Data Encryption.
Overview
Works: | 919 works in 558 publications in 558 languages |
---|
Titles
Public Key Cryptography - PKC 2008 :11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings /
by:
(Electronic resources)
Theory of Cryptography :Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings /
by:
(Electronic resources)
Information Security Practice and Experience4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings /
by:
(Electronic resources)
Advances in cryptology -- EUROCRYPT 200827th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008 : proceedings /
by:
(Electronic resources)
Certification and Security in Inter-Organizational E-ServicesIFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France /
by:
(Electronic resources)
Information Security Applications (vol. # 3786)6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers /
by:
(Electronic resources)
Topics in Cryptology -- CT-RSA 2006The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings /
by:
(Electronic resources)
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings /
by:
(Electronic resources)
Recent Advances in Intrusion Detection (vol. # 3858)8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers /
by:
(Electronic resources)
Formal Aspects in Security and Trust (vol. # 3866)Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers /
by:
(Electronic resources)
Theory of Cryptography (vol. # 3876)Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings /
by:
(Electronic resources)
Theoretical Computer Science (vol. # 3895)Essays in Memory of Shimon Even /
by:
(Electronic resources)
Information Security Practice and Experience (vol. # 3903)Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings /
by:
(Electronic resources)
Selected Areas in Cryptography (vol. # 3897)12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers /
by:
(Electronic resources)
Smart Card Research and Advanced Applications7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings /
by:
(Electronic resources)
Information Security and Cryptology - ICISC 20058th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers /
by:
(Electronic resources)
Public Key Cryptography - PKC 20069th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings /
by:
(Electronic resources)
Advances in Cryptology - EUROCRYPT 200625th International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings /
by:
(Electronic resources)
Emerging Trends in Information and Communication SecurityInternational Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings /
by:
(Electronic resources)
Applied Cryptography and Network Security (vol. # 3989)4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings /
by:
(Electronic resources)
Privacy Enhancing Technologies (vol. # 3856)5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers /
by:
(Electronic resources)
Public Key Infrastructure (vol. # 4043)Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings /
by:
(Electronic resources)
Information Security and Privacy (vol. # 4058)11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings /
by:
(Electronic resources)
Coding and CryptographyInternational Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005, Revised Selected Papers /
by:
(Electronic resources)
Detection of Intrusions and Malware, and Vulnerability AssessmentThird International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings /
by:
(Electronic resources)
Algorithmic Number Theory7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006, Proceedings /
by:
(Electronic resources)
Fast Software Encryption (vol. # 4047)13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers /
by:
(Electronic resources)
Secure Mobile Ad-hoc Networks and SensorsFirst International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers /
by:
(Electronic resources)
Data and Applications Security XX20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings /
by:
(Electronic resources)
Emerging Directions in Embedded and Ubiquitous ComputingEUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings /
by:
(Electronic resources)
Advances in Cryptology - CRYPTO 200626th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings /
by:
(Electronic resources)
Trust and Privacy in Digital BusinessThird International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings /
by:
(Electronic resources)
Security and Cryptography for Networks5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings /
by:
(Electronic resources)
Information Security (vol. # 4176)9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings /
by:
(Electronic resources)
Autonomic and Trusted ComputingThird International Conference, ATC 2006, Wuhan, China, September 3-6, 2006 /
by:
(Electronic resources)
Secure Data Management (vol. # 4165)Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings /
by:
(Electronic resources)
Recent Advances in Intrusion Detection (vol. # 4219)9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings /
by:
(Electronic resources)
Security Protocols (vol. # 3957)12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers /
by:
(Electronic resources)
Sequences and Their Applications u SETA 20064th International Conference, Beijing, China, September 24-28, 2006, Proceedings /
by:
(Electronic resources)
Computer Security u ESORICS 200611th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings /
by:
(Electronic resources)
Fault Diagnosis and Tolerance in CryptographyThird International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings /
by:
(Electronic resources)
Financial Cryptography and Data Security (vol. # 4107)10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers /
by:
(Electronic resources)
Cryptographic Hardware and Embedded Systems - CHES 20068th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings /
by:
(Electronic resources)
Advances in Information and Computer SecurityFirst International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings /
by:
(Electronic resources)
Communications and Multimedia Security (vol. # 4237)10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings /
by:
(Electronic resources)
Digital Watermarking (vol. # 4283)5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings /
by:
(Electronic resources)
Information Security and Cryptology - ICISC 20069th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings /
by:
(Electronic resources)
Cryptology and Network Security (vol. # 4301)5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings /
by:
(Electronic resources)
Advances in Cryptology -- ASIACRYPT 200612th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings /
by:
(Electronic resources)
Information and Communications Security (vol. # 4307)8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings /
by:
(Electronic resources)
Information Security and Cryptology (vol. # 4318)Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings /
by:
(Electronic resources)
Progress in Cryptology - INDOCRYPT 20067th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings /
by:
(Electronic resources)
Mobile Ad-hoc and Sensor Networks (vol. # 4325)Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings /
by:
(Electronic resources)
Privacy Enhancing Technologies (vol. # 4258)6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers /
by:
(Electronic resources)
Progress in Cryptology - VIETCRYPT 2006First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers /
by:
(Electronic resources)
Information Systems Security (vol. # 4332)Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings /
by:
(Electronic resources)
Critical Information Infrastructured SecurityFirst International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006 /
by:
(Electronic resources)
Security and Privacy in Ad-hoc and Sensor Networks (vol. # 4357)Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers /
by:
(Electronic resources)
Topics in Cryptology ? CT-RSA 2007The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings /
by:
(Electronic resources)
Autonomic and Trusted Computing5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings /
by:
(Electronic resources)
Public Key Infrastructure5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings /
by:
(Electronic resources)
Information Security and Privacy13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings /
by:
(Electronic resources)
Global E-Security4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings /
by:
(Electronic resources)
Information Security Applications5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers /
by:
(Electronic resources)
Security in Communication Networks4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers /
by:
(Electronic resources)
Security in Ad-hoc and Sensor NetworksFirst European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers /
by:
(Electronic resources)
Topics in Cryptology -- CT-RSA 2005The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings /
by:
(Electronic resources)
Public Key Cryptography - PKC 20058th International Workshop on Theory and Practice in Public Key Cryptography /
by:
(Electronic resources)
Theory of CryptographySecond Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings /
by:
(Electronic resources)
Digital WatermarkingThird International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers /
by:
(Electronic resources)
Information Security Practice and ExperienceFirst International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings /
by:
(Electronic resources)
Advances in Cryptology - EUROCRYPT 200524th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings /
by:
(Electronic resources)
Sequences and Their Applications - SETA 2004Third International Conference, Seoul, Korea, October 24-28, 2004, Revised Selected Papers /
by:
(Electronic resources)
Privacy Enhancing Technologies4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers /
by:
(Electronic resources)
Applied Cryptography and Network SecurityThird International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings /
by:
(Electronic resources)
Information Security and Cryptology - ICISC 20047th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers /
by:
(Electronic resources)
Fast Software Encryption12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers /
by:
(Electronic resources)
Information Security and Privacy10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings /
by:
(Electronic resources)
Advanced Encryption Standard - AES4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers /
by:
(Electronic resources)
Intrusion and Malware Detection and Vulnerability AssessmentSecond International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings /
by:
(Electronic resources)
Financial Cryptography and Data Security9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 - March 3, 2005, Revised Papers /
by:
(Electronic resources)
Public Key InfrastructureSecond European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30- July 1, 2005, Revised Selected Papers /
by:
(Electronic resources)
Advances in Cryptology - CRYPTO 200525th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings /
by:
(Electronic resources)
Data and Applications Security XIX19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings /
by:
(Electronic resources)
Trust, Privacy, and Security in Digital BusinessSecond International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings /
by:
(Electronic resources)
Security Protocols11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers /
by:
(Electronic resources)
Cryptographic Hardware and Embedded Systems - CHES 20057th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings /
by:
(Electronic resources)
Digital Watermarking :4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings
by:
(Electronic resources)
Communications and Multimedia Security :9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings
by:
(Electronic resources)
Secure Data Management :Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings
by:
(Electronic resources)
Progress in Cryptology - Mycrypt 2005 :First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings
by:
(Electronic resources)
Foundations of Security Analysis and Design III :FOSAD 2004/2005 Tutorial Lectures
by:
(Electronic resources)
Computer Security - ESORICS 2005 :10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings
by:
(Electronic resources)
Information Security :8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings
by:
(Electronic resources)
Information Hiding :7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers
by:
(Electronic resources)
Computer Network Security :Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings
by:
(Electronic resources)
Cryptography and Coding :10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings
by:
(Electronic resources)
Advances in Cryptology - ASIACRYPT 2005 :11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings
by:
(Electronic resources)
Information Systems Security :First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
by:
(Electronic resources)
Embedded and Ubiquitous Computing - EUC 2005 Workshops :EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 8-9, 2005
by:
(Electronic resources)
Progress in Cryptology - INDOCRYPT 2005 :6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings
by:
(Electronic resources)
Cryptology and Network Security :4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings
by:
(Electronic resources)
