Data Encryption.
概要
| 作品: | 919 作品在 558 項出版品 558 種語言 | |
|---|---|---|
書目資訊
Theory of Cryptography :Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings /
by:
(書目-電子資源)
Coding and CryptographyInternational Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005, Revised Selected Papers /
by:
(書目-電子資源)
Algorithmic Number Theory7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006, Proceedings /
by:
(書目-電子資源)
Autonomic and Trusted ComputingThird International Conference, ATC 2006, Wuhan, China, September 3-6, 2006 /
by:
(書目-電子資源)
Secure Data Management (vol. # 4165)Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings /
by:
(書目-電子資源)
Security Protocols (vol. # 3957)12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers /
by:
(書目-電子資源)
Sequences and Their Applications u SETA 20064th International Conference, Beijing, China, September 24-28, 2006, Proceedings /
by:
(書目-電子資源)
Autonomic and Trusted Computing5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings /
by:
(書目-電子資源)
Information Security and Privacy13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings /
by:
(書目-電子資源)
Global E-Security4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings /
by:
(書目-電子資源)
Public Key Cryptography - PKC 20058th International Workshop on Theory and Practice in Public Key Cryptography /
by:
(書目-電子資源)
Fast Software Encryption12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers /
by:
(書目-電子資源)
Information Security and Privacy10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings /
by:
(書目-電子資源)
Security Protocols11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers /
by:
(書目-電子資源)
Digital Watermarking :4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings
by:
(書目-電子資源)
Secure Data Management :Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings
by:
(書目-電子資源)
Information Security :8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings
by:
(書目-電子資源)
Information Hiding :7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers
by:
(書目-電子資源)
Cryptography and Coding :10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings
by:
(書目-電子資源)
Information Systems Security :First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
by:
(書目-電子資源)
Cryptology and Network Security :4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings
by:
(書目-電子資源)
Information Security and Cryptology :First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
by:
(書目-電子資源)
Mobile Ad-hoc and Sensor Networks :First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings
by:
(書目-電子資源)
Arithmetic of Finite Fields2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings /
by:
(書目-電子資源)
Privacy Enhancing Technologies8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings /
by:
(書目-電子資源)
Information Theoretic SecurityThird International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings /
by:
(書目-電子資源)
Secure Data Management5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings /
by:
(書目-電子資源)
Pairing-Based Cryptography -- Pairing 2008Second International Conference, Egham, UK, September 1-3, 2008. Proceedings /
by:
(書目-電子資源)
Information Security11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings /
by:
(書目-語言資料,印刷品)
Smart card research and advanced applications8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings /
by:
(書目-語言資料,印刷品)
Sequences and Their Applications - SETA 20085th International Conference Lexington, KY, USA, September 14-18, 2008 Proceedings /
by:
(書目-語言資料,印刷品)
IP operations and management8th IEEE international workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008 : proceedings /
by:
(書目-語言資料,印刷品)
Recent advances in intrusion detection11th international symposium, RAID 2008 : Cambridge, MA, USA September 15-17 2008 : proceedings /
by:
(書目-語言資料,印刷品)
Cryptology and network security7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008, proceedings /
by:
(書目-語言資料,印刷品)
Progress in cryptology - INDOCRYPT 20089th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008, proceedings /
by:
(書目-語言資料,印刷品)
Information systems security4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings /
by:
(書目-語言資料,印刷品)
Digital watermarking6th international workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 proceedings /
by:
(書目-語言資料,印刷品)
Trusted computingsecond international conference, Trust 2009, Oxford, UK, April 6-8, 2009 ; Proceedings /
by:
(書目-電子資源)
Formal to practical securitypapers issued from the 2005 - 2008 French Japanese collaboration /
by:
(書目-電子資源)
Coding and cryptologysecond international workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009 : proceedings /
by:
(書目-電子資源)
Information security and privacy14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009 : proceedings /
by:
(書目-電子資源)
Autonomic and trusted computing6th international conference, ATC 2009, Brisbane, Australia, July 7-9, 2009 ; proceedings /
by:
(書目-電子資源)
Privacy enhancing technologies9th international symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009 : proceedings /
by:
(書目-電子資源)
Fast Software Encryption16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers /
by:
(書目-電子資源)
Personal Satellite ServicesInternational Conference, PSATS 2009, Rome, Italy, March 18-19, 2009 : revised selected papers /
by:
(書目-電子資源)
Pairing-based cryptography - Pairing 2009Third International Conference Palo Alto, CA, USA, August 12-14, 2009 : Proceedings /
by:
(書目-電子資源)
Digital watermarking8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings /
by:
(書目-電子資源)
E-voting and identitysecond international conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009 : proceedings /
by:
(書目-電子資源)
