Data Encryption.
Overview
Works: | 489 works in 489 publications in 489 languages |
---|
Titles
Advances in information technology = 5th international conference, IAIT 2012, Bangkok, Thailand, December 6-7, 2012 : proceedings /
by:
(Electronic resources)
Information systems security = 7th international conference, ICISS 2011, Kolkata, India, December 15-19, 2011 : procedings /
by:
(Electronic resources)
Topics in Cryptology - CT-RSA 2012 = the Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012 : proceedings /
by:
(Electronic resources)
Information security applications = 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011 : revised selected papers /
by:
(Electronic resources)
Smart card research and advanced applications = 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings /
by:
(Electronic resources)
Provable security = 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings /
by:
(Electronic resources)
Introduction to Modern Number Theory = Fundamental Problems, Ideas and Theories /
by:
(Electronic resources)
Recent trends in network security and applications = third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010, proceedings /
by:
(Electronic resources)
Privacy enhancing technologies = 11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27-29 2011 : proceedings /
by:
(Electronic resources)
Public key infrastructures, services and applications = 6th European workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009 : revised selected papers /
by:
(Electronic resources)
Financial Cryptography and Data Security = 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers /
by:
(Electronic resources)
Privacy and identity management for life = 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers /
by:
(Electronic resources)
Privacy in statistical databases = UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012 : proceedings /
by:
(Electronic resources)
Applied Cryptography and Network Security = 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings /
by:
(Electronic resources)
Information Security and Privacy = 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings /
by:
(Electronic resources)
Security protocols = 14th international workshop, Cambridge, UK, March 27-29 2006 : revised selected papers /
by:
(Electronic resources)
Future generation information technology = first international conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 : proceedings /
by:
(Electronic resources)
Advances in Cryptology - ASIACRYPT 2012 = 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012 : proceedings /
by:
(Electronic resources)
Secure data management = 6th VLDB workshop, SDM 2009, Lyon, France, August 28, 2009 : proceedings /
by:
(Electronic resources)
Wireless and mobile networking = Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009 : proceedings /
by:
(Electronic resources)
Fast Software Encryption = 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers /
by:
(Electronic resources)
Information Theoretic Security = Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings /
by:
(Electronic resources)
Secure Data Management = 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings /
by:
(Electronic resources)
Cryptology and network security = 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008, proceedings /
by:
(Electronic resources)
Selected Areas in Cryptography = 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, revised selected papers /
by:
(Electronic resources)
Provable security = third international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 2009 = 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009 : proceedings /
by:
(Electronic resources)
Moving target defense = creating asymmetric uncertainty for cyber threats /
by:
(Electronic resources)
Security and privacy in mobile information and communication systems = First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009 : revised selected papers /
by:
(Electronic resources)
Information security = 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 : proceedings /
by:
(Electronic resources)
Public Key Cryptography - PKC 2009 = 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2010 = the Cryptographers' track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010 : proceedings /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2010 = 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, proceedings /
by:
(Electronic resources)
Progress in cryptology - LATINCRYPT 2010 = First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedings /
by:
(Electronic resources)
E-voting and identity = second international conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009 : proceedings /
by:
(Electronic resources)
Information Systems Security : = First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
by:
(Electronic resources)
Public Key Infrastructure = Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30- July 1, 2005, Revised Selected Papers /
by:
(Electronic resources)
Theory of Cryptography = Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings /
by:
(Electronic resources)
Forensics in Telecommunications, Information and Multimedia = Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers /
by:
(Electronic resources)
Security aspects in information technology = first international conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011 : proceedings /
by:
(Electronic resources)
Information Security and Cryptology : = First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
by:
(Electronic resources)
Security and trust management = 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, revised selected papers /
by:
(Electronic resources)
Information and automation = international symposium, ISIA 2010, Guangzhou, China, November 10-11, 2010 : revised selected papers /
by:
(Electronic resources)
Advances in information and computer security = 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012 : proceedings /
by:
(Electronic resources)
Detection of intrusions and malware, and vulnerability assessment = 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 : proceedings /
by:
(Electronic resources)
Trust, Privacy, and Security in Digital Business = Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings /
by:
(Electronic resources)
Algorithmic number theory = 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010 : proceedings /
by:
(Electronic resources)
Communications and multimedia security = 11th IFIP TC 6/TC ; 11 international conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010 : proceedings /
by:
(Electronic resources)
Cyberspace Security and Defense: Research Issues = Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6-9 September 2004 /
by:
(Electronic resources)
Information systems, technology and management = 4th international conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010 : proceedings /
by:
(Electronic resources)
Information security, practice and experience = 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010 : proceedings /
by:
(Electronic resources)
Autonomic and trusted computing = 6th international conference, ATC 2009, Brisbane, Australia, July 7-9, 2009 ; proceedings /
by:
(Electronic resources)
Fast Software Encryption = 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers /
by:
(Electronic resources)
Information security and assurance = international conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011 : proceedings /
by:
(Electronic resources)
Cryptology and Network Security = 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings /
by:
(Electronic resources)
Advances in information security and its application = third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 ; proceedings /
by:
(Electronic resources)
Information and communications security = 13th international conference, ICICS 2011, Beijing, China, November 23-26, 2011 : proceedings /
by:
(Electronic resources)
Post-quantum cryptography = 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011 : proceedings /
by:
(Electronic resources)
Cryptology and network security = 10th international conference, CANS 2011, Sanya, China, December 10-12, 2011 : proceedings /
by:
(Electronic resources)
Information security = 14th international conference, ISC 2011, Xi'an, China, October 26-29, 2011 : proceedings /
by:
(Electronic resources)
Cryptographic Hardware and Embedded Systems - CHES 2005 = 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings /
by:
(Electronic resources)
Foundations of Security Analysis and Design III : = FOSAD 2004/2005 Tutorial Lectures
by:
(Electronic resources)
Advances in cryptology = CRYPTO 2011 : 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011 : proceedings /
by:
(Electronic resources)
Theory of cryptography = 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings /
by:
(Electronic resources)
Post-quantum cryptography = second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings /
by:
(Electronic resources)
Recent advances in intrusion detection = 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, proceedings /
by:
(Electronic resources)
IP operations and management = 8th IEEE international workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008 : proceedings /
by:
(Electronic resources)
Ad hoc networks = Second International Conference, ADHOCNETS 2010, Victoria, BC, Canada, August 18-20, 2010, revised selected papers /
by:
(Electronic resources)
Information security and cryptology = 7th international conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011 : revised selected papers /
by:
(Electronic resources)
Research in cryptology = second western European workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007 : revised selected papers /
by:
(Electronic resources)
Applied cryptography and network security = 8th international conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings /
by:
(Electronic resources)
Cyberspace safety and security = 4th international symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012 : proceedings /
by:
(Electronic resources)
Information security and privacy = 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, proceedings /
by:
(Electronic resources)
Collaborative networks for a sustainable world = 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010 : proceedings /
by:
(Electronic resources)
Information Security Practice and Experience = First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings /
by:
(Electronic resources)
Coding and cryptology = third international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011 : proceedings /
by:
(Electronic resources)
Topics in cryptology--CT-RSA 2009 = the Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009 ; proceedings /
by:
(Electronic resources)
Secure and trust computing, data management and applications = 8th FIRA international conference, STA 2011, Loutraki, Greece, June 28-30, 2011 : proceedings /
by:
(Electronic resources)
Privacy enhancing technologies = 9th international symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009 : proceedings /
by:
(Electronic resources)
Trusted computing = second international conference, Trust 2009, Oxford, UK, April 6-8, 2009 ; Proceedings /
by:
(Electronic resources)
Engineering secure software and systems = second international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 : proceedings /
by:
(Electronic resources)
Theory of Cryptography = Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings /
by:
(Electronic resources)
Eco-friendly computing and communication systems = International Conference, ICECCS 2012, Kochi, India, August 9-11, 2012 : proceedings /
by:
(Electronic resources)
Information Security and Cryptology = 4th international conference, Inscrypt 2008, Beijing, China, December 14-17, 2008 ; revised selected papers /
by:
(Electronic resources)
Trust Management IV = 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010 : proceedings /
by:
(Electronic resources)
Secure data management = 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011 : proceedings /
by:
(Electronic resources)
Critical information infrastructures security = 5th international workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010 : revised papers /
by:
(Electronic resources)
Open research problems in network security = IFIP WG 11.4 international workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010 : revised selected papers /
by:
(Electronic resources)
Certification and Security in Inter-Organizational E-Services = IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France /
by:
(Electronic resources)
Pro PHP security = from application security principles to the implementation of XSS defenses /
by:
(Electronic resources)
Progress in Cryptology - INDOCRYPT 2005 : = 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings
by:
(Electronic resources)
Engineering secure software and systems = third International symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011 : proceedings /
by:
(Electronic resources)
Trust, Privacy and Security in Digital Business = 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems = CHES 2011 : 13th international workshop, Nara, Japan, September 28 - October 1, 2011 : proceedings /
by:
(Electronic resources)
Sequences and Their Applications - SETA 2004 = Third International Conference, Seoul, Korea, October 24-28, 2004, Revised Selected Papers /
by:
(Electronic resources)
Emerging challenges for security, privacy and trust = 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings /
by:
(Electronic resources)
Arithmetic of Finite Fields = 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings /
by:
(Electronic resources)
Information systems security = 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings /
by:
(Electronic resources)
Cryptography and security = from theory to applications : essays dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday /
by:
(Electronic resources)
Information security theory and practice = security, privacy and trust in computing systems and ambient intelligent ecosystems : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012 : proceedings /
by:
(Electronic resources)
Information security theory and practice = security and privacy of mobile devices in wireless communication : 5th IFIP WG 11.2 international workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011 : proceedings /
by:
(Electronic resources)
Quantum communication and quantum networking = First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009 : revised selected papers /
by:
(Electronic resources)