Information Security and Cryptology :First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
by:
(Electronic resources)
Mobile Ad-hoc and Sensor Networks :First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings
by:
(Electronic resources)
Security and Privacy in Ad-hoc and Sensor Networks :Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers
by:
(Electronic resources)
Information and Communications Security :7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings
by:
(Electronic resources)
Arithmetic of Finite Fields2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings /
by:
(Electronic resources)
Detection of Intrusions and Malware, and Vulnerability Assessment5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings /
by:
(Electronic resources)
Data and Applications Security XXII22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings /
by:
(Electronic resources)
Privacy Enhancing Technologies8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings /
by:
(Electronic resources)
Fast Software Encryption15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers /
by:
(Electronic resources)
Trusted Computing - Challenges and ApplicationsFirst International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings /
by:
(Electronic resources)
Information Security and CryptologyThird SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers /
by:
(Electronic resources)
Cryptographic Hardware and Embedded Systems -- CHES 200810th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings /
by:
(Electronic resources)
Information Theoretic SecurityThird International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings /
by:
(Electronic resources)
Advances in Cryptology -- CRYPTO 200828th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings /
by:
(Electronic resources)
Financial Cryptography and Data Security12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers /
by:
(Electronic resources)
Secure Data Management5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings /
by:
(Electronic resources)
Pairing-Based Cryptography -- Pairing 2008Second International Conference, Egham, UK, September 1-3, 2008. Proceedings /
by:
(Electronic resources)
Trust, Privacy and Security in Digital Business5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings /
by:
(Electronic resources)
Security and Cryptography for Networks6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings /
by:
(Electronic resources)
Coding Theory and ApplicationsSecond International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings /
by:
(Electronic resources)
Information Security11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings /
by:
(Language materials, printed)
Smart card research and advanced applications8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings /
by:
(Language materials, printed)
Sequences and Their Applications - SETA 20085th International Conference Lexington, KY, USA, September 14-18, 2008 Proceedings /
by:
(Language materials, printed)
IP operations and management8th IEEE international workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008 : proceedings /
by:
(Language materials, printed)
Recent advances in intrusion detection11th international symposium, RAID 2008 : Cambridge, MA, USA September 15-17 2008 : proceedings /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 200814th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings /
by:
(Language materials, printed)
Cryptology and network security7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008, proceedings /
by:
(Language materials, printed)
Progress in cryptology - INDOCRYPT 20089th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008, proceedings /
by:
(Language materials, printed)
Information systems security4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings /
by:
(Language materials, printed)
Mathematical methods in computer scienceessays in memory of Thomas Beth /
by:
(Language materials, printed)
Digital watermarking6th international workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 proceedings /
by:
(Language materials, printed)
Information security applications9th international workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, revised selected papers /
by:
(Electronic resources)
Theory of cryptography6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings /
by:
(Electronic resources)
Trusted computingsecond international conference, Trust 2009, Oxford, UK, April 6-8, 2009 ; Proceedings /
by:
(Electronic resources)
Engineering secure software and systemsFirst international symposium, ESSoS 2009, Leuven, Belgium, February 4-6, 2009, proceedings /
by:
(Electronic resources)
Public Key Cryptography - PKC 200912th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings /
by:
(Electronic resources)
Information security and cryptology - ICISC 200811th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers /
by:
(Electronic resources)
Information systems, technology and managementThird International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings /
by:
(Electronic resources)
Information security practice and experience5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 ; proceedings /
by:
(Electronic resources)
Topics in cryptology--CT-RSA 2009the Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009 ; proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 200928th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 : proceedings /
by:
(Electronic resources)
Information Security and Cryptology4th international conference, Inscrypt 2008, Beijing, China, December 14-17, 2008 ; revised selected papers /
by:
(Electronic resources)
Formal aspects in security and trust5th international workshop, FAST 2008, Malaga, Spain, October 9-10, 2008 ; revised selected papers /
by:
(Electronic resources)
Applied cryptography and network security7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 ; proceedings /
by:
(Electronic resources)
Formal to practical securitypapers issued from the 2005 - 2008 French Japanese collaboration /
by:
(Electronic resources)
Emerging challenges for security, privacy and trust24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings /
by:
(Electronic resources)
Forensics in Telecommunications, Information and MultimediaSecond International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers /
by:
(Electronic resources)
Trust Management IIIThird IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings /
by:
(Electronic resources)
Advances in information security and its applicationthird international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 ; proceedings /
by:
(Electronic resources)
Coding and cryptologysecond international workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009 : proceedings /
by:
(Electronic resources)
Applied algebra, algebraic algorithms and error-correcting codes18th international symposium, AAECC-18, Tarragona, Spain, June 8-12, 2009 : proceedings /
by:
(Electronic resources)
Progress in cryptology - AFRICACRYPT 2009Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21 - 25, 2009 : Proceedings /
by:
(Electronic resources)
Advances in information security and assurancethird international conference and workshops, ISA 2009, Seoul, Korea, June 25-27, 2009 ; proceedings /
by:
(Electronic resources)
Information security and privacy14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009 : proceedings /
by:
(Electronic resources)
Autonomic and trusted computing6th international conference, ATC 2009, Brisbane, Australia, July 7-9, 2009 ; proceedings /
by:
(Electronic resources)
Detection of intrusions and malware, and vulnerability assessment6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings /
by:
(Electronic resources)
The future of identity in the information society4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008 : Revised Selected Papers /
by:
(Electronic resources)
Data and applications security XXIII23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 : proceedings /
by:
(Electronic resources)
Privacy enhancing technologies9th international symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009 : proceedings /
by:
(Electronic resources)
Fast Software Encryption16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers /
by:
(Electronic resources)
Financial cryptography and data security13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009 : revised selected papers /
by:
(Electronic resources)
Global security, safety, and sustainability5th international conference, ICGS3 2009, London, UK, September 1-2, 2009 : proceedings /
by:
(Electronic resources)
Personal Satellite ServicesInternational Conference, PSATS 2009, Rome, Italy, March 18-19, 2009 : revised selected papers /
by:
(Electronic resources)
Pairing-based cryptography - Pairing 2009Third International Conference Palo Alto, CA, USA, August 12-14, 2009 : Proceedings /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 200929th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009 : Proceedings /
by:
(Electronic resources)
Digital watermarking8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings /
by:
(Electronic resources)
Trust, privacy and security in digital business6th international conference, TrustBus 2009, Linz, Austria, September 3-4, 2009 : proceedings /
by:
(Electronic resources)
Foundations of security analysis and design VFOSAD 2007/2008/2009 tutorial lectures /
by:
(Electronic resources)
Selected Areas in Cryptography15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, revised selected papers /
by:
(Electronic resources)
Wireless and mobile networkingSecond IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009 : proceedings /
by:
(Electronic resources)
Security and privacy in mobile information and communication systemsFirst International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009 : revised selected papers /
by:
(Electronic resources)
Foundations and applications of security analysisJoint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009 : revised selected papers /
by:
(Electronic resources)
Information security theory and practicesmart devices, pervasive systems, and ubiquitous networks ; third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 ; proceedings /
by:
(Electronic resources)
E-voting and identitysecond international conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 200911th international workshop, Lausanne, Switzerland, September 6-9, 2009 : proceedings /
by:
(Electronic resources)
Smart spaces and next generation wired/wireless networking9th international conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009 : proceedings /
by:
(Electronic resources)
Secure data management6th VLDB workshop, SDM 2009, Lyon, France, August 28, 2009 : proceedings /
by:
(Electronic resources)
Ad-hoc, mobile, and wireless networks8th international conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009 : proceedings /
by:
(Electronic resources)
Information hiding11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers /
by:
(Electronic resources)
Computer security - ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009 : proceedings /
by:
(Electronic resources)
Information security12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 : proceedings /
by:
(Electronic resources)
Recent advances in intrusion detection12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 : proceedings /
by:
(Electronic resources)
Digital watermarking7th international workshop, IWDW 2008, Busan, Korea, November 10-12, 2008 : selected papers /
by:
(Electronic resources)
Identity and privacy in the internet age14th Nordic Conference on Secure It Systems, Nordsec 2009, Oslo, Norway, 14-16 October 2009 : proceedings /
by:
(Electronic resources)
Safety and security in multiagen systemsresearch results from 2004-2006 /
by:
(Electronic resources)
Security protocols14th international workshop, Cambridge, UK, March 27-29 2006 : revised selected papers /
by:
(Electronic resources)
Software and data technologiesThird International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008 : revised selected papers /
by:
(Electronic resources)
Security and Privacy in Communication Networks5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009 : revised selected papers /
by:
(Electronic resources)
Provable securitythird international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings /
by:
(Electronic resources)
Selected Areas in Cryptography16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers /
by:
(Electronic resources)
Information theoretic securitysecond international conference, ICITS 2007, Madrid, Spain, May 25-29, 2007 : revised selected papers /
by:
(Electronic resources)
Protecting persons while protecting the peoplesecond annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 200915th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings /
by:
(Electronic resources)
Cryptology and Network Security8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings /
by:
(Electronic resources)
Future generation information technologyfirst international conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 : proceedings /
by:
(Electronic resources)
Information systems security5th international conference, ICISS 2009, Kolkata, India, December 14-18, 2009 : proceedings /
by:
(Electronic resources)
Cryptography and coding12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 : proceedings /
by:
(Electronic resources)
E-business and telecommunicationsinternational conference, ICETE 2008, Porto, Portugal, July 26 - 29, 2008 : revised selected papers /
by:
(Electronic resources)
iNetSec 2009 - Open Research Problems in Network SecurityIFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009 : revised selected papers /
by:
(Electronic resources)
Advances in security technologyInternational Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008 : revised selected papers /
by:
(Electronic resources)
Security TechnologyInternational Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 200910th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009 : proceedings /
by:
(Electronic resources)
Information security applications10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers /
by:
(Electronic resources)
Information and communications security11th international conference, ICICS 2009, Beijing, China, December 14-17, 2009 : proceedings /
by:
(Electronic resources)
Security in emerging wireless communication and networking systemsFirst International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009 : revised selected papers /
by:
(Electronic resources)
Information security and digital forensicsFirst International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009 : revised selected papers /
by:
(Electronic resources)
Quantum communication and quantum networkingFirst International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systemssecond international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 : proceedings /
by:
(Electronic resources)
Data privacy management and autonomous spontaneous security4th international workshop, DPM 2009, and second international workshop, SETOP 2009, St. Malo, France, September 24-25, 2009 : revised selected papers /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2010the Cryptographers' track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010 : proceedings /
by:
(Electronic resources)
Post-quantum cryptographythird international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 : proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 201029th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 : proceedings /
by:
(Electronic resources)
Communications and multimedia security11th IFIP TC 6/TC ; 11 international conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010 : proceedings /
by:
(Electronic resources)
Architecting critical systemsfirst international symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 : proceedings /
by:
(Electronic resources)
Intelligence and security informaticsPacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security8th international conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings /
by:
(Electronic resources)
Arithmetic of finite fieldsthird international workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings /
by:
(Electronic resources)
Fast software encryption17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 : revised selected papers /
by:
(Electronic resources)
Trust and trustworthy computingthird international conference, TRUST 2010, Berlin, Germany, June 21-23, 2010 : proceedings /
by:
(Electronic resources)
Networked services and applications - engineering, control and management16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010 : proceedings /
by:
(Electronic resources)
Information, Security and Cryptology - ICISC 200912th International Conference, Seoul, Korea, December 2-4, 2009 : revised selected papers /
by:
(Electronic resources)
Trust Management IV4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010 : proceedings /
by:
(Electronic resources)
Privacy and identity management for life5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers /
by:
(Electronic resources)
Critical information infrastructures securitysecond international workshop, CRITIS 2007, Malaga, Spain, October 3-5, 2007 : revised papers /
by:
(Electronic resources)
Information systems, technology and management4th international conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010 : proceedings /
by:
(Electronic resources)
Trusted systemsFirst International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009 : revised selected papers /
by:
(Electronic resources)
Privacy enhancing technologies10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010 : revised selected papers /
by:
(Electronic resources)
Critical information infrastructures security4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 : revised papers /
by:
(Electronic resources)
Algorithmic number theory9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010 : proceedings /
by:
(Electronic resources)
Detection of intrusions and malware, and vulnerability assessment7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 : proceedings /
by:
(Electronic resources)
Public key cryptography - PKC 201013th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings /
by:
(Electronic resources)
NETWORKING 20109th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010 : proceedings /
by:
(Electronic resources)
Information security, practice and experience6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010 : proceedings /
by:
(Electronic resources)
Progress in cryptology, AFRICACRYPT 2010Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010 : proceedings /
by:
(Electronic resources)
Ethics and policy of biometricsThird International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010 : revised papers /
by:
(Electronic resources)
Formal aspects in security and trust6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009 revised selected papers /
by:
(Electronic resources)
Smart card research and advanced application9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proceedings /
by:
(Electronic resources)
Information security theory and practicessecurity and privacy of pervasive systems and smart devices : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010 : proceedings /
by:
(Electronic resources)
Distributed computing and networking11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010 : proceedings /
by:
(Electronic resources)
Theory of cryptography7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 201030th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXIV24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, proceedings /
by:
(Electronic resources)
Progress in cryptology - LATINCRYPT 2010First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedings /
by:
(Electronic resources)
Financial cryptography and data securityFC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, revised selected papers /
by:
(Electronic resources)
E-government, e-services and global processesJoint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010, proceedings /
by:
(Electronic resources)
Security and privacy - silver linings in the cloud25th IFIP TC-11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010, proceedings /
by:
(Electronic resources)
Recent trends in network security and applicationsthird International Conference, CNSA 2010, Chennai, India, July 23-25, 2010, proceedings /
by:
(Electronic resources)
Secure data management7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, proceedings /
by:
(Electronic resources)
Computer security - ESORICS 201015th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, proceedings /
by:
(Electronic resources)
Trustworthly global computing5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, revised selected papers /
by:
(Electronic resources)
Sequences and their applications - SETA 20106th International Conference, Paris, France, September 13-17, 2010, proceedings /
by:
(Electronic resources)
Information theoretic security4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, revised selected papers /
by:
(Electronic resources)
Information security and privacy15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, proceedings /
by:
(Electronic resources)
Trust, privacy and security in digital business7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, proceedings /
by:
(Electronic resources)
Recent advances in intrusion detection13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, proceedings /
by:
(Electronic resources)
Multiple access communicationsThird International Workshop, MACOM 2010, Barcelona, Spain, September 13-14, 2010, proceedings /
by:
(Electronic resources)
Security and cryptography for networks7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, proceedings /
by:
(Electronic resources)
Information security and assurance4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, proceedings /
by:
(Electronic resources)
Global security, safety, and sustainability6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, proceedings /
by:
(Electronic resources)
Provable security4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings /
by:
(Electronic resources)
Autonomic and trusted computing7th international conference, ATC 2010, Xi'an, China, October 26-29, 2010 : proceedings /
by:
(Electronic resources)
Radio frequency identificationsecurity and privacy issues : 6th international workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010 : revised selected papers /
by:
(Electronic resources)
Information hiding12th international conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010 : revised selected papers /
by:
(Electronic resources)
Public key infrastructures, services and applications6th European workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009 : revised selected papers /
by:
(Electronic resources)
Collaborative networks for a sustainable world11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010 : proceedings /
by:
(Electronic resources)
Advances in information technology4th international conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010 : proceedings /
by:
(Electronic resources)
Decision and game theory for securityFirst International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010, proceedings /
by:
(Electronic resources)
Advances in Information and computer security5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, proceedings /
by:
(Electronic resources)
Pairing-based cryptography - Pairing 20104th international conference, Yamanaka Hot Spring, Japan, December 2010, proceedings /
by:
(Electronic resources)
Cryptology and network security9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, proceedings /
by:
(Electronic resources)
Advances in digital forensics VISixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, revised selected papers /
by:
(Electronic resources)
Web application securityIberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009, revised selected papers /
by:
(Electronic resources)
Communication and networkingInternational Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010, proceedings.Part I /
by:
(Electronic resources)
Ad hoc networksSecond International Conference, ADHOCNETS 2010, Victoria, BC, Canada, August 18-20, 2010, revised selected papers /
by:
(Electronic resources)
Security and privacy in communication networks6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, proceedings /
by:
(Electronic resources)
Security and privacy in mobile information and communication systemsSecond International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, revised selected papers /
by:
(Electronic resources)
Personal satellite servicessecond international ICST confernce, PSATS 2010, Rome, Italy, February 2010 : revised selected papers /
by:
(Electronic resources)
Security protocols15th international workshop, Brno, Czech Republic, April 18-20, 2007 : revised selected papers /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 201011th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010 : proceedings /
by:
(Electronic resources)
Information and communications security12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 : proceedings /
by:
(Electronic resources)
Transactions on computational science Xspecial issue on security in computing, part I /
by:
(Electronic resources)
Transactions on computational science XIspecial issue on security in computing, part II /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201016th international conference on the theory and application of cryptology and information security, Singapore, December 5-9, 2010 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 201012th international workshop, Santa Barbara, USA, August 17-20, 2010 : proceedings /
by:
(Electronic resources)
Digital watermarking9th international workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 : revised selected papers /
by:
(Electronic resources)
Information security13th international conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systemsthird International symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011 : proceedings /
by:
(Electronic resources)
Information security applications11th international workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010 : revised selected papers /
by:
(Electronic resources)
Topics in cryptologyCT-RSA 2011 : the cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14-18, 2011 : proceedings /
by:
(Electronic resources)
Open research problems in network securityIFIP WG 11.4 international workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010 : revised selected papers /
by:
(Electronic resources)