Secure data management6th VLDB workshop, SDM 2009, Lyon, France, August 28, 2009 : proceedings /
by:
(書目-電子資源)
Information hiding11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers /
by:
(書目-電子資源)
Information security12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 : proceedings /
by:
(書目-電子資源)
Digital watermarking7th international workshop, IWDW 2008, Busan, Korea, November 10-12, 2008 : selected papers /
by:
(書目-電子資源)
Security protocols14th international workshop, Cambridge, UK, March 27-29 2006 : revised selected papers /
by:
(書目-電子資源)
Provable securitythird international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings /
by:
(書目-電子資源)
Cryptology and Network Security8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings /
by:
(書目-電子資源)
Information systems security5th international conference, ICISS 2009, Kolkata, India, December 14-18, 2009 : proceedings /
by:
(書目-電子資源)
Post-quantum cryptographythird international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 : proceedings /
by:
(書目-電子資源)
Intelligence and security informaticsPacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 : proceedings /
by:
(書目-電子資源)
Arithmetic of finite fieldsthird international workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings /
by:
(書目-電子資源)
Fast software encryption17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 : revised selected papers /
by:
(書目-電子資源)
Trust and trustworthy computingthird international conference, TRUST 2010, Berlin, Germany, June 21-23, 2010 : proceedings /
by:
(書目-電子資源)
Trust Management IV4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010 : proceedings /
by:
(書目-電子資源)
Trusted systemsFirst International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009 : revised selected papers /
by:
(書目-電子資源)
Privacy enhancing technologies10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010 : proceedings /
by:
(書目-電子資源)
Algorithmic number theory9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010 : proceedings /
by:
(書目-電子資源)
NETWORKING 20109th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010 : proceedings /
by:
(書目-電子資源)
Secure data management7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, proceedings /
by:
(書目-電子資源)
Sequences and their applications - SETA 20106th International Conference, Paris, France, September 13-17, 2010, proceedings /
by:
(書目-電子資源)
Information security and privacy15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, proceedings /
by:
(書目-電子資源)
Multiple access communicationsThird International Workshop, MACOM 2010, Barcelona, Spain, September 13-14, 2010, proceedings /
by:
(書目-電子資源)
Information security and assurance4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, proceedings /
by:
(書目-電子資源)
Provable security4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings /
by:
(書目-電子資源)
Autonomic and trusted computing7th international conference, ATC 2010, Xi'an, China, October 26-29, 2010 : proceedings /
by:
(書目-電子資源)
Information hiding12th international conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010 : revised selected papers /
by:
(書目-電子資源)
Security protocols15th international workshop, Brno, Czech Republic, April 18-20, 2007 : revised selected papers /
by:
(書目-電子資源)
Transactions on computational science Xspecial issue on security in computing, part I /
by:
(書目-電子資源)
Transactions on computational science XIspecial issue on security in computing, part II /
by:
(書目-電子資源)
Digital watermarking9th international workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 : revised selected papers /
by:
(書目-電子資源)
Theory of cryptography8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011 : proceedings /
by:
(書目-電子資源)
Voice over IP securitya comprehensive survey of vulnerabilities and academic research /
by:
(書目-電子資源)
NETWORKING 201110th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011 : proceedings.Part II /
by:
(書目-電子資源)
NETWORKING 201110th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011 : proceedings.Part I /
by:
(書目-電子資源)
Coding and cryptologythird international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011 : proceedings /
by:
(書目-電子資源)
Trust and trustworthy computing4th international conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011 : proceedings /
by:
(書目-電子資源)
Pro PHP securityfrom application security principles to the implementation of XSS defenses /
by:
(書目-電子資源)
Privacy enhancing technologies11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27-29 2011 : proceedings /
by:
(書目-電子資源)
Studies in complexity and cryptographymiscellanea on the interplay between randomness and computation /
by:
(書目-電子資源)
Security protocols XVI16th international workshop, Cambridge, UK, April 16-18, 2008 : revised selected papers /
by:
(書目-電子資源)
Advances in network security and applications4th international conference, CNSA 2011, Chennai, India, July 15-17, 2011 /
by:
(書目-電子資源)
Information security and assuranceinternational conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011 : proceedings /
by:
(書目-電子資源)
Autonomic and trusted computing8th international conference, ATC 2011, Banff, Canada, September 2-4, 2011 : proceedings /
by:
(書目-電子資源)
Secure data management8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011 : proceedings /
by:
(書目-電子資源)
Provable security5th international conference, ProvSec 2011, Xi'an, China, October 16-18, 2011 : proceedings /
by:
(書目-電子資源)
Information hiding13th international conference, IH 2011, Prague, Czech Republic, May 18-20, 2011 : revised selected papers /
by:
(書目-電子資源)
Multiple access communications4th international workshop, MACOM 2011, Trento, Italy, September 12-13, 2011 : proceedings /
by:
(書目-電子資源)