Public key infrastructures, services and applications = 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers /
by:
(Electronic resources)
Research in cryptology = 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011 : revised selected papers /
by:
(Electronic resources)
Multiple access communications = 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012 : proceedings /
by:
(Electronic resources)
Communications and multimedia security = 12th IFIP TC 6 / TC 11 international conference, CMS 2011, Ghent, Belgium, October 19-21,2011 : proceedings /
by:
(Electronic resources)
Principles, systems and applications of IP telecommunications = services and security for next generation networks : second international conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008, revised selected papers /
by:
(Electronic resources)
Information security applications = 11th international workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology - ICISC 2008 = 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers /
by:
(Electronic resources)
Critical infrastructure protection V = 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, revised selected papers /
by:
(Electronic resources)
Information and communications security = 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 : proceedings /
by:
(Electronic resources)
Sequences and Their Applications - SETA 2008 = 5th International Conference Lexington, KY, USA, September 14-18, 2008 Proceedings /
by:
(Electronic resources)
Information security practice and experience = 5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 ; proceedings /
by:
(Electronic resources)
E-government, e-services and global processes = Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010, proceedings /
by:
(Electronic resources)
Coding Theory and Applications = Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings /
by:
(Electronic resources)
Personal Satellite Services = International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009 : revised selected papers /
by:
(Electronic resources)
Cryptology and network security = 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
(Electronic resources)
Information Security and Cryptology = Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers /
by:
(Electronic resources)
Cryptographic Hardware and Embedded Systems -- CHES 2008 = 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings /
by:
(Electronic resources)
Data and Applications Security XXII = 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings /
by:
(Electronic resources)
Security and cryptography for networks = 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012 : proceedings /
by:
(Electronic resources)
Security and privacy in mobile information and communication systems = Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, revised selected papers /
by:
(Electronic resources)
Foundations and applications of security analysis = Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009 : revised selected papers /
by:
(Electronic resources)
Digital watermarking = 8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security = 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011 : revised selected papers /
by:
(Electronic resources)
Information systems, technology and management = Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings /
by:
(Electronic resources)
Security in Ad-hoc and Sensor Networks = First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers /
by:
(Electronic resources)
Pairing-Based Cryptography -- Pairing 2008 = Second International Conference, Egham, UK, September 1-3, 2008. Proceedings /
by:
(Electronic resources)
Security and Cryptography for Networks = 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings /
by:
(Electronic resources)
Communications and Multimedia Security : = 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings
by:
(Electronic resources)
Detection of Intrusions and Malware, and Vulnerability Assessment = 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings /
by:
(Electronic resources)
Security and Privacy in the Age of Ubiquitous Computing = IFIP TC11 20th International Information Security Conference May 30-June 1, 2005, Chiba, Japan /
by:
(Electronic resources)
Studies in complexity and cryptography = miscellanea on the interplay between randomness and computation /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2010 = 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 : proceedings /
by:
(Electronic resources)
Fast Software Encryption = 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers /
by:
(Electronic resources)
Trust, privacy and security in digital business = 8th international conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011 : proceedings /
by:
(Electronic resources)
Progress in cryptology = AFRICACRYP T 2011 : 4th international conference on cryptology in Africa, Dakar, Senegal, July 5-7, 2011 : proceedings /
by:
(Electronic resources)
Software and data technologies = Third International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008 : revised selected papers /
by:
(Electronic resources)
Selected areas in cryptography = 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010 : revised selected papers /
by:
(Electronic resources)
Financial Cryptography and Data Security = 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 - March 3, 2005, Revised Papers /
by:
(Electronic resources)
Transactions on computational science XI = special issue on security in computing, part II /
by:
(Electronic resources)
Embedded and Ubiquitous Computing - EUC 2005 Workshops : = EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 8-9, 2005
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 2010 = 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010 : proceedings /
by:
(Electronic resources)
Engineering secure software and systems = First international symposium, ESSoS 2009, Leuven, Belgium, February 4-6, 2009, proceedings /
by:
(Electronic resources)
Information security practice and experience = 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 : proceedings /
by:
(Electronic resources)
Data and Applications Security XIX = 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings /
by:
(Electronic resources)
Applied Cryptography and Network Security = Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings /
by:
(Electronic resources)
Cryptology and Network Security : = 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings
by:
(Electronic resources)
Cryptography and coding = 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 : proceedings /
by:
(Electronic resources)
Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government = 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E' 2005), October 28-30, 2005, Poznan, Poland /
by:
(Electronic resources)
Information and Communications Security : = 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings
by:
(Electronic resources)
Information security applications = 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers /
by:
(Electronic resources)
Autonomic and Trusted Computing = 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings /
by:
(Electronic resources)
Advances in Cryptology - CRYPTO 2005 = 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings /
by:
(Electronic resources)