Data privacy management and autonomous spontaneous security5th international workshop, DPM 2010 and 3rd international workshop, SETOP 2010, Athens, Greece, September 23, 2010 : revised selected papers /
by:
(Electronic resources)
Formal aspects of security and trust7th international workshop, FAST 2010, Pisa, Italy, September 16-17, 2010 : revised selected papers /
by:
(Electronic resources)
Public key cryptographyPKC 2011 : 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6-9, 2011 : proceedings /
by:
(Electronic resources)
Selected areas in cryptography17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010 : revised selected papers /
by:
(Electronic resources)
Theory of cryptography8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011 : proceedings /
by:
(Electronic resources)
e-Business and telecommunications6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009 : revised selected papers /
by:
(Electronic resources)
Voice over IP securitya comprehensive survey of vulnerabilities and academic research /
by:
(Electronic resources)
NETWORKING 201110th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011 : proceedings.Part II /
by:
(Electronic resources)
NETWORKING 201110th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011 : proceedings.Part I /
by:
(Electronic resources)
Information and automationinternational symposium, ISIA 2010, Guangzhou, China, November 10-11, 2010 : revised selected papers /
by:
(Electronic resources)
Privacy and identity management for life6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 201130th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011 : proceedings /
by:
(Electronic resources)
Information theoretic security5th international conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011 : proceedings /
by:
(Electronic resources)
Information security practice and experience7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 : proceedings /
by:
(Electronic resources)
Information security theory and practicesecurity and privacy of mobile devices in wireless communication : 5th IFIP WG 11.2 international workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011 : proceedings /
by:
(Electronic resources)
Coding and cryptologythird international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security9th international conference, ACNS 2011, Nerja, Spain, June 7-10, 2011 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing4th international conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011 : proceedings /
by:
(Electronic resources)
Fast software encryption18th international workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011 : revised selected papers /
by:
(Electronic resources)
Detection of intrusions and malware, and vulnerability assessment8th international conference, DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011 : proceedings /
by:
(Electronic resources)
Progress in cryptologyAFRICACRYP T 2011 : 4th international conference on cryptology in Africa, Dakar, Senegal, July 5-7, 2011 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXV25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011 : proceedings /
by:
(Electronic resources)
Future challenges in security and privacy for academia and industry26th IFIP TC 11 international information security conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011 : proceedings /
by:
(Electronic resources)
Trust management V5th IFIP WG 11.11 international conference, IFIPTM 2011, Copenhagen, Denmark, June 29 - July 1, 2011 : proceedings /
by:
(Electronic resources)
Secure and trust computing, data management and applications8th FIRA international conference, STA 2011, Loutraki, Greece, June 28-30, 2011 : proceedings /
by:
(Electronic resources)
Pro PHP securityfrom application security principles to the implementation of XSS defenses /
by:
(Electronic resources)
Privacy enhancing technologies11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27-29 2011 : proceedings /
by:
(Electronic resources)
Studies in complexity and cryptographymiscellanea on the interplay between randomness and computation /
by:
(Electronic resources)
Security protocols XVI16th international workshop, Cambridge, UK, April 16-18, 2008 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology6th international conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010 : revised selected papers /
by:
(Electronic resources)
Information Security and Privacy16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011 : proceedings /
by:
(Electronic resources)
Advances in network security and applications4th international conference, CNSA 2011, Chennai, India, July 15-17, 2011 /
by:
(Electronic resources)
Information security and assuranceinternational conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011 : proceedings /
by:
(Electronic resources)
NETWORKING 2011 workshopsInternational IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, Valencia, Spain, May 13, 2011 : revised selected papers /
by:
(Electronic resources)
Autonomic and trusted computing8th international conference, ATC 2011, Banff, Canada, September 2-4, 2011 : proceedings /
by:
(Electronic resources)
Secure data management8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011 : proceedings /
by:
(Electronic resources)
Advances in cryptologyCRYPTO 2011 : 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011 : proceedings /
by:
(Electronic resources)
Trust, privacy and security in digital business8th international conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011 : proceedings /
by:
(Electronic resources)
Smart spaces and next generation wired/wireless networking11th international conference, NEW2AN 2011, and 4th Conference on Smart Spaces, ruSMART 2011, St. Petersburg, Russia, August 22-25, 2011 : proceedings /
by:
(Electronic resources)
Information security and cryptologyICISC 2010 : 13th international conference, Seoul, Korea, December 1-3, 2010 : revised selected papers /
by:
(Electronic resources)
Data warehousing and knowledge discovery13th international conference, DaWaK 2011, Toulouse, France, August/September 2011 : proceedings /
by:
(Electronic resources)
Public key infrastructures, services and applications7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010 : revised selected papers /
by:
(Electronic resources)
Availability, reliability and security for business, enterprise and health information systemsIFIP WG 8.4/8.9 international cross domain conference and workshop, ARES 2011, Vienna, Austria, August 22-26, 2011 : proceedings /
by:
(Electronic resources)
Provable security5th international conference, ProvSec 2011, Xi'an, China, October 16-18, 2011 : proceedings /
by:
(Electronic resources)
Communications and multimedia security12th IFIP TC 6 / TC 11 international conference, CMS 2011, Ghent, Belgium, October 19-21,2011 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systemsCHES 2011 : 13th international workshop, Nara, Japan, September 28 - October 1, 2011 : proceedings /
by:
(Electronic resources)
Information hiding13th international conference, IH 2011, Prague, Czech Republic, May 18-20, 2011 : revised selected papers /
by:
(Electronic resources)
Computer securityESORICS 2011 : 16th European symposium on research in computer security, Leuven, Belgium, September 12-14,2011 : proceedings /
by:
(Electronic resources)
Multiple access communications4th international workshop, MACOM 2011, Trento, Italy, September 12-13, 2011 : proceedings /
by:
(Electronic resources)
Advances in digital forensics VII7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 -February 2, 2011 : revised selected papers /
by:
(Electronic resources)
Security and trust management6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, revised selected papers /
by:
(Electronic resources)
Advances in information and computer security6th international workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011 : proceedings /
by:
(Electronic resources)
Information security14th international conference, ISC 2011, Xi'an, China, October 26-29, 2011 : proceedings /
by:
(Electronic resources)
Security aspects in information technologyfirst international conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011 : proceedings /
by:
(Electronic resources)
Critical infrastructure protection V5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, revised selected papers /
by:
(Electronic resources)
Trusted systemssecond international conference, INTRUST 2010, Beijing, China, December 13-15, 2010 : revised selected papers /
by:
(Electronic resources)
Information systems security7th international conference, ICISS 2011, Kolkata, India, December 15-19, 2011 : procedings /
by:
(Electronic resources)
Advances in cryptologyASIACRYPT 2011 : 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4-8, 2011 : proceedings /
by:
(Electronic resources)
Information and communications security13th international conference, ICICS 2011, Beijing, China, November 23-26, 2011 : proceedings /
by:
(Electronic resources)
Post-quantum cryptography4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011 : proceedings /
by:
(Electronic resources)
Cryptography and coding13th IMA international conference, IMACC 2011, Oxford, UK, December 12-15, 2011 : proceedings /
by:
(Electronic resources)
Progress in cryptologyINDOCRYPT 2011 : 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011 : proceedings /
by:
(Electronic resources)
Smart card research and advanced applications10th IFIP WG 8.8/11.2 international conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011 : revised selected papers /
by:
(Electronic resources)
Cryptology and network security10th international conference, CANS 2011, Sanya, China, December 10-12, 2011 : proceedings /
by:
(Electronic resources)
Security technologyinternational conference, SecTech 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011 : proceedings /
by:
(Electronic resources)
Expert oracle and Java Securityprogramming secure Oracle database applications with Java /
by:
(Electronic resources)
Security protocols XIX19th international workshop, Cambridge, UK, March 28-30, 2011 : revised selected papers /
by:
(Electronic resources)
Critical information infrastructures security5th international workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010 : revised papers /
by:
(Electronic resources)
Recent advances in intrusion detection14th international symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011 : proceedings /
by:
(Electronic resources)
RFID: Security and privacy7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Theory of security and applicationsJoint Workshop, TOSCA 2011, Saarbrucken, Germany, March 31 - April 1, 2011 : revised selected papers /
by:
(Electronic resources)
Foundations and practice of security4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers /
by:
(Electronic resources)
Security and intelligent information systemsInternational Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011 : revised selected papers /
by:
(Electronic resources)
Financial cryptography and data security15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011 : revised selected papers /
by:
(Electronic resources)
Open problems in network securityIFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011 : revised selected papers /
by:
(Electronic resources)
Information security applications12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011 : revised selected papers /
by:
(Electronic resources)
Topics in Cryptology - CT-RSA 2012the Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012 : proceedings /
by:
(Electronic resources)
Distributed computing and internet technology8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012 : proceedings /
by:
(Electronic resources)
Engineering secure software and systems4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012 : proceedings /
by:
(Electronic resources)
Cryptography and securityfrom theory to applications : essays dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday /
by:
(Electronic resources)
Selected areas in cryptography18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011 : revised selected papers /
by:
(Electronic resources)
Principles of security and trustfirst international conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012 : proceedings /
by:
(Electronic resources)
Data privacy management and autonomous spontaneus security6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011 : revised selected papers /
by:
(Electronic resources)
Theory of cryptography9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012 : proceedings /
by:
(Electronic resources)
Critical infrastructure protectioninformation infrastructure models, analysis, and defense /
by:
(Electronic resources)
Information security technology for applications15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 201231st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012 : proceedings /
by:
(Electronic resources)
Information security practice and experience8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012 : proceedings /
by:
(Electronic resources)
Information security technology for applications16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Constructive side-channel analysis and secure designThird International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012 : proceedings /
by:
(Electronic resources)
Security and trust management7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011 : revised selected papers /
by:
(Electronic resources)
Ad hoc networksthird International ICST Conference, ADHOCNETS 2011, Paris, France, September 21-23, 2011 : revised selected papers /
by:
(Electronic resources)
Trust management VI6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings /
by:
(Electronic resources)
Public key infrastructures, services and applications8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers /
by:
(Electronic resources)
Financial cryptography and data securityFC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28-March 4, 2011, Revised selected papers /
by:
(Electronic resources)
NETWORKING 201211th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012 : proceedings.Part I /
by:
(Electronic resources)
NETWORKING 201211th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012 : proceedings.Part II /
by:
(Electronic resources)
Public key cryptography - PKC 201215th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012 : proceedings /
by:
(Electronic resources)
Formal aspects of security and trust 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011 : revised selected papers /
by:
(Electronic resources)
Trustworthy global computing6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011 : revised selected papers /
by:
(Electronic resources)
Sequences and their applications - SETA 20127th International Conference, Waterloo, ON, Canada, June 4-8, 2012 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012 : proceedings /
by:
(Electronic resources)
Information security theory and practicesecurity, privacy and trust in computing systems and ambient intelligent ecosystems : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security10th International Conference, ACNS 2012, Singapore, June 26-29, 2012 : proceedings /
by:
(Electronic resources)
Progress in cryptology - AFRICACRYPT 20125th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXVI26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 : Proceedings /
by:
(Electronic resources)
Privacy enhancing technologies12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012 : proceedings /
by:
(Electronic resources)
Information security and privacy research27th IFIP TC 11 information security and privacy conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012 : proceedings /
by:
(Electronic resources)
Privacy and identity management for life7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011 : revised selected papers /
by:
(Electronic resources)
Eco-friendly computing and communication systemsInternational Conference, ICECCS 2012, Kochi, India, August 9-11, 2012 : proceedings /
by:
(Electronic resources)
Information security and privacy17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012 : proceedings /
by:
(Electronic resources)
Arithmetic of finite fields4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012 : proceedings /
by:
(Electronic resources)
Information security and cryptology - ICISC 201114th International Conference, Seoul, Korea, November 30 - December 2, 2011 : revised aelected papers /
by:
(Electronic resources)
Transactions on data hiding and multimedia security VIIIspecial issue on pattern recognition for IT security /
by:
(Electronic resources)
Digital forensics and watermarking10th International Workshop, IWDW 2011, Atlantic City, NY, October 23-26, 2011 : revised selected papers /
by:
(Electronic resources)
Trusted systemsthird International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 201232nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012 : proceedings /
by:
(Electronic resources)
Information theoretic security6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings /
by:
(Electronic resources)
Trust, privacy and security in digital business9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012 : proceedings /
by:
(Electronic resources)
Secure data management9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012 : proceedings /
by:
(Electronic resources)
Security and cryptography for networks8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012 : revised selected papers /
by:
(Electronic resources)
omputer security - ESORICS 201217th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 : proceedings /
by:
(Electronic resources)
Provable security6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012 : proceedings /
by:
(Electronic resources)
Progress in Cryptology - LATINCRYPT 20122nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012 : proceedings /
by:
(Electronic resources)
Communications and multimedia security8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom /
by:
(Electronic resources)
Security and privacy in communication networks7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011 : revised selected papers /
by:
(Electronic resources)
Recent trends in computer networks and distributed systems securityInternational Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012 : proceedings /
by:
(Electronic resources)
E-voting and identitythird international conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011 : revised selected papers /
by:
(Electronic resources)
Communications and multimedia security13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 201214th International Workshop, Leuven, Belgium, September 9-12, 2012 : proceedings /
by:
(Electronic resources)
Information security15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012 : proceedings /
by:
(Electronic resources)
Privacy in statistical databasesUNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012 : proceedings /
by:
(Electronic resources)
Fast software encryption19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012 : revised selected papers /
by:
(Electronic resources)
Computer network security6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012 : proceedings /
by:
(Electronic resources)
Information and communications security14th international conference, ICICS 2012, Hong Kong, China, October 29-31, 2012 : proceedings /
by:
(Electronic resources)
Research in cryptology4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011 : revised selected papers /
by:
(Electronic resources)
Secure IT systems17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 : proceedings /
by:
(Electronic resources)
Security, privacy, and applied cryptography engineeringsecond international conference, SPACE 2012, Chennai, India, November 3-4, 2012 : proceedings /
by:
(Electronic resources)
Financial cryptography and data securityFC 2012 workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology7th international conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011 : revised selected papers /
by:
(Electronic resources)
Computer applications for security, control and system engineeringInternational Conferences, SecTech, CA, CES3 2012, held in conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012 : proceedings /
by:
(Electronic resources)
Advances in information and computer security7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012 : proceedings /
by:
(Electronic resources)
Network and system security6th international conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings /
by:
(Electronic resources)
Advances in Cryptology - ASIACRYPT 201218th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012 : proceedings /
by:
(Electronic resources)
Multiple access communications5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012 : proceedings /
by:
(Electronic resources)
Information security applications13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers /
by:
(Electronic resources)
Computer securityESORICS 2008 : 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008 : proceedings /
by:
(Electronic resources)
Information and communications security10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 : proceedings /
by:
(Electronic resources)
Information hiding10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008 : revised selected papers /
by:
(Electronic resources)
Network and parallel computingIFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008 : proceedings /
by:
(Electronic resources)
Post-quantum cryptographysecond international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings /
by:
(Electronic resources)
Principles, systems and applications of IP telecommunicationsservices and security for next generation networks : second international conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008, revised selected papers /
by:
(Electronic resources)
Provable securitysecond international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings /
by:
(Electronic resources)
Research in cryptologysecond western European workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007 : revised selected papers /
by:
(Electronic resources)
Advances in digital forensics VIII8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012 : revised selected papers /
by:
(Electronic resources)
Advances in information technology5th international conference, IAIT 2012, Bangkok, Thailand, December 6-7, 2012 : proceedings /
by:
(Electronic resources)
Cyberspace safety and security4th international symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 201213th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012 : proceedings /
by:
(Electronic resources)
Information systems security8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(Electronic resources)
Trusted systems4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(Electronic resources)
Cryptology and network security11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
(Electronic resources)
Security protocols XX20th international workshop, Cambridge, UK, April 12-13, 2012 : revised selected papers /
by:
(Electronic resources)
Information theoretic security7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(Electronic resources)
Pairing-based cryptography - Pairing 20136th International Conference, Beijing, China, November 22-24, 2013 : revised selected papers /
by:
(Electronic resources)
Public key infrastructures, services and applications10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013 : revised selected papers /
by:
(Electronic resources)
Recent trends in computer networks and distributed systems securitysecond International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014 : proceedings /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2014the Cryptographer's track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014 : proceedings /
by:
(Electronic resources)
Engineering secure software and systems6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014 : proceedings /
by:
(Electronic resources)
Theory of cryptography11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014 : proceedings /
by:
(Electronic resources)
Public-key cryptography - PKC 201417th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014 : proceedings /
by:
(Electronic resources)
Information security applications14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers /
by:
(Electronic resources)
Foundations and practice of security6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013 : revised selected papers /
by:
(Electronic resources)
Data privacy management and autonomous spontaneous security8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013 : revised selected papers /
by:
(Electronic resources)
Principles of security and trustThird International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014 : proceedings /
by:
(Electronic resources)
Transactions on data hiding and multimedia security IXSpecial Issue on Visual Cryptography /
by:
(Electronic resources)
The privacy engineer's manifestogetting from policy to code to QA to value /
by:
(Electronic resources)
Information security practice and experience10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014 : proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 201433rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014 : proceedings /
by:
(Electronic resources)
Progress in cryptology - AFRICACRYPT 20147th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014 : proceedings /
by:
(Electronic resources)
Secure data management10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013 : proceedings /
by:
(Electronic resources)
Engineering secure future internet services and systemscurrent research /
by:
(Electronic resources)
Selected areas in cryptography - SAC 201320th International Conference, Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers /
by:
(Electronic resources)
Applied cryptography and network security12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014 : proceedings /
by:
(Electronic resources)
Smart card research and advanced applications12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013 : revised selected papers /
by:
(Electronic resources)
Privacy enhancing technologies14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings /
by:
(Electronic resources)
Trust and trustworthy computing7th International Conference, TRUST 2014, Heraklion, Crete, June 30 - July 2, 2014 : proceedings /
by:
(Electronic resources)
Information security theory and practicesecuring the internet of things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014 : proceedings /
by:
(Electronic resources)
Healthcare information privacy and securityregulatory compliance and data security in the age of electronic health records /
by:
(Electronic resources)
Information security and privacy19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014 : proceedings /