Information security14th international conference, ISC 2011, Xi'an, China, October 26-29, 2011 : proceedings /
by:
(書目-電子資源)
Trusted systemssecond international conference, INTRUST 2010, Beijing, China, December 13-15, 2010 : revised selected papers /
by:
(書目-電子資源)
Information systems security7th international conference, ICISS 2011, Kolkata, India, December 15-19, 2011 : procedings /
by:
(書目-電子資源)
Cryptography and coding13th IMA international conference, IMACC 2011, Oxford, UK, December 12-15, 2011 : proceedings /
by:
(書目-電子資源)
Cryptology and network security10th international conference, CANS 2011, Sanya, China, December 10-12, 2011 : proceedings /
by:
(書目-電子資源)
Expert oracle and Java Securityprogramming secure Oracle database applications with Java /
by:
(書目-電子資源)
Security protocols XIX19th international workshop, Cambridge, UK, March 28-30, 2011 : revised selected papers /
by:
(書目-電子資源)
RFID: Security and privacy7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011 : revised selected papers /
by:
(書目-電子資源)
Critical infrastructure protectioninformation infrastructure models, analysis, and defense /
by:
(書目-電子資源)
Trust management VI6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings /
by:
(書目-電子資源)
Sequences and their applications - SETA 20127th International Conference, Waterloo, ON, Canada, June 4-8, 2012 : proceedings /
by:
(書目-電子資源)
Trust and trustworthy computing5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012 : proceedings /
by:
(書目-電子資源)
Applied cryptography and network security10th International Conference, ACNS 2012, Singapore, June 26-29, 2012 : proceedings /
by:
(書目-電子資源)
Privacy enhancing technologies12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012 : proceedings /
by:
(書目-電子資源)
Arithmetic of finite fields4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012 : proceedings /
by:
(書目-電子資源)
Transactions on data hiding and multimedia security VIIIspecial issue on pattern recognition for IT security /
by:
(書目-電子資源)
Trusted systemsthird International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011 : revised selected papers /
by:
(書目-電子資源)
Secure data management9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012 : proceedings /
by:
(書目-電子資源)
Provable security6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012 : proceedings /
by:
(書目-電子資源)
Information security15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012 : proceedings /
by:
(書目-電子資源)
Secure IT systems17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 : proceedings /
by:
(書目-電子資源)
Multiple access communications5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012 : proceedings /
by:
(書目-電子資源)
Information hiding10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008 : revised selected papers /
by:
(書目-電子資源)
Network and parallel computingIFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008 : proceedings /
by:
(書目-電子資源)
Provable securitysecond international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings /
by:
(書目-電子資源)
Information systems security8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(書目-電子資源)
Trusted systems4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(書目-電子資源)
Security protocols XX20th international workshop, Cambridge, UK, April 12-13, 2012 : revised selected papers /
by:
(書目-電子資源)
Information theoretic security7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(書目-電子資源)
Transactions on data hiding and multimedia security IXSpecial Issue on Visual Cryptography /
by:
(書目-電子資源)
Secure data management10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013 : proceedings /
by:
(書目-電子資源)
Healthcare information privacy and securityregulatory compliance and data security in the age of electronic health records /
by:
(書目-電子資源)
Fast software encryption20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : revised selected papers /
by:
(書目-電子資源)
Privacy in statistical databasesUNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014 : proceedings /
by:
(書目-語言資料,印刷品)
Post-quantum cryptography6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014 : proceedings /
by:
(書目-語言資料,印刷品)
Security and trust management10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014 : proceedings /
by:
(書目-語言資料,印刷品)
Cryptographic hardware and embedded systems - CHES 201416th International Workshop, Busan, South Korea, September 23-26, 2014 : proceedings /
by:
(書目-語言資料,印刷品)
Advances in digital forensics X10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014 : revised selected papers /
by:
(書目-語言資料,印刷品)
Secure IT systems19th Nordic Conference, NordSec 2014, Tromso, Norway, October 15-17, 2014 : proceedings /
by:
(書目-電子資源)
Network and system security8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014 : proceedings /
by:
(書目-電子資源)
Security protocols XXII22nd International Workshop, Cambridge, UK, March 19-21, 2014 : revised selected papers /
by:
(書目-電子資源)
Provable security8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014 : proceedings /
by:
(書目-電子資源)
10 don'ts on our digital devicesthe non-techie's survival guide to cyber security and privacy /
by:
(書目-電子資源)
Information security17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings /
by:
(書目-電子資源)
Information systems security10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings /
by:
(書目-電子資源)
Security standardisation researchfirst International Conference, SSR 2014, London, UK, December 16-17, 2014 : proceedings /
by:
(書目-電子資源)
The manager's guide to web application securitya concise guide to the weaker side of the web /
by:
(書目-電子資源)
A practical guide to TPM 2.0using the new Trusted Platform Module in the new age of security /
by:
(書目-電子資源)
