Data Encryption.
Overview
Works: | 258 works in 255 publications in 255 languages |
---|
Titles
Prime numbers and computer methods for factorization[electronic resource] /
by:
(Language materials, printed)
RFID: Security and privacy[electronic resource] :7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011 : revised selected papers /
by:
(Language materials, printed)
Theory of security and applications[electronic resource] :Joint Workshop, TOSCA 2011, Saarbrucken, Germany, March 31 - April 1, 2011 : revised selected papers /
by:
(Language materials, printed)
Foundations and practice of security[electronic resource] :4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers /
by:
(Language materials, printed)
Security and intelligent information systems[electronic resource] :International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011 : revised selected papers /
by:
(Language materials, printed)
Financial cryptography and data security[electronic resource] :15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011 : revised selected papers /
by:
(Language materials, printed)
Open problems in network security[electronic resource] :IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011 : revised selected papers /
by:
(Language materials, printed)
Information security applications[electronic resource] :12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011 : revised selected papers /
by:
(Language materials, printed)
Topics in Cryptology - CT-RSA 2012[electronic resource] :the Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012 : proceedings /
by:
(Language materials, printed)
Distributed computing and internet technology[electronic resource] :8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012 : proceedings /
by:
(Language materials, printed)
Engineering secure software and systems[electronic resource] :4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012 : proceedings /
by:
(Language materials, printed)
Cryptography and security[electronic resource] :from theory to applications : essays dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday /
by:
(Language materials, printed)
Selected areas in cryptography[electronic resource] :18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011 : revised selected papers /
by:
(Language materials, printed)
Principles of security and trust[electronic resource] :first international conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012 : proceedings /
by:
(Language materials, printed)
Transactions on Data Hiding and Multimedia Security VII[electronic resource] /
by:
(Language materials, printed)
Data privacy management and autonomous spontaneus security[electronic resource] :6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011 : revised selected papers /
by:
(Language materials, printed)
Theory of cryptography[electronic resource] :9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012 : proceedings /
by:
(Language materials, printed)
Critical infrastructure protection[electronic resource] :information infrastructure models, analysis, and defense /
by:
(Language materials, printed)
The economics of financial and medical identity theft[electronic resource] /
by:
(Language materials, printed)
Information security technology for applications[electronic resource] :15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010 : revised selected papers /
by:
(Language materials, printed)
Advances in cryptology - EUROCRYPT 2012[electronic resource] :31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012 : proceedings /
by:
(Language materials, printed)
Information security practice and experience[electronic resource] :8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012 : proceedings /
by:
(Language materials, printed)
Information security technology for applications[electronic resource] :16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011 : revised selected papers /
by:
(Language materials, printed)
Constructive side-channel analysis and secure design[electronic resource] :Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012 : proceedings /
by:
(Language materials, printed)
Security and trust management[electronic resource] :7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011 : revised selected papers /
by:
(Language materials, printed)
Ad hoc networks[electronic resource] :third International ICST Conference, ADHOCNETS 2011, Paris, France, September 21-23, 2011 : revised selected papers /
by:
(Language materials, printed)
Trust management VI[electronic resource] :6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings /
by:
(Language materials, printed)
Public key infrastructures, services and applications[electronic resource] :8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers /
by:
(Language materials, printed)
Financial cryptography and data security[electronic resource] :FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28-March 4, 2011, Revised selected papers /
by:
(Language materials, printed)
NETWORKING 2012[electronic resource] :11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012 : proceedings.Part I /
by:
(Language materials, printed)
NETWORKING 2012[electronic resource] :11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012 : proceedings.Part II /
by:
(Language materials, printed)
Public key cryptography - PKC 2012[electronic resource] :15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012 : proceedings /
by:
(Language materials, printed)
Computer applications for security, control and system engineering[electronic resource] :International Conferences, SecTech, CA, CES3 2012, held in conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012 : proceedings /
by:
(Language materials, printed)
Advances in information and computer security[electronic resource] :7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012 : proceedings /
by:
(Language materials, printed)
Network and system security[electronic resource] :6th international conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings /
by:
(Language materials, printed)
Advances in Cryptology - ASIACRYPT 2012[electronic resource] :18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012 : proceedings /
by:
(Language materials, printed)
Multiple access communications[electronic resource] :5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012 : proceedings /
by:
(Language materials, printed)