by:
(Electronic resources)
Digital-forensics and watermarking12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013 : revised selected papers /
by:
(Electronic resources)
Fast software encryption20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 201434th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014 : proceedings.Part I /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 201434th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014 : proceedings.Part II /
by:
(Electronic resources)
Cryptography and security systemsThird International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014 : proceedings /
by:
(Electronic resources)
Trust, privacy, and security in digital business11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014 : proceedings /
by:
(Electronic resources)
Advances in information and computer security9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014 : proceedings /
by:
(Electronic resources)
Foundations of security analysis and design VIIFOSAD 2012/2013 tutorial lectures /
by:
(Electronic resources)
Constructive side-channel analysis and secure design5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014 : revised selected papers /
by:
(Electronic resources)
Security and cryptography for networks9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 201419th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014 : proceedings.Part I /
by:
(Electronic resources)
Computer security - ESORICS 201419th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014 : proceedings.Part II /
by:
(Electronic resources)
Communications and multimedia security15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 : proceedings /
by:
(Electronic resources)
Platform embedded security technology revealedsafeguarding the future of computing with intel embedded security and management engine /
by:
(Electronic resources)
Automated firewall analyticsdesign, configuration and optimization /
by:
(Language materials, printed)
Privacy in statistical databasesUNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014 : proceedings /
by:
(Language materials, printed)
Post-quantum cryptography6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014 : proceedings /
by:
(Language materials, printed)
Security and trust management10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014 : proceedings /
by:
(Language materials, printed)
Cryptographic hardware and embedded systems - CHES 201416th International Workshop, Busan, South Korea, September 23-26, 2014 : proceedings /
by:
(Language materials, printed)
Advances in digital forensics X10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014 : revised selected papers /
by:
(Language materials, printed)
Secure IT systems19th Nordic Conference, NordSec 2014, Tromso, Norway, October 15-17, 2014 : proceedings /
by:
(Electronic resources)
Network and system security8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014 : proceedings /
by:
(Electronic resources)
Security, privacy, and applied cryptography engineering4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014 : proceedings /
by:
(Electronic resources)
Information security and cryptology9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology - ICISC 201316th International Conference, Seoul, Korea, November 27-29, 2013 : revised selected papers /
by:
(Electronic resources)
Cryptology and network security13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014 : proceedings /
by:
(Electronic resources)
Security protocols XXII22nd International Workshop, Cambridge, UK, March 19-21, 2014 : revised selected papers /
by:
(Electronic resources)
Provable security8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014 : proceedings /
by:
(Electronic resources)
Future data and security engineeringfirst International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 201415th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014 : proceedings /
by:
(Electronic resources)
Financial cryptography and data securityFC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014 : revised selected papers /
by:
(Electronic resources)
10 don'ts on our digital devicesthe non-techie's survival guide to cyber security and privacy /
by:
(Electronic resources)
Applications and techniques in information security5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014 : proceedings /
by:
(Electronic resources)
Sequences and their applications - SETA 20148th International Conference, Melbourne, VIC, Australia, November 24-28, 2014 : proceedings /
by:
(Electronic resources)
Radio frequency identificationsecurity and privacy issues : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014 : revised selected papers /
by:
(Electronic resources)
Information security17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201420th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014 : proceedings.Part II /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201420th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014 : proceedings.Part I /
by:
(Electronic resources)
Information systems security10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings /
by:
(Electronic resources)
Security standardisation researchfirst International Conference, SSR 2014, London, UK, December 16-17, 2014 : proceedings /
by:
(Electronic resources)
The manager's guide to web application securitya concise guide to the weaker side of the web /
by:
(Electronic resources)
Attribute-based credentials for trustidentity in the information society /
by:
(Electronic resources)
Information security applications15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014 : revised selected papers /
by:
(Electronic resources)
SOFSEM 2015theory and practice of computer science : 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Snezkou, Czech Republic, January 24-29, 2015 : proceedings /
by:
(Electronic resources)
A practical guide to TPM 2.0using the new Trusted Platform Module in the new age of security /
by:
(Electronic resources)
Engineering secure software and systems7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015 : proceedings /
by:
(Electronic resources)
Arithmetic of finite fields5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology - ICISC 201417th International Conference, Seoul, South Korea, December 3-5, 2014 : revised selected papers /
by:
(Electronic resources)
Progress in cryptology - LATINCRYPT 2014third International Conference on Cryptology and Information Security in Latin America Florianopolis, Brazil, September 17–19, 2014 : revised selected papers /
by:
(Electronic resources)
Lightweight cryptography for security and privacythird International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014 : revised selected papers /
by:
(Electronic resources)
Topics in Cryptology - CT-RSA 2015the Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015 : proceedings /
by:
(Electronic resources)
Information security and cryptology10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014 : revised selected papers /
by:
(Electronic resources)
Smart card research and advanced applications13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014 : revised selected papers /
by:
(Electronic resources)
Accountability and security in the cloudFirst Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014 : revised selected papers and lectures /
by:
(Electronic resources)
Public-Key Cryptography - PKC 201518th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015 : proceedings /
by:
(Electronic resources)
Theory of cryptography12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015 : proceedings.Part I /
by:
(Electronic resources)
Theory of cryptography12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015 : proceedings.Part II /
by:
(Electronic resources)
Principles of security and trust4th International Conference, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015 : proceedings /
by:
(Electronic resources)
Foundations and practice of security7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014 : revised selected papers /
by:
(Electronic resources)
Risks and security of internet and systems9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014 : revised selected papers /
by:
(Electronic resources)
Information theoretic security8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015 : proceedings /
by:
(Electronic resources)
Information security practice and experience11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015 : proceedings /
by:
(Electronic resources)
Fast software encryption21st International Workshop, FSE 2014, London, UK, March 3-5, 2014 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 201534th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015 : proceedings.Part I /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 201534th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015 : proceedings.Part II /
by:
(Electronic resources)
ICT systems security and privacy protection30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /
by:
(Electronic resources)
Codes, cryptology, and information securityfirst International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015 : proceedings - In Honor of Thierry Berger /
by:
(Electronic resources)
Enterprise cybersecurityhow to build a successful cyberdefense program against advanced threats /
by:
(Electronic resources)
Information security and privacy20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015 : proceedings /
by:
(Electronic resources)
Cryptography and information security in the Balkansfirst International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014 : revised selected papers /
by:
(Electronic resources)
Constructive side-channel analysis and secure design6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015 : revised selected papers /
by:
(Electronic resources)
Financial cryptography and data security19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 201535th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015 : proceedings.Part I /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 201535th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015 : proceedings.Part II /
by:
(Electronic resources)
Information and communications security16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014 : revised selected papers /
by:
(Electronic resources)
Progress in Cryptology - LATINCRYPT 20154th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015 : proceedings /
by:
(Electronic resources)
E-Voting and identity5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015 : proceedings /
by:
(Electronic resources)
Advances in information and computer security10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015 : proceedings /
by:
(Electronic resources)
Information security theory and practice9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 : proceedings /
by:
(Electronic resources)
Fast software encryption22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015 : revised selected papers /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 201517th International Workshop, Saint-Malo, France, September 13-16, 2015 : proceedings /
by:
(Electronic resources)
Advances in Digital Forensics XI11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015 : revised selected papers /
by:
(Electronic resources)
Cyber denial, deception and counter deceptiona framework for supporting active cyber defense /
by:
(Electronic resources)
Applications and techniques in information security6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
by:
(Electronic resources)
Algebraic informatics6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015 : proceedings /
by:
(Electronic resources)
Security, privacy, and applied cryptography engineering5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015 : proceedings /
by:
(Electronic resources)
Technology and practice of passwordsInternational Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014 : revised selected papers /
by:
(Electronic resources)
Security and trust management11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015 : proceedings /
by:
(Electronic resources)
Network and system security9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(Electronic resources)
Advanced concepts for intelligent vision systems16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015 : proceedings /
by:
(Electronic resources)
Provable security9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(Electronic resources)
Security protocols XXIII23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(Electronic resources)
Future data and security engineeringsecond International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015 : proceedings /
by:
(Electronic resources)
Secure IT systems20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 201516th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015 : proceedings /
by:
(Electronic resources)
Cryptology and network security14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015 : proceedings /
by:
(Electronic resources)
Internet of vehicles - safe and intelligent mobilitysecond International Conference, IOV 2015, Chengdu, China, December 19-21, 2015 : proceedings /
by:
(Electronic resources)
Financial cryptography and data securityFC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201521st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part I /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201521st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part II /