Engineering secure software and systems7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015 : proceedings /
by:
(書目-電子資源)
Information theoretic security8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015 : proceedings /
by:
(書目-電子資源)
Fast software encryption21st International Workshop, FSE 2014, London, UK, March 3-5, 2014 : revised selected papers /
by:
(書目-電子資源)
Enterprise cybersecurityhow to build a successful cyberdefense program against advanced threats /
by:
(書目-電子資源)
E-Voting and identity5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015 : proceedings /
by:
(書目-電子資源)
Trust and trustworthy computing8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015 : proceedings /
by:
(書目-電子資源)
Fast software encryption22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015 : revised selected papers /
by:
(書目-電子資源)
Cyber denial, deception and counter deceptiona framework for supporting active cyber defense /
by:
(書目-電子資源)
Algebraic informatics6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015 : proceedings /
by:
(書目-電子資源)
Security and trust management11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015 : proceedings /
by:
(書目-電子資源)
Network and system security9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(書目-電子資源)
Provable security9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(書目-電子資源)
Security protocols XXIII23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(書目-電子資源)
Secure IT systems20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(書目-電子資源)
Information systems security11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings /
by:
(書目-電子資源)
Security standardisation researchsecond International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015 : proceedings /
by:
(書目-電子資源)
Cryptography and coding15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(書目-電子資源)
Trusted systems6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers /
by:
(書目-電子資源)
Theory of cryptography13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.Part I /
by:
(書目-電子資源)
Theory of cryptography13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.Part II /
by:
(書目-電子資源)
Post-quantum cryptography7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016 : proceedings /
by:
(書目-電子資源)
Engineering secure software and systems8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016 : proceedings /
by:
(書目-電子資源)
The new codebreakersessays dedicated to David Kahn on the occasion of his 85th birthday /
by:
(書目-電子資源)
Cyber-physical attack recovery proceduresa step-by-step preparation and response guide /
by:
(書目-電子資源)
Preserving privacy against side-channel leaksfrom data publishing to web applications /
by:
(書目-電子資源)
Foundations of security analysis and design VIIIFOSAD 2014/2015/2016 tutorial lectures /
by:
(書目-電子資源)
Electronic government and the information systems perspective5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016 : proceedings /
by:
(Electronic resources)
Trust, privacy, and security in digital business13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016 : proceedings /
by:
(Electronic resources)
Database and expert systems applications27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016 : proceedings.Part I /
by:
(Electronic resources)
Database and expert systems applications27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016 : proceedings.Part II /
by:
(Electronic resources)
Security and cryptography for networks10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016 : proceedings /
by:
(Electronic resources)
Privacy in statistical databasesUNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14-16, 2016 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016 : proceedings /
by:
(Electronic resources)
Information security19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 201618th International Conference, Santa Barbara, CA, USA, August 17-19, 2016 : proceedings /
by:
(Electronic resources)
Financial cryptography and data securityFC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016 : revised selected papers /
by:
(Electronic resources)
Advances in digital forensics XII12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016 : revised selected papers /
by:
(Electronic resources)
Security in Computing and Communications4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings /
by:
(Electronic resources)
Applications and techniques in information security6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016 : proceedings /
by:
(Electronic resources)
Advances in information and computer security11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 201621st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016 : proceedings.Part II /
by:
(Electronic resources)
Computer security - ESORICS 201621st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016 : proceedings.Part I /
by:
(Electronic resources)
Information security theory and practice10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016 : proceedings /
by:
(Electronic resources)
Network and system security10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings /
by:
(Electronic resources)
Security and trust management12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016 : proceedings /
by:
(Electronic resources)
Data privacy management and security assurance11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016 : proceedings /
by:
(Electronic resources)
Elements of cloud storage securityconcepts, designs and optimized practices /
by:
(Electronic resources)
Innovative security solutions for information technology and communications9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016 : revised selected papers /
