
by:
(Electronic resources)
Information security practice and experience7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 : proceedings /
by:
(Electronic resources)
Information security theory and practicesecurity and privacy of mobile devices in wireless communication : 5th IFIP WG 11.2 international workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011 : proceedings /
by:
(Electronic resources)
Coding and cryptologythird international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security9th international conference, ACNS 2011, Nerja, Spain, June 7-10, 2011 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing4th international conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011 : proceedings /
by:
(Electronic resources)
Fast software encryption18th international workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011 : revised selected papers /
by:
(Electronic resources)
Detection of intrusions and malware, and vulnerability assessment8th international conference, DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011 : proceedings /
by:
(Electronic resources)
Progress in cryptologyAFRICACRYP T 2011 : 4th international conference on cryptology in Africa, Dakar, Senegal, July 5-7, 2011 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXV25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011 : proceedings /
by:
(Electronic resources)
Future challenges in security and privacy for academia and industry26th IFIP TC 11 international information security conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011 : proceedings /
by:
(Electronic resources)
Trust management V5th IFIP WG 11.11 international conference, IFIPTM 2011, Copenhagen, Denmark, June 29 - July 1, 2011 : proceedings /
by:
(Electronic resources)
Secure and trust computing, data management and applications8th FIRA international conference, STA 2011, Loutraki, Greece, June 28-30, 2011 : proceedings /
by:
(Electronic resources)
Pro PHP securityfrom application security principles to the implementation of XSS defenses /
by:
(Electronic resources)
Privacy enhancing technologies11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27-29 2011 : proceedings /
by:
(Electronic resources)
Studies in complexity and cryptographymiscellanea on the interplay between randomness and computation /
by:
(Electronic resources)
Security protocols XVI16th international workshop, Cambridge, UK, April 16-18, 2008 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology6th international conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010 : revised selected papers /
by:
(Electronic resources)
Information Security and Privacy16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011 : proceedings /
by:
(Electronic resources)
Advances in network security and applications4th international conference, CNSA 2011, Chennai, India, July 15-17, 2011 /
by:
(Electronic resources)
Information security and assuranceinternational conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011 : proceedings /
by:
(Electronic resources)
NETWORKING 2011 workshopsInternational IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, Valencia, Spain, May 13, 2011 : revised selected papers /
by:
(Electronic resources)
Autonomic and trusted computing8th international conference, ATC 2011, Banff, Canada, September 2-4, 2011 : proceedings /
by:
(書目-電子資源)
Secure data management8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011 : proceedings /
by:
(書目-電子資源)
Provable security5th international conference, ProvSec 2011, Xi'an, China, October 16-18, 2011 : proceedings /
by:
(書目-電子資源)
Information hiding13th international conference, IH 2011, Prague, Czech Republic, May 18-20, 2011 : revised selected papers /
by:
(書目-電子資源)
Multiple access communications4th international workshop, MACOM 2011, Trento, Italy, September 12-13, 2011 : proceedings /
by:
(書目-電子資源)
Information security14th international conference, ISC 2011, Xi'an, China, October 26-29, 2011 : proceedings /
by:
(書目-電子資源)
Trusted systemssecond international conference, INTRUST 2010, Beijing, China, December 13-15, 2010 : revised selected papers /
by:
(書目-電子資源)
Information systems security7th international conference, ICISS 2011, Kolkata, India, December 15-19, 2011 : procedings /
by:
(書目-電子資源)
Cryptography and coding13th IMA international conference, IMACC 2011, Oxford, UK, December 12-15, 2011 : proceedings /
by:
(書目-電子資源)
Cryptology and network security10th international conference, CANS 2011, Sanya, China, December 10-12, 2011 : proceedings /
by:
(書目-電子資源)
Expert oracle and Java Securityprogramming secure Oracle database applications with Java /
by:
(書目-電子資源)
Security protocols XIX19th international workshop, Cambridge, UK, March 28-30, 2011 : revised selected papers /
by:
(書目-電子資源)
RFID: Security and privacy7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011 : revised selected papers /
by:
(書目-電子資源)
Critical infrastructure protectioninformation infrastructure models, analysis, and defense /
by:
(書目-電子資源)
Trust management VI6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings /
by:
(書目-電子資源)
Sequences and their applications - SETA 20127th International Conference, Waterloo, ON, Canada, June 4-8, 2012 : proceedings /