by:
(Electronic resources)
Cyber operationsbuilding, defending, and attacking modern computer networks /
by:
(Electronic resources)
Information systems security11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings /
by:
(Electronic resources)
Security standardisation researchsecond International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015 : proceedings /
by:
(Electronic resources)
Cryptography and coding15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(Electronic resources)
Cloud computing and securityfirst International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015 : revised selected papers /
by:
(Electronic resources)
Innovative security solutions for information technology and communications8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : revised selected papers /
by:
(Electronic resources)
Trusted systems6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers /
by:
(Electronic resources)
Applied cryptography and network security13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : revised selected papers /
by:
(Electronic resources)
Security and privacy in communication networks11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015 : revised selected papers /
by:
(Electronic resources)
Theory of cryptography13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.Part I /
by:
(Electronic resources)
Theory of cryptography13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.Part II /
by:
(Electronic resources)
SOFSEM 2016theory and practice of computer science : 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016 : proceedings /
by:
(Electronic resources)
Post-quantum cryptography7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016 : proceedings /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2016the Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016 : proceedings /
by:
(Electronic resources)
Public-key cryptography - PKC 201619th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016 : proceedings.Part I /
by:
(Electronic resources)
Public-key cryptography - PKC 201619th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016 : proceedings.Part II /
by:
(Electronic resources)
Lightweight cryptography for security and privacy4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015 : revised selected papers /
by:
(Electronic resources)
Cryptography and information security in the Balkanssecond International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015 : revised selected papers /
by:
(Electronic resources)
Information and communications security17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015 : revised selected papers /
by:
(Electronic resources)
Data privacy management, and security assurance10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015 : revised selected papers /
by:
(Electronic resources)
Technology and practice of passwords9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015 : proceedings /
by:
(Electronic resources)
Foundations and practice of security8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systems8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016 : proceedings /
by:
(Electronic resources)
Information security and cryptology - ICISC 201518th International Conference, Seoul, South Korea, November 25-27, 2015 : revised selected papers /
by:
(Electronic resources)
Smart card research and advanced applications14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015 : revised selected papers /
by:
(Electronic resources)
Selected areas in cryptography - SAC 201522nd International Conference, Sackville, NB, Canada, August 12-14, 2015 : revised selected papers /
by:
(Electronic resources)
Information security applications16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015 : revised selected papers /
by:
(Electronic resources)
Digital-forensics and watermarking14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers /
by:
(Electronic resources)
The new codebreakersessays dedicated to David Kahn on the occasion of his 85th birthday /
by:
(Electronic resources)
Principles of security and trust5th International Conference, POST 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, the Netherlands, April 2-8, 2016 : proceedings /
by:
(Electronic resources)
Progress in cryptology - AFRICACRYPT 20168th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016 : proceedings /
by:
(Electronic resources)
Risks and security of internet and systems10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015 : revised selected papers /
by:
(Electronic resources)
Open problems in network securityIFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 201635th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.Part I /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 201635th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.Part II /
by:
(Electronic resources)
ICT systems security and privacy protection31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings /
by:
(Electronic resources)
Information security and cryptology11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015 : revised selected papers /
by:
(Electronic resources)
Security and resiliency analytics for smart gridsstatic and dynamic approaches /
by:
(Electronic resources)
Applied cryptography and network security14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings /
by:
(Electronic resources)
Information security and privacy21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.Part I /
by:
(Electronic resources)
Security of industrial control systems and cyber physical systemsfirst Workshop, CyberICS 2015 and first Workshop, WOS-CPS 2015 Vienna, Austria, September 21-22, 2015 : revised selected papers /
by:
(Electronic resources)
Cyber-physical attack recovery proceduresa step-by-step preparation and response guide /
by:
(Electronic resources)
Information security and privacy21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.Part II /
by:
(Electronic resources)
Data and applications security and privacy XXX30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016 : proceedings /
by:
(Electronic resources)
Constructive side-channel analysis and secure design7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016 : revised selected papers /
by:
(Electronic resources)
Fast software encryption23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 201636th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings.Part II /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 201636th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings.Part III /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 201636th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings.Part I /
by:
(Electronic resources)
Preserving privacy against side-channel leaksfrom data publishing to web applications /
by:
(Electronic resources)
Foundations of security analysis and design VIIIFOSAD 2014/2015/2016 tutorial lectures /
by:
(Electronic resources)
Electronic government and the information systems perspective5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016 : proceedings /
by:
(Electronic resources)
Trust, privacy, and security in digital business13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016 : proceedings /
by:
(Electronic resources)
Database and expert systems applications27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016 : proceedings.Part I /
by:
(Electronic resources)
Database and expert systems applications27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016 : proceedings.Part II /
by:
(Electronic resources)
Security and cryptography for networks10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016 : proceedings /
by:
(Electronic resources)
Privacy in statistical databasesUNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14-16, 2016 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016 : proceedings /
by:
(Electronic resources)
Information security19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 201618th International Conference, Santa Barbara, CA, USA, August 17-19, 2016 : proceedings /
by:
(Electronic resources)
Financial cryptography and data securityFC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016 : revised selected papers /
by:
(Electronic resources)
Advances in digital forensics XII12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016 : revised selected papers /
by:
(Electronic resources)
Security in Computing and Communications4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings /
by:
(Electronic resources)
Applications and techniques in information security6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016 : proceedings /
by:
(Electronic resources)
Advances in information and computer security11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 201621st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016 : proceedings.Part II /
by:
(Electronic resources)
Computer security - ESORICS 201621st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016 : proceedings.Part I /
by:
(Electronic resources)
Information security theory and practice10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016 : proceedings /
by:
(Electronic resources)
Network and system security10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings /
by:
(Electronic resources)
Security and trust management12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016 : proceedings /
by:
(Electronic resources)
Data privacy management and security assurance11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016 : proceedings /
by:
(Electronic resources)
Elements of cloud storage securityconcepts, designs and optimized practices /
by:
(Electronic resources)
Innovative security solutions for information technology and communications9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016 : revised selected papers /
by:
(Electronic resources)
Secure IT systems21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016 : proceedings /
by:
(Electronic resources)
Cryptology and network security15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(Electronic resources)
Theory of cryptography14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.Part I /
by:
(Electronic resources)
Theory of cryptography14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.Part II /
by:
(Electronic resources)
Security standardisation researchthird International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016 : proceedings /
by:
(Electronic resources)
Security, privacy and anonymity in computation, communication and storageSpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Electronic resources)
Security, privacy, and anonymity in computation, communication, and storage9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Electronic resources)
Information security practice and experience12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Electronic resources)
Information Theoretic Security9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016 : revised selected papers /
by:
(Electronic resources)
Information systems security12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings /
by:
(Electronic resources)
Information and communications security18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016 : proceedings /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201622nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 : proceedings.Part I /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201622nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 : proceedings.Part II /
by:
(Electronic resources)
From hacking to report writingan introduction to security and penetration testing /
by:
(Electronic resources)
Arithmetic of finite fields6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016 : revised selected papers /
by:
(Electronic resources)
On privacy-preserving protocols for smart metering systemssecurity and privacy in smart grids /
by:
(Electronic resources)
Foundations and practice of security9th International Symposium, FPS 2016, Quebec City, QC, Canada, October 24-25, 2016 : revised selected papers /
by:
(Electronic resources)
Transactions on large-scale data- and knowledge-centered systems XXXIspecial issue on data and security engineering /
by:
(Electronic resources)
Smart computing and communicationfirst International Conference, SmartCom 2016, Shenzhen, China, December 17-19, 2016 : proceedings /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2017the Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017 : proceedings /
by:
(Electronic resources)
Electronic votingfirst International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016 : proceedings /
by:
(Electronic resources)
Information systems security and privacysecond International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology - ICISC 201619th International Conference, Seoul, South Korea, November 30 - December 2, 2016 : rvised selected papers /
by:
(Electronic resources)
Digital forensics and watermarking15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016 : rvised selected papers /
by:
(Electronic resources)
Public-key cryptography - PKC 201720th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017 : proceedings.Part I /
by:
(Electronic resources)
Public-key cryptography - PKC 201720th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017 : proceedings.Part II /