Selected areas in cryptography = 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011 : revised selected papers /
by:
(Electronic resources)
Information theoretic security = 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings /
by:
(Electronic resources)
Pairing-based cryptography - Pairing 2009 = Third International Conference Palo Alto, CA, USA, August 12-14, 2009 : Proceedings /
by:
(Electronic resources)
RFID: Security and privacy = 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Principles of security and trust = first international conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012 : proceedings /
by:
(Electronic resources)
Identity and privacy in the internet age = 14th Nordic Conference on Secure It Systems, Nordsec 2009, Oslo, Norway, 14-16 October 2009 : proceedings /
by:
(Electronic resources)
Foundations and practice of security = 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers /
by:
(Electronic resources)
Security in Communication Networks = 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers /
by:
(Electronic resources)
Information security theory and practices = smart devices, convergence and next generation networks : second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 : proceedings /
by:
(Electronic resources)
Future challenges in security and privacy for academia and industry = 26th IFIP TC 11 international information security conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011 : proceedings /
by:
(Electronic resources)
Security technology = international conference, SecTech 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011 : proceedings /
by:
(Electronic resources)
Digital Watermarking : = 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings
by:
(Electronic resources)
Formal aspects of security and trust = 7th international workshop, FAST 2010, Pisa, Italy, September 16-17, 2010 : revised selected papers /
by:
(Electronic resources)
Recent advances in intrusion detection = 11th international symposium, RAID 2008 : Cambridge, MA, USA September 15-17 2008 : proceedings /
by:
(Electronic resources)
Advances in security technology = International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008 : revised selected papers /
by:
(Electronic resources)
Protecting persons while protecting the people = second annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 : revised selected papers /
by:
(Electronic resources)
Global security, safety, and sustainability = 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, proceedings /
by:
(Electronic resources)
Personal satellite services = second international ICST confernce, PSATS 2010, Rome, Italy, February 2010 : revised selected papers /
by:
(Electronic resources)
Foundations of security analysis and design V = FOSAD 2007/2008/2009 tutorial lectures /
by:
(Electronic resources)
e-Business and telecommunications = 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009 : revised selected papers /
by:
(Electronic resources)
Algorithmic number theory = 8th international symposium, ANTS-VIII, Banff, Canada, May 17-22, 2008 : proceedings /
by:
(Electronic resources)
Information security technology for applications = 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010 : revised selected papers /
by:
(Electronic resources)
Information and communications security = 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 : proceedings /
by:
(Electronic resources)
Security protocols XX = 20th international workshop, Cambridge, UK, April 12-13, 2012 : revised selected papers /
by:
(Electronic resources)
Security, privacy, and applied cryptography engineering = second international conference, SPACE 2012, Chennai, India, November 3-4, 2012 : proceedings /
by:
(Electronic resources)
Ethics and policy of biometrics = Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010 : revised papers /
by:
(Electronic resources)
Trusted systems = 4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(Electronic resources)
Public Key Cryptography ??PKC 2008 = 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings /
by:
(Electronic resources)
Information theoretic security = 5th international conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXIV = 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2009 = 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 : proceedings /
by:
(Electronic resources)
Trust management V = 5th IFIP WG 11.11 international conference, IFIPTM 2011, Copenhagen, Denmark, June 29 - July 1, 2011 : proceedings /
by:
(Electronic resources)
E-business and telecommunications = international conference, ICETE 2008, Porto, Portugal, July 26 - 29, 2008 : revised selected papers /
by:
(Electronic resources)
Critical information infrastructures security = second international workshop, CRITIS 2007, Malaga, Spain, October 3-5, 2007 : revised papers /
by:
(Electronic resources)
Public key cryptography - PKC 2010 = 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings /
by:
(Electronic resources)
Digital watermarking = 6th international workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 proceedings /
by:
(Electronic resources)
Information and communications security = 11th international conference, ICICS 2009, Beijing, China, December 14-17, 2009 : proceedings /
by:
(Electronic resources)
Communications and multimedia security = 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012 : proceedings /
by:
(Electronic resources)
Information security = 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012 : proceedings /
by:
(Electronic resources)
Critical infrastructure protection = information infrastructure models, analysis, and defense /
by:
(Electronic resources)
Digital watermarking = 9th international workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 : revised selected papers /
by:
(Electronic resources)
Information Security and Cryptology - ICISC 2004 = 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers /
by:
(Electronic resources)
Information security theory and practices = security and privacy of pervasive systems and smart devices : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010 : proceedings /
by:
(Electronic resources)
Progress in cryptology - AFRICACRYPT 2012 = 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 2012 = 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012 : proceedings /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2009 = 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings /
by:
(Electronic resources)
Ad hoc networks = third International ICST Conference, ADHOCNETS 2011, Paris, France, September 21-23, 2011 : revised selected papers /
by:
(Electronic resources)
Data and applications security XXIII = 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security = FC 2012 workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012 : revised selected papers /
by:
(Electronic resources)
Open problems in network security = IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011 : revised selected papers /
by:
(Electronic resources)
Advances in digital forensics VIII = 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012 : revised selected papers /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2010 = 12th international workshop, Santa Barbara, USA, August 17-20, 2010 : proceedings /
by:
(Electronic resources)
Security and privacy in communication networks = 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011 : revised selected papers /
by:
(Electronic resources)
Pairing-based cryptography - Pairing 2010 = 4th international conference, Yamanaka Hot Spring, Japan, December 2010, proceedings /
by:
(Electronic resources)
Progress in Cryptology - Mycrypt 2005 : = First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings
by:
(Electronic resources)
NETWORKING 2012 = 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012 : proceedings.. Part I /
by:
(Electronic resources)
NETWORKING 2010 = 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010 : proceedings /
by:
(Electronic resources)
Mobile Ad-hoc and Sensor Networks : = First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings
by:
(Electronic resources)
Computer applications for security, control and system engineering = International Conferences, SecTech, CA, CES3 2012, held in conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing = third international conference, TRUST 2010, Berlin, Germany, June 21-23, 2010 : proceedings /
by:
(Electronic resources)
Fast software encryption = 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012 : revised selected papers /
by:
(Electronic resources)
Computer security - ESORICS 2009 = 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009 : proceedings /
by:
(Electronic resources)
Information security and digital forensics = First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009 : revised selected papers /
by:
(Electronic resources)
Advances in Cryptology - ASIACRYPT 2005 : = 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings
by:
(Electronic resources)
Advances in cryptology = ASIACRYPT 2011 : 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4-8, 2011 : proceedings /
by:
(Electronic resources)
Topics in Cryptology -- CT-RSA 2005 = The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings /
by:
(Electronic resources)
Information security applications = 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers /
by:
(Electronic resources)
Autonomic and trusted computing = 8th international conference, ATC 2011, Banff, Canada, September 2-4, 2011 : proceedings /
by:
(Electronic resources)
Information Security and Privacy = 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011 : proceedings /
by:
(Electronic resources)
Recent advances in intrusion detection = 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 : proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2012 = 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012 : proceedings /
by:
(Electronic resources)
Advances in Cryptology - EUROCRYPT 2005 = 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings /
by:
(Electronic resources)
Critical information infrastructures security = 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 : revised papers /
by:
(Electronic resources)
Information security practice and experience = 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012 : proceedings /
by:
(Electronic resources)
Cryptography and Coding : = 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings
by:
(Electronic resources)
Trust and trustworthy computing = 4th international conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXV = 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011 : proceedings /
by:
(Electronic resources)
Recent trends in computer networks and distributed systems security = International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012 : proceedings /
by:
(Electronic resources)
Information hiding = 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers /
by:
(Electronic resources)
Safety and security in multiagen systems = research results from 2004-2006 /
by:
(Electronic resources)
Progress in cryptology - Africacrypt 2008 = first international conference on cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. proceedings /
by:
(Electronic resources)
Security protocols = 15th international workshop, Brno, Czech Republic, April 18-20, 2007 : revised selected papers /
by:
(Electronic resources)
Advances in Cryptology -- CRYPTO 2008 = 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings /
by:
(Electronic resources)
Information Hiding : = 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers
by:
(Electronic resources)
Trust management VI = 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings /
by:
(Electronic resources)
Trustworthy global computing = 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011 : revised selected papers /
by:
(Electronic resources)
Information security and privacy research = 27th IFIP TC 11 information security and privacy conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXVI = 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 : Proceedings /
by:
(Electronic resources)
Distributed computing and networking = 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010 : proceedings /
by:
(Electronic resources)
Arithmetic of finite fields = third international workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 2008 = 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008, proceedings /
by:
(Electronic resources)
Information and communications security = 14th international conference, ICICS 2012, Hong Kong, China, October 29-31, 2012 : proceedings /
by:
(Electronic resources)
Secure IT systems = 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 : proceedings /
by:
(Electronic resources)
Data privacy management and autonomous spontaneous security = 5th international workshop, DPM 2010 and 3rd international workshop, SETOP 2010, Athens, Greece, September 23, 2010 : revised selected papers /
by:
(Electronic resources)
Network and system security = 6th international conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings /
by:
(Electronic resources)
Public key cryptography = PKC 2011 : 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6-9, 2011 : proceedings /
by:
(Electronic resources)
Information security theory and practice = smart devices, pervasive systems, and ubiquitous networks ; third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 ; proceedings /
by:
(Electronic resources)
Global E-Security = 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings /
by:
(Electronic resources)
Trusted Computing - Challenges and Applications = First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings /
by:
(Electronic resources)
Information hiding = 10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008 : revised selected papers /
by:
(Electronic resources)
Smart card research and advanced application = 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proceedings /
by:
(Electronic resources)
Trust, privacy and security in digital business = 6th international conference, TrustBus 2009, Linz, Austria, September 3-4, 2009 : proceedings /
by:
(Electronic resources)
Provable security = second international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings /
by:
(Electronic resources)
Global security, safety, and sustainability = 5th international conference, ICGS3 2009, London, UK, September 1-2, 2009 : proceedings /
by:
(Electronic resources)
Radio frequency identification = security and privacy issues : 6th international workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010 : revised selected papers /