by:
(書目-電子資源)
Trust and trustworthy computing5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012 : proceedings /
by:
(書目-電子資源)
Applied cryptography and network security10th International Conference, ACNS 2012, Singapore, June 26-29, 2012 : proceedings /
by:
(書目-電子資源)
Privacy enhancing technologies12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012 : proceedings /
by:
(書目-電子資源)
Arithmetic of finite fields4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012 : proceedings /
by:
(書目-電子資源)
Transactions on data hiding and multimedia security VIIIspecial issue on pattern recognition for IT security /
by:
(書目-電子資源)
Trusted systemsthird International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011 : revised selected papers /
by:
(書目-電子資源)
Secure data management9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012 : proceedings /
by:
(書目-電子資源)
Provable security6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012 : proceedings /
by:
(書目-電子資源)
Information security15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012 : proceedings /
by:
(書目-電子資源)
Secure IT systems17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 : proceedings /
by:
(書目-電子資源)
Multiple access communications5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012 : proceedings /
by:
(書目-電子資源)
Information hiding10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008 : revised selected papers /
by:
(書目-電子資源)
Network and parallel computingIFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008 : proceedings /
by:
(書目-電子資源)
Provable securitysecond international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings /
by:
(書目-電子資源)
Information systems security8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(書目-電子資源)
Trusted systems4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(書目-電子資源)
Security protocols XX20th international workshop, Cambridge, UK, April 12-13, 2012 : revised selected papers /
by:
(書目-電子資源)
Information theoretic security7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(書目-電子資源)
Transactions on data hiding and multimedia security IXSpecial Issue on Visual Cryptography /
by:
(書目-電子資源)
Secure data management10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013 : proceedings /
by:
(書目-電子資源)
Healthcare information privacy and securityregulatory compliance and data security in the age of electronic health records /
by:
(書目-電子資源)
Fast software encryption20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : revised selected papers /
by:
(書目-電子資源)
Privacy in statistical databasesUNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014 : proceedings /
by:
(書目-語言資料,印刷品)
Post-quantum cryptography6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014 : proceedings /
by:
(書目-語言資料,印刷品)
Security and trust management10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014 : proceedings /
by:
(書目-語言資料,印刷品)
Cryptographic hardware and embedded systems - CHES 201416th International Workshop, Busan, South Korea, September 23-26, 2014 : proceedings /
by:
(書目-語言資料,印刷品)
Advances in digital forensics X10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014 : revised selected papers /
by:
(書目-語言資料,印刷品)
Secure IT systems19th Nordic Conference, NordSec 2014, Tromso, Norway, October 15-17, 2014 : proceedings /
by:
(書目-電子資源)
Network and system security8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014 : proceedings /
by:
(書目-電子資源)
Security protocols XXII22nd International Workshop, Cambridge, UK, March 19-21, 2014 : revised selected papers /
by:
(書目-電子資源)
Provable security8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014 : proceedings /
by:
(書目-電子資源)
10 don'ts on our digital devicesthe non-techie's survival guide to cyber security and privacy /
by:
(書目-電子資源)
Information security17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings /
by:
(書目-電子資源)
Information systems security10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings /
by:
(書目-電子資源)
Security standardisation researchfirst International Conference, SSR 2014, London, UK, December 16-17, 2014 : proceedings /
by:
(書目-電子資源)
The manager's guide to web application securitya concise guide to the weaker side of the web /
by:
(書目-電子資源)
A practical guide to TPM 2.0using the new Trusted Platform Module in the new age of security /
by:
(書目-電子資源)
Engineering secure software and systems7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015 : proceedings /
by:
(書目-電子資源)
Information theoretic security8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015 : proceedings /
by:
(書目-電子資源)
Fast software encryption21st International Workshop, FSE 2014, London, UK, March 3-5, 2014 : revised selected papers /
by:
(書目-電子資源)
Enterprise cybersecurityhow to build a successful cyberdefense program against advanced threats /
by:
(書目-電子資源)
E-Voting and identity5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015 : proceedings /
by:
(書目-電子資源)
Trust and trustworthy computing8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015 : proceedings /
by:
(書目-電子資源)
Fast software encryption22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015 : revised selected papers /
by:
(書目-電子資源)