by:
(Electronic resources)
Enterprise securitysecond International Workshop, ES 2015, Vancouver, BC, Canada, November 30 - December 3, 2015 : revised selected papers /
by:
(Electronic resources)
Computational modeling of objects presented in imagesfundamentals, methods, and applications : 5th International Symposium, CompIMAGE 2016, Niagara Falls, NY, USA, September 21-23, 2016 : revised selected papers /
by:
(Electronic resources)
Smart card research and advanced applications15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016 : revised selected papers /
by:
(Electronic resources)
Risks and security of internet and systems11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016 : revised selected papers /
by:
(Electronic resources)
Codes, cryptology and information securitysecond International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017 : proceedings - In honor of Claude Carlet /
by:
(Electronic resources)
Lightweight cryptography for security and privacy5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016 : revised selected papers /
by:
(Electronic resources)
Information security applications17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016 : revised selected papers /
by:
(Electronic resources)
Principles of security and trust6th International Conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings /
by:
(Electronic resources)
Risk assessment and risk-driven quality assurance4th International Workshop, RISK 2016, held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016 : revised selected papers /
by:
(Electronic resources)
ICT systems security and privacy protection32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017 : proceedings /
by:
(Electronic resources)
Information security and privacy22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017 : proceedings.Part II /
by:
(Electronic resources)
Information security and privacy22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017 : proceedings.Part I /
by:
(Electronic resources)
Financial cryptography and data security20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016 : revised selected papers /
by:
(Electronic resources)
Security and privacy in communication networks12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016 : proceedings /
by:
(Electronic resources)
Applications and techniques in information security8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017 : proceedings /
by:
(Electronic resources)
Post-Quantum cryptography8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017 : proceedings /
by:
(Electronic resources)
Cyber security cryptography and machine learningfirst International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017 : proceedings /
by:
(Electronic resources)
Detection of intrusions and malware, and vulnerability assessment14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017 : proceedings /
by:
(Electronic resources)
Security of industrial control systems and cyber-physical systemssecond International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systems9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings /
by:
(Electronic resources)
Paradigms in cryptology - Mycrypt 2016malicious and exploratory cryptology : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016 : revised selected papers /
by:
(Electronic resources)
Radio frequency identification and IoT security12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 -- December 2, 2016 : revised selected papers /
by:
(Electronic resources)
Security protocols XXIV24th International Workshop, Brno, Czech Republic, April 7-8, 2016 : revised selected papers /
by:
(Electronic resources)
Constructive side-channel analysis and secure design8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers /
by:
(Electronic resources)
Data analytics and decision support for cybersecuritytrends, methodologies and applications /
by:
(Electronic resources)
Advances in digital forensics XIII13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 201737th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017 : proceedings.Part III /
by:
(Electronic resources)
Computer network security7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 201722nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017 : proceedings.Part II /
by:
(Electronic resources)
Computer security - ESORICS 201722nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017 : proceedings.Part I /
by:
(Electronic resources)
Data privacy management, cryptocurrencies and blockchain technologyESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017 : proceedings /
by:
(Electronic resources)
Research in attacks, intrusions, and defenses20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017 : proceedings /
by:
(Electronic resources)
Mobile, secure, and programmable networkingthird International Conference, MSPN 2017, Paris, France, June 29-30, 2017 : revised selected papers /
by:
(Electronic resources)
Cloud computing and securitythird International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017 : revised selected papers.Part I /
by:
(Electronic resources)
Provable security11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings /
by:
(Electronic resources)
Electronic votingsecond International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017 : proceedings /
by:
(Electronic resources)
Selected areas in cryptography - SAC 201623rd International Conference, St. John's, NL, Canada, August 10-12, 2016 : revised selected papers /
by:
(Electronic resources)
Cyberspace safety and security9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2017 : proceedings /
by:
(Electronic resources)
Guide to security in SDN and NFVchallenges, opportunities, and applications /
by:
(Electronic resources)
Trusted computing and information security11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017 : proceedings /
by:
(Electronic resources)
Ubiquitous networkingthird International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017 : revised selected papers /
by:
(Electronic resources)
Cloud computing and securitythird International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017 : revised selected papers.Part II /
by:
(Electronic resources)
Financial cryptography and data securityFC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017 : revised selected papers /
by:
(Electronic resources)
Secure IT systems22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017 : proceedings /
by:
(Electronic resources)
Theory of cryptography15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017 : proceedings.Part I /
by:
(Electronic resources)
Theory of cryptography15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017 : proceedings.Part II /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201723rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017 : proceedings.Part I /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201723rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017 : proceedings.Part II /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201723rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017 : proceedings.Part III /
by:
(Electronic resources)
Security protocols XXV25th International Workshop, Cambridge, UK, March 20-22, 2017 : revised selected papers /
by:
(Electronic resources)
Security, privacy, and applied cryptography engineering7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 201718th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017 : proceedings /
by:
(Electronic resources)
Algebraic geometry for coding theory and cryptographyIPAM, Los Angeles, CA, February 2016 /
by:
(Electronic resources)
Financial cryptography and data security21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017 : revised selected papers /
by:
(Electronic resources)
Information security practice and experience13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017 : proceedings /
by:
(Electronic resources)
Security, privacy, and anonymity in computation, communication, and storage10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017 : proceedings /
by:
(Electronic resources)
Security, privacy, and anonymity in computation, communication, and storageSpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017 : proceedings /
by:
(Electronic resources)
Proceedings of the 2nd Workshop on Communication Securitycryptography and physical layer security /
by:
(Electronic resources)
Cloud computing, security, privacy in new computing environments7th International Conference, CloudComp 2016, and first International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings /
by:
(Electronic resources)
Ubiquitous communications and network computingfirst International Conference, UBICNET 2017, Bangalore, India, August 3-5, 2017 : proceedings /
by:
(Electronic resources)
Smart secure systems - IoT and Analytics Perspectivesecond International Conference on Intelligent Information Technologies, ICIIT 2017, Chennai, India, December 20-22, 2017 : proceedings /
by:
(Electronic resources)
Smart card research and advanced applications16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017 : revised selected papers /
by:
(Electronic resources)
Post-quantum cryptography9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018 : proceedings /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2018the Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018 : proceedings /
by:
(Electronic resources)
Information security and cryptology - ICISC 201720th International Conference, Seoul, South Korea, November 29 - December 1, 2017 : revised selected papers /
by:
(Electronic resources)
Public-key cryptography - PKC 201821st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018 : proceedings.Part II /
by:
(Electronic resources)
Enterprise cybersecurity study guidehow to build a successful cyberdefense program against advanced threats /
by:
(Electronic resources)
Security and privacy in communication networksSecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017 : proceedings /
by:
(Electronic resources)
Mobile networks and management9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017 : proceedings /
by:
(Electronic resources)
Future network systems and security4th International Conference, FNSS 2018, Paris, France, July 9-11, 2018 : proceedings /
by:
(Electronic resources)
Fundamental computing forensics for Africaa case study of the science in Nigeria /
by:
(Electronic resources)
Applied cryptography and network security16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018 : proceedings /
by:
(Electronic resources)
Information security applications18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers /
by:
(Electronic resources)
Information security theory and practice11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017 : proceedings /
by:
(Electronic resources)
Information security and privacy23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018 : proceedings /
by:
(Electronic resources)
Blockchain - ICBC 2018first International Conference, held as part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018 : proceedings /
by:
(Electronic resources)
Interoperability, safety and security in IoTthird International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017 : proceedings /
by:
(Electronic resources)
Fundamentals of digital forensicstheory, methods, and real-life applications /
by:
(Electronic resources)
Security in computer and information sciencesfirst International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018 : revised selected papers /
by:
(Electronic resources)
Towards autonomous robotic systems19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXXII32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018 : proceedings /
by:
(Electronic resources)
ICT systems security and privacy protection33rd IFIP TC 11 International Conference, SEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018 : proceedings /
by:
(Electronic resources)
Computer Security23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018 : proceedings.Part II /
by:
(Electronic resources)
Computer Security23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018 : proceedings.Part I /
by:
(Electronic resources)
Cellular automata13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17-21, 2018 : proceedings /
by:
(Electronic resources)
Critical information infrastructures security12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017 : revised selected papers /
by:
(Electronic resources)
Soft computing systemssecond International Conference, ICSCS 2018, Kollam, India, April 19-20, 2018 : revised selected papers /
by:
(Electronic resources)
Cloud Computing and Security4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018 : revised selected papers.Part IV /
by:
(Electronic resources)
Electronic votingthird International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018 : proceedings /
by:
(Electronic resources)
Applications and techniques in information security9th International Conference, ATIS 2018, Nanning, China, November 9-11, 2018 : proceedings /
by:
(Electronic resources)
Frontiers in cyber securityfirst International Conference, FCS 2018, Chengdu, China, November 5-7, 2018 : proceedings /
by:
(Electronic resources)
Provable security12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018 : proceedings /
by:
(Electronic resources)
Show more
Fewer
Subjects