Information security applications[electronic resource] :13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers /
by:
(Language materials, printed)
Computer security[electronic resource] :ESORICS 2008 : 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008 : proceedings /
by:
(Language materials, printed)
Information and communications security[electronic resource] :10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 : proceedings /
by:
(Language materials, printed)
Information hiding[electronic resource] :10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008 : revised selected papers /
by:
(Language materials, printed)
Network and parallel computing[electronic resource] :IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008 : proceedings /
by:
(Language materials, printed)
Post-quantum cryptography[electronic resource] :second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings /
by:
(Language materials, printed)
Principles, systems and applications of IP telecommunications[electronic resource] :services and security for next generation networks : second international conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008, revised selected papers /
by:
(Language materials, printed)
Provable security[electronic resource] :second international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings /
by:
(Language materials, printed)
Research in cryptology[electronic resource] :second western European workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007 : revised selected papers /
by:
(Language materials, printed)
Advances in digital forensics VIII[electronic resource] :8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012 : revised selected papers /
by:
(Language materials, printed)
Advances in information technology[electronic resource] :5th international conference, IAIT 2012, Bangkok, Thailand, December 6-7, 2012 : proceedings /
by:
(Language materials, printed)
Computer applications for bio-technology, multimedia, and ubiquitous city[electronic resource] :international conferences MulGraB, BSBT and IUrC 2012 Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012 : proceedings /
by:
(Language materials, printed)
Cyberspace safety and security[electronic resource] :4th international symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012 : proceedings /
by:
(Language materials, printed)
Progress in cryptology - INDOCRYPT 2012[electronic resource] :13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012 : proceedings /
by:
(Language materials, printed)
Information systems security[electronic resource] :8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(Language materials, printed)
Trusted systems[electronic resource] :4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(Language materials, printed)
Cryptology and network security[electronic resource] :11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
(Language materials, printed)
Security protocols XX[electronic resource] :20th international workshop, Cambridge, UK, April 12-13, 2012 : revised selected papers /
by:
(Language materials, printed)
Querying over encrypted data in smart grids[electronic resource] /
by:
(Language materials, printed)
Progress in cryptology - AFRICACRYPT 2014[electronic resource] :7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014 : proceedings /
by:
(Language materials, printed)
Secure data management[electronic resource] :10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013 : proceedings /
by:
(Language materials, printed)
Engineering secure future internet services and systems[electronic resource] :current research /
by:
(Language materials, printed)
Selected areas in cryptography - SAC 2013[electronic resource] :20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers /
by:
(Language materials, printed)
Cryptography and security systems[electronic resource] :Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014 : proceedings /
by:
(Language materials, printed)
Trust, privacy, and security in digital business[electronic resource] :11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014 : proceedings /
by:
(Language materials, printed)
Advances in information and computer security[electronic resource] :9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014 : proceedings /
by:
(Language materials, printed)
Foundations of security analysis and design VII[electronic resource] :FOSAD 2012/2013 tutorial lectures /
by:
(Language materials, printed)
Constructive side-channel analysis and secure design[electronic resource] :5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014 : revised selected papers /
by:
(Language materials, printed)
Security and cryptography for networks[electronic resource] :9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014 : proceedings /
by:
(Language materials, printed)
Computer security - ESORICS 2014[electronic resource] :19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014 : proceedings.Part I /
by:
(Language materials, printed)
Computer security - ESORICS 2014[electronic resource] :19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014 : proceedings.Part II /
by:
(Language materials, printed)
Communications and multimedia security[electronic resource] :15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 : proceedings /
by:
(Language materials, printed)
Platform embedded security technology revealed[electronic resource] :safeguarding the future of computing with intel embedded security and management engine /
by:
(Language materials, printed)
Applied cryptography and network security[electronic resource] :12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014 : proceedings /
by:
(Language materials, printed)
Smart card research and advanced applications[electronic resource] :12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013 : revised selected papers /
by:
(Language materials, printed)
Privacy enhancing technologies[electronic resource] :14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings /
by:
(Language materials, printed)
Trust and trustworthy computing[electronic resource] :7th International Conference, TRUST 2014, Heraklion, Crete, June 30 - July 2, 2014 : proceedings /
by:
(Language materials, printed)
Information security theory and practice[electronic resource] :securing the internet of things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014 : proceedings /
by:
(Language materials, printed)