by:
(Electronic resources)
Advances in Information and computer security = 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, proceedings /
by:
(Electronic resources)
Foundations of security analysis and design VI = FOSAD tutorial lectures /
by:
(Electronic resources)
Public key infrastructures, services and applications = 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010 : revised selected papers /
by:
(Electronic resources)
Secure data management = 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, proceedings /
by:
(Electronic resources)
Trust, privacy and security in digital business = 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, proceedings /
by:
(Electronic resources)
Provable security = 5th international conference, ProvSec 2011, Xi'an, China, October 16-18, 2011 : proceedings /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2012 = 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012 : proceedings /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2010 = 16th international conference on the theory and application of cryptology and information security, Singapore, December 5-9, 2010 : proceedings /
by:
(Electronic resources)
Computer security = ESORICS 2011 : 16th European symposium on research in computer security, Leuven, Belgium, September 12-14,2011 : proceedings /
by:
(Electronic resources)
Progress in cryptology = INDOCRYPT 2011 : 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011 : proceedings /
by:
(Electronic resources)
Detection of intrusions and malware, and vulnerability assessment = 8th international conference, DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011 : proceedings /
by:
(Electronic resources)
Formal aspects in security and trust = 5th international workshop, FAST 2008, Malaga, Spain, October 9-10, 2008 ; revised selected papers /
by:
(Electronic resources)
Information security applications = 9th international workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, revised selected papers /
by:
(Electronic resources)
Information security and cryptology = 6th international conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010 : revised selected papers /
by:
(Electronic resources)
Information security and assurance = 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, proceedings /
by:
(Electronic resources)
Communication and networking = International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010, proceedings.. Part I /
by:
(Electronic resources)
Computer Security - ESORICS 2005 : = 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings
by:
(Electronic resources)
Information security and cryptology = ICISC 2010 : 13th international conference, Seoul, Korea, December 1-3, 2010 : revised selected papers /
by:
(Electronic resources)
The future of identity in the information society = 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008 : Revised Selected Papers /
by:
(Electronic resources)
Trust and trustworthy computing = 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012 : proceedings /
by:
(Electronic resources)
Security and privacy - silver linings in the cloud = 25th IFIP TC-11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010, proceedings /
by:
(Electronic resources)
Public Key Infrastructure = 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings /
by:
(Electronic resources)
NETWORKING 2011 = 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011 : proceedings.. Part II /
by:
(Electronic resources)
Data privacy management and autonomous spontaneus security = 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011 : revised selected papers /
by:
(Electronic resources)
Information systems security = 5th international conference, ICISS 2009, Kolkata, India, December 14-18, 2009 : proceedings /
by:
(Electronic resources)
Privacy enhancing technologies = 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012 : proceedings /
by:
(Electronic resources)
Trusted systems = second international conference, INTRUST 2010, Beijing, China, December 13-15, 2010 : revised selected papers /
by:
(Electronic resources)
Recent advances in intrusion detection = 14th international symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011 : proceedings /
by:
(Electronic resources)
Constructive side-channel analysis and secure design = Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012 : proceedings /
by:
(Electronic resources)
omputer security - ESORICS 2012 = 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 : proceedings /
by:
(Electronic resources)
Privacy Enhancing Technologies = 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings /
by:
(Electronic resources)
Information Security : = 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings
by:
(Electronic resources)
Security Protocols = 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers /
by:
(Electronic resources)
Availability, reliability and security for business, enterprise and health information systems = IFIP WG 8.4/8.9 international cross domain conference and workshop, ARES 2011, Vienna, Austria, August 22-26, 2011 : proceedings /
by:
(Electronic resources)
Security in emerging wireless communication and networking systems = First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009 : revised selected papers /
by:
(Electronic resources)
Information Security Applications = 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers /
by:
(Electronic resources)
Information security and cryptology - ICISC 2011 = 14th International Conference, Seoul, Korea, November 30 - December 2, 2011 : revised aelected papers /
by:
(Electronic resources)
Voice over IP security = a comprehensive survey of vulnerabilities and academic research /
by:
(Electronic resources)
Computer security = ESORICS 2008 : 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security = 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009 : revised selected papers /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2012 = 14th International Workshop, Leuven, Belgium, September 9-12, 2012 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security = 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 ; proceedings /
by:
(Electronic resources)
Information, Security and Cryptology - ICISC 2009 = 12th International Conference, Seoul, Korea, December 2-4, 2009 : revised selected papers /
by:
(Electronic resources)
Image and Video Encryption = From Digital Rights Management to Secured Personal Communication /
by:
(Electronic resources)
NETWORKING 2011 = 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011 : proceedings.. Part I /
by:
(Electronic resources)
Progress in Cryptology - LATINCRYPT 2012 = 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012 : proceedings /
by:
(Electronic resources)
Provable security = 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security = 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012 : revised selected papers /
by:
(Electronic resources)
Applied cryptography and network security = 9th international conference, ACNS 2011, Nerja, Spain, June 7-10, 2011 : proceedings /
by:
(Electronic resources)
Fast software encryption = 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2008 = 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings /
by:
(Electronic resources)
Advanced Encryption Standard - AES = 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers /
by:
(Electronic resources)
Privacy and identity management for life = 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010 : revised selected papers /
by:
(Electronic resources)
Advances in information and computer security = 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011 : proceedings /
by:
(Electronic resources)
Topics in cryptology = CT-RSA 2011 : the cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14-18, 2011 : proceedings /
by:
(Electronic resources)
Theory of cryptography = 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings /
by:
(Electronic resources)
Distributed computing and internet technology = 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012 : proceedings /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2009 = 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009 : Proceedings /
by:
(Electronic resources)
Secure Data Management : = Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings
by:
(Electronic resources)
Data warehousing and knowledge discovery = 13th international conference, DaWaK 2011, Toulouse, France, August/September 2011 : proceedings /
by:
(Electronic resources)
Theory of cryptography = 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011 : proceedings /
by:
(Electronic resources)
Information theoretic security = second international conference, ICITS 2007, Madrid, Spain, May 25-29, 2007 : revised selected papers /
by:
(Electronic resources)
Advances in information security and assurance = third international conference and workshops, ISA 2009, Seoul, Korea, June 25-27, 2009 ; proceedings /
by:
(Electronic resources)
Impacts and Risk Assessment of Technology for Internet Security = Enabled Information Small-Medium Enterprises (TEISMES) /
by:
(Electronic resources)
Privacy enhancing technologies = 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010 : proceedings /
by:
(Electronic resources)
Networked services and applications - engineering, control and management = 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010 : proceedings /
by:
(Electronic resources)
Security and intelligent information systems = International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011 : revised selected papers /
by:
(Electronic resources)
Digital forensics and watermarking = 10th International Workshop, IWDW 2011, Atlantic City, NY, October 23-26, 2011 : revised selected papers /
by:
(Electronic resources)
Theory of cryptography = 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012 : proceedings /
by:
(Electronic resources)
Security Technology = International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 : proceedings /
by:
(Electronic resources)
Data privacy management and autonomous spontaneous security = 4th international workshop, DPM 2009, and second international workshop, SETOP 2009, St. Malo, France, September 24-25, 2009 : revised selected papers /
by:
(Electronic resources)
Information systems security = 8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(Electronic resources)
Detection of intrusions and malware, and vulnerability assessment = 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings /
by:
(Electronic resources)
Formal aspects of security and trust = 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011 : revised selected papers /
by:
(Electronic resources)
Architecting critical systems = first international symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 : proceedings /
by:
(Electronic resources)
E-voting and identity = third international conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011 : revised selected papers /
by:
(Electronic resources)
Advances in digital forensics VII = 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 -February 2, 2011 : revised selected papers /
by:
(Electronic resources)
Computer Network Security : = Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings
by:
(Electronic resources)
Applied algebra, algebraic algorithms and error-correcting codes = 18th international symposium, AAECC-18, Tarragona, Spain, June 8-12, 2009 : proceedings /
by:
(Electronic resources)
Security protocols XVI = 16th international workshop, Cambridge, UK, April 16-18, 2008 : revised selected papers /
by:
(Electronic resources)
NETWORKING 2011 workshops = International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, Valencia, Spain, May 13, 2011 : revised selected papers /
by:
(Electronic resources)
Secure data management = 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012 : proceedings /
by:
(Electronic resources)
Transactions on data hiding and multimedia security VIII = special issue on pattern recognition for IT security /
by:
(Electronic resources)
Coding and cryptology = second international workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009 : proceedings /
by:
(Electronic resources)
Security and Privacy in Ad-hoc and Sensor Networks : = Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2009 = 11th international workshop, Lausanne, Switzerland, September 6-9, 2009 : proceedings /
by:
(Electronic resources)
Mathematical methods in computer science = essays in memory of Thomas Beth /
by:
(Electronic resources)
Network and parallel computing = IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008 : proceedings /
by:
(Electronic resources)
Engineering secure software and systems = 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012 : proceedings /
by:
(Electronic resources)
Privacy Enhancing Technologies = 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers /
by:
(Electronic resources)
Intelligence and security informatics = Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 : proceedings /
by:
(Electronic resources)
Advances in cryptology -- EUROCRYPT 2008 = 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008 : proceedings /
by:
(Electronic resources)
Transactions on computational science X = special issue on security in computing, part I /
by:
(Electronic resources)
Smart spaces and next generation wired/wireless networking = 9th international conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009 : proceedings /
by:
(Electronic resources)
Arithmetic of finite fields = 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012 : proceedings /
by:
(Electronic resources)
Security and privacy in communication networks = 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, proceedings /
by:
(Electronic resources)
Information Security = 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings /
by:
(Electronic resources)
Advances in network security and applications = 4th international conference, CNSA 2011, Chennai, India, July 15-17, 2011 /
by:
(Electronic resources)
Information security and privacy = 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009 : proceedings /
by:
(Electronic resources)
Intrusion and Malware Detection and Vulnerability Assessment = Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings /
by:
(Electronic resources)
Information security = 13th international conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010 : revised selected papers /
by:
(Electronic resources)
Information Security Practice and Experience = 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings /
by:
(Electronic resources)
Privacy and identity management for life = 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011 : revised selected papers /
by:
(Electronic resources)
Information security and privacy = 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012 : proceedings /
by:
(Electronic resources)
Public Key Cryptography - PKC 2005 = 8th International Workshop on Theory and Practice in Public Key Cryptography /
by:
(Electronic resources)
Advances in information technology = 4th international conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010 : proceedings /
by:
(Electronic resources)
Computer network security = 6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012 : proceedings /
by:
(Electronic resources)
Theory of security and applications = Joint Workshop, TOSCA 2011, Saarbrucken, Germany, March 31 - April 1, 2011 : revised selected papers /
by:
(Electronic resources)
Trustworthly global computing = 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, revised selected papers /
by:
(Electronic resources)
Expert oracle and Java Security = programming secure Oracle database applications with Java /
by:
(Electronic resources)
Cryptography and coding = 13th IMA international conference, IMACC 2011, Oxford, UK, December 12-15, 2011 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security = 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012 : proceedings /
by:
(Electronic resources)
Trust Management III = Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings /
by:
(Electronic resources)
Information security technology for applications = 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Security and trust management = 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011 : revised selected papers /
by:
(Electronic resources)
Financial cryptography and data security = 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010 : revised selected papers /
by:
(Electronic resources)
Trusted systems = First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009 : revised selected papers /
by:
(Electronic resources)
Trust, privacy and security in digital business = 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security = FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, revised selected papers /
by:
(Electronic resources)
Decision and game theory for security = First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010, proceedings /
by:
(Electronic resources)
Information hiding = 12th international conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010 : revised selected papers /
by:
(Electronic resources)
Web application security = Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009, revised selected papers /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2011 = 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011 : proceedings /
by:
(Electronic resources)
Smart card research and advanced applications = 10th IFIP WG 8.8/11.2 international conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011 : revised selected papers /
by:
(Electronic resources)
Financial cryptography and data security = FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28-March 4, 2011, Revised selected papers /
by:
(Electronic resources)
Trusted systems = third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011 : revised selected papers /
by:
(Electronic resources)
Progress in cryptology, AFRICACRYPT 2010 = Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010 : proceedings /
by:
(Electronic resources)
Smart spaces and next generation wired/wireless networking = 11th international conference, NEW2AN 2011, and 4th Conference on Smart Spaces, ruSMART 2011, St. Petersburg, Russia, August 22-25, 2011 : proceedings /
by:
(Electronic resources)
Information theoretic security = 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, revised selected papers /
by:
(Electronic resources)
Multiple access communications = 4th international workshop, MACOM 2011, Trento, Italy, September 12-13, 2011 : proceedings /
by:
(Electronic resources)
Post-quantum cryptography = third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 : proceedings /
by:
(Electronic resources)
Digital watermarking = 7th international workshop, IWDW 2008, Busan, Korea, November 10-12, 2008 : selected papers /
by:
(Electronic resources)
Formal aspects in security and trust = 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009 revised selected papers /
by:
(Electronic resources)
Advances in digital forensics VI = Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, revised selected papers /
by:
(Electronic resources)
Security and Privacy in Communication Networks = 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009 : revised selected papers /
by:
(Electronic resources)
iNetSec 2009 - Open Research Problems in Network Security = IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009 : revised selected papers /
by:
(Electronic resources)
Multiple access communications = Third International Workshop, MACOM 2010, Barcelona, Spain, September 13-14, 2010, proceedings /
by:
(Electronic resources)
Computer security - ESORICS 2010 = 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, proceedings /
by:
(Electronic resources)
Sequences and their applications - SETA 2010 = 6th International Conference, Paris, France, September 13-17, 2010, proceedings /
by:
(Electronic resources)
Security protocols XIX = 19th international workshop, Cambridge, UK, March 28-30, 2011 : revised selected papers /
by:
(Electronic resources)
Security and cryptography for networks = 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, proceedings /
by:
(Electronic resources)
Formal to practical security = papers issued from the 2005 - 2008 French Japanese collaboration /
by:
(Electronic resources)
Information hiding = 13th international conference, IH 2011, Prague, Czech Republic, May 18-20, 2011 : revised selected papers /
by:
(Electronic resources)
Formal Aspects in Security and Trust = IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France /
by:
(Electronic resources)
Fast software encryption = 18th international workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011 : revised selected papers /
by:
(Electronic resources)
NETWORKING 2012 = 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012 : proceedings.. Part II /
by:
(Electronic resources)
Cryptology and network security = 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, proceedings /
by:
(Electronic resources)
Sequences and their applications - SETA 2012 = 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012 : proceedings /
by:
(Electronic resources)
Information Security and Privacy = 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings /
by:
(Electronic resources)
Ad-hoc, mobile, and wireless networks = 8th international conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009 : proceedings /
by:
(Electronic resources)
Digital Watermarking = Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers /
by:
(Electronic resources)
Selected Areas in Cryptography = 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers /
by:
(Electronic resources)
Public key cryptography - PKC 2012 = 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012 : proceedings /
by:
(Electronic resources)
Show more
Fewer
Subjects