Cyber denial, deception and counter deceptiona framework for supporting active cyber defense /
by:
(書目-電子資源)
Algebraic informatics6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015 : proceedings /
by:
(書目-電子資源)
Security and trust management11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015 : proceedings /
by:
(書目-電子資源)
Network and system security9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(書目-電子資源)
Provable security9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(書目-電子資源)
Security protocols XXIII23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(書目-電子資源)
Secure IT systems20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(書目-電子資源)
Information systems security11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings /
by:
(書目-電子資源)
Security standardisation researchsecond International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015 : proceedings /
by:
(書目-電子資源)
Cryptography and coding15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(書目-電子資源)
Trusted systems6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers /
by:
(書目-電子資源)
Theory of cryptography13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.Part I /
by:
(書目-電子資源)
Theory of cryptography13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.Part II /
by:
(書目-電子資源)
Post-quantum cryptography7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016 : proceedings /
by:
(書目-電子資源)
Engineering secure software and systems8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016 : proceedings /
by:
(書目-電子資源)
The new codebreakersessays dedicated to David Kahn on the occasion of his 85th birthday /
by:
(書目-電子資源)
Cyber-physical attack recovery proceduresa step-by-step preparation and response guide /
by:
(書目-電子資源)
Preserving privacy against side-channel leaksfrom data publishing to web applications /
by:
(書目-電子資源)
Foundations of security analysis and design VIIIFOSAD 2014/2015/2016 tutorial lectures /
by:
(書目-電子資源)
Trust and trustworthy computing9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016 : proceedings /
by:
(書目-電子資源)
Information security19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016 : proceedings /
by:
(書目-電子資源)
Network and system security10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings /
by:
(書目-電子資源)
Secure IT systems21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016 : proceedings /
by:
(書目-電子資源)
Cryptology and network security15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(書目-電子資源)
Information systems security12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings /
by:
(書目-電子資源)
On privacy-preserving protocols for smart metering systemssecurity and privacy in smart grids /
by:
(書目-電子資源)
Transactions on large-scale data- and knowledge-centered systems XXXIspecial issue on data and security engineering /
by:
(書目-電子資源)
Electronic votingfirst International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016 : proceedings /
by:
(書目-電子資源)
Post-Quantum cryptography8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017 : proceedings /
by:
(書目-電子資源)
Engineering secure software and systems9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings /
by:
(書目-電子資源)
Security protocols XXIV24th International Workshop, Brno, Czech Republic, April 7-8, 2016 : revised selected papers /
by:
(書目-電子資源)
Data analytics and decision support for cybersecuritytrends, methodologies and applications /
by:
(書目-電子資源)
Provable security11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings /
by:
(書目-電子資源)
Electronic votingsecond International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017 : proceedings /
by:
(書目-電子資源)
Cyberspace safety and security9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2017 : proceedings /
by:
(書目-電子資源)
Ubiquitous networkingthird International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017 : revised selected papers /
by:
(書目-電子資源)
Secure IT systems22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017 : proceedings /
by:
(書目-電子資源)
Theory of cryptography15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017 : proceedings.Part I /
by:
(書目-電子資源)
Security protocols XXV25th International Workshop, Cambridge, UK, March 20-22, 2017 : revised selected papers /
by:
(書目-電子資源)
Algebraic geometry for coding theory and cryptographyIPAM, Los Angeles, CA, February 2016 /
by:
(書目-電子資源)
Proceedings of the 2nd Workshop on Communication Securitycryptography and physical layer security /
by:
(書目-電子資源)
Enterprise cybersecurity study guidehow to build a successful cyberdefense program against advanced threats /
by:
(書目-電子資源)
Future network systems and security4th International Conference, FNSS 2018, Paris, France, July 9-11, 2018 : proceedings /
by:
(書目-電子資源)
Towards autonomous robotic systems19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018 : proceedings /
by:
(書目-電子資源)
Electronic votingthird International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018 : proceedings /
by:
(書目-電子資源)
Frontiers in cyber securityfirst International Conference, FCS 2018, Chengdu, China, November 5-7, 2018 : proceedings /
by:
(書目-電子資源)
Provable security12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018 : proceedings /
by:
(書目-電子資源)
更多
較少的
主題