Healthcare information privacy and security[electronic resource] :regulatory compliance and data security in the age of electronic health records /
by:
(Language materials, printed)
Information security and privacy[electronic resource] :19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014 : proceedings /
by:
(Language materials, printed)
Digital-forensics and watermarking[electronic resource] :12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013 : revised selected papers /
by:
(Language materials, printed)
Fast software encryption[electronic resource] :20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : revised selected papers /
by:
(Language materials, printed)
Advances in cryptology - CRYPTO 2014[electronic resource] :34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014 : proceedings.Part I /
by:
(Language materials, printed)
Advances in cryptology - CRYPTO 2014[electronic resource] :34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014 : proceedings.Part II /
by:
(Language materials, printed)
Soliton coding for secured optical communication link[electronic resource] /
by:
(Language materials, printed)
Attribute-based credentials for trust[electronic resource] :identity in the information society /
by:
(Language materials, printed)
Information security applications[electronic resource] :15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014 : revised selected papers /
by:
(Language materials, printed)
SOFSEM 2015[electronic resource] :theory and practice of computer science : 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Snezkou, Czech Republic, January 24-29, 2015 : proceedings /
by:
(Language materials, printed)
A practical guide to TPM 2.0[electronic resource] :using the new Trusted Platform Module in the new age of security /
by:
(Language materials, printed)
Engineering secure software and systems[electronic resource] :7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015 : proceedings /
by:
(Language materials, printed)
Arithmetic of finite fields[electronic resource] :5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014 : revised selected papers /
by:
(Language materials, printed)
Secure information management using linguistic threshold approach[electronic resource] /
by:
(Language materials, printed)
Security, privacy and trust in cloud systems[electronic resource] /
by:
(Language materials, printed)
What is computer science?[electronic resource] :an information security perspective /
by:
(Language materials, printed)
Security and privacy for implantable medical devices[electronic resource] /
by:
(Language materials, printed)
Information theoretic security[electronic resource] :7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(Language materials, printed)
Pairing-based cryptography - Pairing 2013[electronic resource] :6th International Conference, Beijing, China, November 22-24, 2013 : revised selected papers /
by:
(Language materials, printed)
Public key infrastructures, services and applications[electronic resource] :10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013 : revised selected papers /
by:
(Language materials, printed)
Communication networks for smart grids[electronic resource] :making smart grid real /
by:
(Language materials, printed)
Recent trends in computer networks and distributed systems security[electronic resource] :second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014 : proceedings /
by:
(Language materials, printed)
Topics in cryptology - CT-RSA 2014[electronic resource] :the Cryptographer's track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014 : proceedings /
by:
(Language materials, printed)
Engineering secure software and systems[electronic resource] :6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014 : proceedings /
by:
(Language materials, printed)
Theory of cryptography[electronic resource] :11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014 : proceedings /
by:
(Language materials, printed)
Public-key cryptography - PKC 2014[electronic resource] :17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014 : proceedings /
by:
(Language materials, printed)
Information security applications[electronic resource] :14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers /
by:
(Language materials, printed)
Foundations and practice of security[electronic resource] :6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013 : revised selected papers /
by:
(Language materials, printed)
Data privacy management and autonomous spontaneous security[electronic resource] :8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013 : revised selected papers /
by:
(Language materials, printed)
Principles of security and trust[electronic resource] :Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014 : proceedings /
by:
(Language materials, printed)
Transactions on data hiding and multimedia security IX[electronic resource] :Special Issue on Visual Cryptography /
by:
(Language materials, printed)
Building the infrastructure for cloud security[electronic resource] :a solutions view /
by:
(Language materials, printed)
The privacy engineer's manifesto[electronic resource] :getting from policy to code to QA to value /
by:
(Language materials, printed)
ICT systems security and privacy protection[electronic resource] :30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /
by:
(Electronic resources)
Codes, cryptology, and information security[electronic resource] :first International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015 : proceedings - In Honor of Thierry Berger /
by:
(Electronic resources)
Enterprise cybersecurity[electronic resource] :how to build a successful cyberdefense program against advanced threats /
by:
(Electronic resources)
Information security and privacy[electronic resource] :20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015 : proceedings /
by:
(Language materials, printed)
Cryptography and information security in the Balkans[electronic resource] :first International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014 : revised selected papers /
by:
(Language materials, printed)
Constructive side-channel analysis and secure design[electronic resource] :6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015 : revised selected papers /
by:
(Language materials, printed)
Financial cryptography and data security[electronic resource] :19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015 : revised selected papers /
by:
(Language materials, printed)
Advances in cryptology - CRYPTO 2015[electronic resource] :35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015 : proceedings.Part I /
by:
(Language materials, printed)
Advances in cryptology - CRYPTO 2015[electronic resource] :35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015 : proceedings.Part II /
by:
(Language materials, printed)
Encrypted email[electronic resource] :the history and technology of message privacy /
by:
(Language materials, printed)
Information and communications security[electronic resource] :16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014 : revised selected papers /
by:
(Language materials, printed)
Progress in Cryptology - LATINCRYPT 2015[electronic resource] :4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015 : proceedings /
by:
(Language materials, printed)
E-Voting and identity[electronic resource] :5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015 : proceedings /
by:
(Language materials, printed)
Trust and trustworthy computing[electronic resource] :8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015 : proceedings /
by:
(Language materials, printed)
Information security theory and practice[electronic resource] :9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 : proceedings /
by:
(Language materials, printed)
Fast software encryption[electronic resource] :22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015 : revised selected papers /
by:
(Language materials, printed)
Cryptographic hardware and embedded systems - CHES 2015[electronic resource] :17th International Workshop, Saint-Malo, France, September 13-16, 2015 : proceedings /
by:
(Language materials, printed)
Secure wireless sensor networks[electronic resource] :threats and solutions /
by:
(Language materials, printed)
Smart TV security[electronic resource] :media playback and digital video broadcast /
by:
(Language materials, printed)
Advances in Digital Forensics XI[electronic resource] :11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015 : revised selected papers /
by:
(Language materials, printed)
Cyber denial, deception and counter deception[electronic resource] :a framework for supporting active cyber defense /
by:
(Language materials, printed)
Applications and techniques in information security[electronic resource] :6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
by:
(Language materials, printed)
Algebraic informatics[electronic resource] :6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015 : proceedings /
by:
(Language materials, printed)
Security, privacy, and applied cryptography engineering[electronic resource] :5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015 : proceedings /
by:
(Language materials, printed)
Technology and practice of passwords[electronic resource] :International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014 : revised selected papers /
by:
(Language materials, printed)
Security and trust management[electronic resource] :11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015 : proceedings /
by:
(Language materials, printed)
Network and system security[electronic resource] :9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(Language materials, printed)
Advanced concepts for intelligent vision systems[electronic resource] :16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015 : proceedings /
by:
(Language materials, printed)
Provable security[electronic resource] :9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(Language materials, printed)
Security protocols XXIII[electronic resource] :23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(Language materials, printed)
Future data and security engineering[electronic resource] :second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015 : proceedings /
by:
(Language materials, printed)
Secure IT systems[electronic resource] :20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(Language materials, printed)
Progress in cryptology - INDOCRYPT 2015[electronic resource] :16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015 : proceedings /
by:
(Language materials, printed)
Cryptology and network security[electronic resource] :14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015 : proceedings /
by:
(Language materials, printed)
Internet of vehicles - safe and intelligent mobility[electronic resource] :second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015 : proceedings /
by:
(Language materials, printed)
Financial cryptography and data security[electronic resource] :FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015 : revised selected papers /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 2015[electronic resource] :21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part I /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 2015[electronic resource] :21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part II /
by:
(Language materials, printed)
Cyber operations[electronic resource] :building, defending, and attacking modern computer networks /
by:
(Language materials, printed)
Information systems security[electronic resource] :11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings /
by:
(Language materials, printed)
Security standardisation research[electronic resource] :second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015 : proceedings /
by:
(Language materials, printed)
Cryptography and coding[electronic resource] :15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(Language materials, printed)
Cloud computing and security[electronic resource] :first International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015 : revised selected papers /
by:
(Language materials, printed)
Innovative security solutions for information technology and communications[electronic resource] :8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : revised selected papers /
by:
(Language materials, printed)
Trusted systems[electronic resource] :6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers /
by:
(Language materials, printed)
Applied cryptography and network security[electronic resource] :13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : revised selected papers /
by:
(Language materials, printed)
Security and privacy in communication networks[electronic resource] :11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015 : revised selected papers /
by:
(Language materials, printed)