by:
(Electronic resources)
Secure IT systems21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016 : proceedings /
by:
(Electronic resources)
Cryptology and network security15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(Electronic resources)
Theory of cryptography14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.Part I /
by:
(Electronic resources)
Theory of cryptography14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.Part II /
by:
(Electronic resources)
Security standardisation researchthird International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016 : proceedings /
by:
(Electronic resources)
Security, privacy and anonymity in computation, communication and storageSpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Electronic resources)
Security, privacy, and anonymity in computation, communication, and storage9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Electronic resources)
Information security practice and experience12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Electronic resources)
Information Theoretic Security9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016 : revised selected papers /
by:
(Electronic resources)
Information systems security12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings /
by:
(Electronic resources)
Information and communications security18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016 : proceedings /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201622nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 : proceedings.Part I /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201622nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 : proceedings.Part II /
by:
(Electronic resources)
From hacking to report writingan introduction to security and penetration testing /
by:
(Electronic resources)
Arithmetic of finite fields6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016 : revised selected papers /
by:
(Electronic resources)
On privacy-preserving protocols for smart metering systemssecurity and privacy in smart grids /
by:
(Electronic resources)
Foundations and practice of security9th International Symposium, FPS 2016, Quebec City, QC, Canada, October 24-25, 2016 : revised selected papers /
by:
(Electronic resources)
Transactions on large-scale data- and knowledge-centered systems XXXIspecial issue on data and security engineering /
by:
(Electronic resources)
Smart computing and communicationfirst International Conference, SmartCom 2016, Shenzhen, China, December 17-19, 2016 : proceedings /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2017the Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017 : proceedings /
by:
(Electronic resources)
Electronic votingfirst International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016 : proceedings /
by:
(Electronic resources)
Information systems security and privacysecond International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology - ICISC 201619th International Conference, Seoul, South Korea, November 30 - December 2, 2016 : rvised selected papers /
by:
(Electronic resources)
Digital forensics and watermarking15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016 : rvised selected papers /
by:
(Electronic resources)
Public-key cryptography - PKC 201720th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017 : proceedings.Part I /
by:
(Electronic resources)
Public-key cryptography - PKC 201720th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017 : proceedings.Part II /
by:
(Electronic resources)
Enterprise securitysecond International Workshop, ES 2015, Vancouver, BC, Canada, November 30 - December 3, 2015 : revised selected papers /
by:
(Electronic resources)
Computational modeling of objects presented in imagesfundamentals, methods, and applications : 5th International Symposium, CompIMAGE 2016, Niagara Falls, NY, USA, September 21-23, 2016 : revised selected papers /
by:
(Electronic resources)
Smart card research and advanced applications15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016 : revised selected papers /
by:
(Electronic resources)
Risks and security of internet and systems11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016 : revised selected papers /
by:
(Electronic resources)
Codes, cryptology and information securitysecond International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017 : proceedings - In honor of Claude Carlet /
by:
(Electronic resources)
Lightweight cryptography for security and privacy5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016 : revised selected papers /
by:
(Electronic resources)
Information security applications17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016 : revised selected papers /
by:
(Electronic resources)
Principles of security and trust6th International Conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings /
by:
(Electronic resources)
Risk assessment and risk-driven quality assurance4th International Workshop, RISK 2016, held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016 : revised selected papers /
by:
(Electronic resources)
ICT systems security and privacy protection32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017 : proceedings /
by:
(Electronic resources)
Information security and privacy22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017 : proceedings.Part II /
by:
(Electronic resources)
Information security and privacy22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017 : proceedings.Part I /
by:
(Electronic resources)
Financial cryptography and data security20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016 : revised selected papers /