Lightweight cryptography for security and privacy[electronic resource] :4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015 : revised selected papers /
by:
(Language materials, printed)
Cryptography and information security in the Balkans[electronic resource] :second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015 : revised selected papers /
by:
(Language materials, printed)
Data privacy management, and security assurance[electronic resource] :10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015 : revised selected papers /
by:
(Language materials, printed)
Technology and practice of passwords[electronic resource] :9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015 : proceedings /
by:
(Language materials, printed)
Foundations and practice of security[electronic resource] :8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015 : revised selected papers /
by:
(Language materials, printed)
Engineering secure software and systems[electronic resource] :8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016 : proceedings /
by:
(Language materials, printed)
Smart card research and advanced applications[electronic resource] :14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015 : revised selected papers /
by:
(Language materials, printed)
Selected areas in cryptography - SAC 2015[electronic resource] :22nd International Conference, Sackville, NB, Canada, August 12-14, 2015 : revised selected papers /
by:
(Language materials, printed)
Digital-forensics and watermarking[electronic resource] :14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015 : revised selected papers /
by:
(Language materials, printed)
The new codebreakers[electronic resource] :essays dedicated to David Kahn on the occasion of his 85th birthday /
by:
(Language materials, printed)
Principles of security and trust[electronic resource] :5th International Conference, POST 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, the Netherlands, April 2-8, 2016 : proceedings /
by:
(Language materials, printed)
Progress in cryptology - AFRICACRYPT 2016[electronic resource] :8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016 : proceedings /
by:
(Language materials, printed)
Risks and security of internet and systems[electronic resource] :10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015 : revised selected papers /
by:
(Language materials, printed)
Open problems in network security[electronic resource] :IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015 : revised selected papers /
by:
(Language materials, printed)
Advances in cryptology - EUROCRYPT 2016[electronic resource] :35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.Part I /
by:
(Language materials, printed)
Advances in cryptology - EUROCRYPT 2016[electronic resource] :35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.Part II /
by:
(Language materials, printed)
Information security and cryptology[electronic resource] :11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015 : revised selected papers /
by:
(Language materials, printed)
Theory of cryptography[electronic resource] :13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.Part I /
by:
(Language materials, printed)
Theory of cryptography[electronic resource] :13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.Part II /
by:
(Language materials, printed)
SOFSEM 2016[electronic resource] :theory and practice of computer science : 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016 : proceedings /
by:
(Language materials, printed)
Post-quantum cryptography[electronic resource] :7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016 : proceedings /
by:
(Language materials, printed)
Topics in cryptology - CT-RSA 2016[electronic resource] :the Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016 : proceedings /
by:
(Language materials, printed)
Public-key cryptography - PKC 2016[electronic resource] :19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016 : proceedings.Part I /
by:
(Language materials, printed)
Public-key cryptography - PKC 2016[electronic resource] :19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016 : proceedings.Part II /
by:
(Language materials, printed)
Security and resiliency analytics for smart grids[electronic resource] :static and dynamic approaches /
by:
(Electronic resources)
Applied cryptography and network security[electronic resource] :14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings /
by:
(Electronic resources)
Information security and privacy[electronic resource] :21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.Part I /
by:
(Electronic resources)
Security of industrial control systems and cyber physical systems[electronic resource] :first Workshop, CyberICS 2015 and first Workshop, WOS-CPS 2015 Vienna, Austria, September 21-22, 2015 : revised selected papers /
by:
(Electronic resources)
Watermarking security[electronic resource] :fundamentals, secure designs and attacks /
by:
(Electronic resources)
Cyber-physical attack recovery procedures[electronic resource] :a step-by-step preparation and response guide /
by:
(Electronic resources)
Cyber deception[electronic resource] :building the scientific foundation /
by:
(Electronic resources)
Elements of cloud computing security[electronic resource] :a survey of key practicalities /
by:
(Electronic resources)
Information security and privacy[electronic resource] :21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.Part II /
by:
(Electronic resources)
Data and applications security and privacy XXX[electronic resource] :30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016 : proceedings /
by:
(Electronic resources)
Constructive side-channel analysis and secure design[electronic resource] :7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016 : revised selected papers /
by:
(Electronic resources)
Fast software encryption[electronic resource] :23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016 : revised selected papers /
by:
(Electronic resources)
Cyber-security of SCADA and other industrial control systems[electronic resource] /
by:
(Electronic resources)
Foundations of security analysis and design VIII[electronic resource] :FOSAD 2014/2015/2016 tutorial lectures /
by:
(Electronic resources)
Electronic government and the information systems perspective[electronic resource] :5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016 : proceedings /
by:
(Electronic resources)
Trust, privacy, and security in digital business[electronic resource] :13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016 : proceedings /
by:
(Electronic resources)
Database and expert systems applications[electronic resource] :27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016 : proceedings.Part I /
by:
(Electronic resources)
Database and expert systems applications[electronic resource] :27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016 : proceedings.Part II /
by:
(Electronic resources)
Security and cryptography for networks[electronic resource] :10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016 : proceedings /
by:
(Electronic resources)
Privacy in statistical databases[electronic resource] :UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14-16, 2016 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing[electronic resource] :9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016 : proceedings /
by:
(Electronic resources)
Information security[electronic resource] :19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2016[electronic resource] :18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security[electronic resource] :FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016 : revised selected papers /
by:
(Electronic resources)
Advances in digital forensics XII[electronic resource] :12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016 : revised selected papers /
by:
(Electronic resources)
Security in Computing and Communications[electronic resource] :4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings /
by:
(Electronic resources)
Applications and techniques in information security[electronic resource] :6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016 : proceedings /
by:
(Electronic resources)
Advances in information and computer security[electronic resource] :11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 2016[electronic resource] :21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016 : proceedings.Part II /
by:
(Electronic resources)
Computer security - ESORICS 2016[electronic resource] :21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016 : proceedings.Part I /
by:
(Electronic resources)
Information security theory and practice[electronic resource] :10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016 : proceedings /
by:
(Electronic resources)
Network and system security[electronic resource] :10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings /
by:
(Electronic resources)
Security and trust management[electronic resource] :12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016 : proceedings /
by:
(Electronic resources)
Data privacy management and security assurance[electronic resource] :11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016 : proceedings /
by:
(Electronic resources)
Elements of cloud storage security[electronic resource] :concepts, designs and optimized practices /
by:
(Electronic resources)
Innovative security solutions for information technology and communications[electronic resource] :9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016 : revised selected papers /
by:
(Electronic resources)
Secure IT systems[electronic resource] :21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016 : proceedings /
by:
(Electronic resources)
Cryptology and network security[electronic resource] :15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(Electronic resources)
Theory of cryptography[electronic resource] :14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.Part I /
by:
(Electronic resources)
Theory of cryptography[electronic resource] :14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.Part II /
by:
(Electronic resources)
Security standardisation research[electronic resource] :third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016 : proceedings /
by:
(Language materials, printed)
Security, privacy and anonymity in computation, communication and storage[electronic resource] :SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Language materials, printed)
Security, privacy, and anonymity in computation, communication, and storage[electronic resource] :9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Language materials, printed)
Information security practice and experience[electronic resource] :12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016 : proceedings /
by:
(Language materials, printed)
Information Theoretic Security[electronic resource] :9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016 : revised selected papers /
by:
(Language materials, printed)
Information systems security[electronic resource] :12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings /
by:
(Language materials, printed)
Information and communications security[electronic resource] :18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016 : proceedings /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 2016[electronic resource] :22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 : proceedings.Part I /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 2016[electronic resource] :22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 : proceedings.Part II /
by:
(Language materials, printed)
From hacking to report writing[electronic resource] :an introduction to security and penetration testing /
by:
(Language materials, printed)
Arithmetic of finite fields[electronic resource] :6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016 : revised selected papers /
by:
(Language materials, printed)
Preserving privacy against side-channel leaks[electronic resource] :from data publishing to web applications /
by:
(Electronic resources)
Advances in information and computer security[electronic resource] :10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015 : proceedings /
by:
(Language materials, printed)
Privacy-enhancing aggregation techniques for smart grid communications[electronic resource] /
by:
(Language materials, printed)
Digital watermarking techniques in curvelet and ridgelet domain[electronic resource] /
by:
(Language materials, printed)
ICT systems security and privacy protection[electronic resource] :31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings /
by:
(Language materials, printed)
Advances in cryptology - CRYPTO 2016[electronic resource] :36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings.Part II /
by:
(Electronic resources)
Subjects