by:
(Electronic resources)
Security and privacy in communication networks12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016 : proceedings /
by:
(Electronic resources)
Applications and techniques in information security8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017 : proceedings /
by:
(Electronic resources)
Post-Quantum cryptography8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017 : proceedings /
by:
(Electronic resources)
Cyber security cryptography and machine learningfirst International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017 : proceedings /
by:
(Electronic resources)
Detection of intrusions and malware, and vulnerability assessment14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017 : proceedings /
by:
(Electronic resources)
Security of industrial control systems and cyber-physical systemssecond International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systems9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings /
by:
(Electronic resources)
Paradigms in cryptology - Mycrypt 2016malicious and exploratory cryptology : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016 : revised selected papers /
by:
(Electronic resources)
Radio frequency identification and IoT security12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 -- December 2, 2016 : revised selected papers /
by:
(Electronic resources)
Security protocols XXIV24th International Workshop, Brno, Czech Republic, April 7-8, 2016 : revised selected papers /
by:
(Electronic resources)
Constructive side-channel analysis and secure design8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers /
by:
(Electronic resources)
Data analytics and decision support for cybersecuritytrends, methodologies and applications /
by:
(Electronic resources)
Advances in digital forensics XIII13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 201737th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017 : proceedings.Part III /
by:
(Electronic resources)
Computer network security7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 201722nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017 : proceedings.Part II /
by:
(Electronic resources)
Computer security - ESORICS 201722nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017 : proceedings.Part I /
by:
(Electronic resources)
Data privacy management, cryptocurrencies and blockchain technologyESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017 : proceedings /
by:
(Electronic resources)
Research in attacks, intrusions, and defenses20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017 : proceedings /
by:
(Electronic resources)
Mobile, secure, and programmable networkingthird International Conference, MSPN 2017, Paris, France, June 29-30, 2017 : revised selected papers /
by:
(Electronic resources)
Cloud computing and securitythird International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017 : revised selected papers.Part I /
by:
(Electronic resources)
Provable security11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings /
by:
(Electronic resources)
Electronic votingsecond International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017 : proceedings /
by:
(Electronic resources)
Selected areas in cryptography - SAC 201623rd International Conference, St. John's, NL, Canada, August 10-12, 2016 : revised selected papers /
by:
(Electronic resources)
Cyberspace safety and security9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2017 : proceedings /
by:
(Electronic resources)
Guide to security in SDN and NFVchallenges, opportunities, and applications /
by:
(Electronic resources)
Trusted computing and information security11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017 : proceedings /
by:
(Electronic resources)
Ubiquitous networkingthird International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017 : revised selected papers /
by:
(Electronic resources)
Cloud computing and securitythird International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017 : revised selected papers.Part II /
by:
(Electronic resources)
Financial cryptography and data securityFC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017 : revised selected papers /
by:
(Electronic resources)
Secure IT systems22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017 : proceedings /
by:
(Electronic resources)
Theory of cryptography15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017 : proceedings.Part I /
by:
(Electronic resources)
Theory of cryptography15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017 : proceedings.Part II /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201723rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017 : proceedings.Part I /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201723rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017 : proceedings.Part II /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 201723rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017 : proceedings.Part III /
by:
(Electronic resources)
Security protocols XXV25th International Workshop, Cambridge, UK, March 20-22, 2017 : revised selected papers /
by:
(Electronic resources)
Security, privacy, and applied cryptography engineering7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 201718th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017 : proceedings /
by:
(Electronic resources)
Algebraic geometry for coding theory and cryptographyIPAM, Los Angeles, CA, February 2016 /
by:
(Electronic resources)
Financial cryptography and data security21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017 : revised selected papers /
by:
(Electronic resources)
Information security practice and experience13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017 : proceedings /
by:
(Electronic resources)
Security, privacy, and anonymity in computation, communication, and storage10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017 : proceedings /
by:
(Electronic resources)
Security, privacy, and anonymity in computation, communication, and storageSpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017 : proceedings /
by:
(Electronic resources)
Proceedings of the 2nd Workshop on Communication Securitycryptography and physical layer security /
by:
(Electronic resources)
Cloud computing, security, privacy in new computing environments7th International Conference, CloudComp 2016, and first International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings /
by:
(Electronic resources)
Ubiquitous communications and network computingfirst International Conference, UBICNET 2017, Bangalore, India, August 3-5, 2017 : proceedings /
by:
(Electronic resources)
Smart secure systems - IoT and Analytics Perspectivesecond International Conference on Intelligent Information Technologies, ICIIT 2017, Chennai, India, December 20-22, 2017 : proceedings /
by:
(Electronic resources)
Smart card research and advanced applications16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017 : revised selected papers /
by:
(Electronic resources)
Post-quantum cryptography9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018 : proceedings /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2018the Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018 : proceedings /
by:
(Electronic resources)
Information security and cryptology - ICISC 201720th International Conference, Seoul, South Korea, November 29 - December 1, 2017 : revised selected papers /
by:
(Electronic resources)
Public-key cryptography - PKC 201821st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018 : proceedings.Part II /
by:
(Electronic resources)
Enterprise cybersecurity study guidehow to build a successful cyberdefense program against advanced threats /
by:
(Electronic resources)
Security and privacy in communication networksSecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017 : proceedings /
by:
(Electronic resources)
Mobile networks and management9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017 : proceedings /
by:
(Electronic resources)
Future network systems and security4th International Conference, FNSS 2018, Paris, France, July 9-11, 2018 : proceedings /
by:
(Electronic resources)
Fundamental computing forensics for Africaa case study of the science in Nigeria /
by:
(Electronic resources)
Applied cryptography and network security16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018 : proceedings /
by:
(Electronic resources)
Information security applications18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers /
by:
(Electronic resources)
Information security theory and practice11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017 : proceedings /
by:
(Electronic resources)
Information security and privacy23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018 : proceedings /
by:
(Electronic resources)
Blockchain - ICBC 2018first International Conference, held as part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018 : proceedings /
by:
(Electronic resources)
Interoperability, safety and security in IoTthird International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017 : proceedings /
by:
(Electronic resources)
Fundamentals of digital forensicstheory, methods, and real-life applications /
by:
(Electronic resources)
Security in computer and information sciencesfirst International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018 : revised selected papers /
by:
(Electronic resources)
Towards autonomous robotic systems19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXXII32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018 : proceedings /
by:
(Electronic resources)
ICT systems security and privacy protection33rd IFIP TC 11 International Conference, SEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018 : proceedings /
by:
(Electronic resources)
Computer Security23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018 : proceedings.Part II /
by:
(Electronic resources)
Computer Security23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018 : proceedings.Part I /
by:
(Electronic resources)
Cellular automata13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17-21, 2018 : proceedings /
by:
(Electronic resources)
Critical information infrastructures security12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017 : revised selected papers /
by:
(Electronic resources)
Soft computing systemssecond International Conference, ICSCS 2018, Kollam, India, April 19-20, 2018 : revised selected papers /
by:
(Electronic resources)
Cloud Computing and Security4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018 : revised selected papers.Part IV /
by:
(Electronic resources)
Electronic votingthird International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018 : proceedings /
by:
(Electronic resources)
Applications and techniques in information security9th International Conference, ATIS 2018, Nanning, China, November 9-11, 2018 : proceedings /
by:
(Electronic resources)
Frontiers in cyber securityfirst International Conference, FCS 2018, Chengdu, China, November 5-7, 2018 : proceedings /
by:
(Electronic resources)
Provable security12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018 : proceedings /
by:
(Electronic resources)
Show more
Fewer
Subjects