Systems and Data Security.
Overview
| Works: | 384 works in 384 publications in 384 languages | |
|---|---|---|
Titles
Formal aspects of security and trust = 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011 : revised selected papers /
by:
(Electronic resources)
Topics in cryptology = CT-RSA 2011 : the cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14-18, 2011 : proceedings /
by:
(Electronic resources)
Trustworthy global computing = 4th international symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008 ; revised selected papers /
by:
(Electronic resources)
Fast software encryption = 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 : revised selected papers /
by:
(Electronic resources)
Public key infrastructures, services and applications = 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers /
by:
(Electronic resources)
Pervasive computing = 10th International Conference, Pervasive 2012, Newcastle, UK, June 18-22, 2012. Proceedings /
by:
(Electronic resources)
Secure and trust computing, data management and applications = 8th FIRA international conference, STA 2011, Loutraki, Greece, June 28-30, 2011 : proceedings /
by:
(Electronic resources)
Information security = 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 2009 = 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009 : proceedings /
by:
(Electronic resources)
Provable security = third international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings /
by:
(Electronic resources)
Information Theoretic Security = Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings /
by:
(Electronic resources)
Security and cryptography for networks = 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, proceedings /
by:
(Electronic resources)
Distributed computing and networking = 10th international conference, ICDCN 2009, Hyderabad, India, January 3-6, 2009 : proceedings /
by:
(Electronic resources)
iNetSec 2009 - Open Research Problems in Network Security = IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009 : revised selected papers /
by:
(Electronic resources)
Proceedings of The Ifip Tc 11 23rd International Information Security Conference = IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy /
by:
(Electronic resources)
Security and Privacy in Communication Networks = 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009 : revised selected papers /
by:
(Electronic resources)
Post-quantum cryptography = third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 : proceedings /
by:
(Electronic resources)
Information theoretic security = 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, revised selected papers /
by:
(Electronic resources)
Computer networks = 18th conference, CN 2011, Ustron, Poland, June 14-18, 2011 : proceedings /
by:
(Electronic resources)
Progress in cryptology, AFRICACRYPT 2010 = Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010 : proceedings /
by:
(Electronic resources)
Trusted systems = third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011 : revised selected papers /
by:
(Electronic resources)
Smart card research and advanced applications = 10th IFIP WG 8.8/11.2 international conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2011 = 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011 : proceedings /
by:
(Electronic resources)
ISSE 2010 Securing Electronic Business Processes = highlights of the Information Security Solutions Europe 2010 Conference /
by:
(Electronic resources)
Security and trust management = 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011 : revised selected papers /
by:
(Electronic resources)
Distributed Computing and Networking = 9th International Conference, ICDCN 2008, Kolkata, India, January 5-8, 2008. Proceedings /
by:
(Electronic resources)
Computer safety, reliability, and security = 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012 : proceedings /
by:
(Electronic resources)
Theory of cryptography = 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012 : proceedings /
by:
(Electronic resources)
Security and intelligent information systems = International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011 : revised selected papers /
by:
(Electronic resources)
Theory of cryptography = 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011 : proceedings /
by:
(Electronic resources)
Progress in Cryptology - LATINCRYPT 2012 = 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012 : proceedings /
by:
(Electronic resources)
Voice over IP security = a comprehensive survey of vulnerabilities and academic research /
by:
(Electronic resources)
Privacy Enhancing Technologies = 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings /
by:
(Electronic resources)
Trusted systems = second international conference, INTRUST 2010, Beijing, China, December 13-15, 2010 : revised selected papers /
by:
(Electronic resources)
Privacy enhancing technologies = 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012 : proceedings /
by:
(Electronic resources)
Information security applications = 9th international workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, revised selected papers /
by:
(Electronic resources)
Information security and cryptology = 6th international conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010 : revised selected papers /
by:
(Electronic resources)
Programming languages and systems = 10th Asian Symposium, APLAS 2012, Kyoto, Japan, December 11-13, 2012 : proceedings /
by:
(Electronic resources)
Internet of things = International Workshop, IOT 2012, Changsha, China, August 17-19, 2012 : proceedings /
by:
(Electronic resources)
Progress in cryptology = INDOCRYPT 2011 : 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011 : proceedings /
by:
(Electronic resources)
Ad Hoc networks = first international conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2010 = 16th international conference on the theory and application of cryptology and information security, Singapore, December 5-9, 2010 : proceedings /
by:
(Electronic resources)
Advances in Information and computer security = 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, proceedings /
by:
(Electronic resources)
Radio frequency identification = security and privacy issues : 6th international workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010 : revised selected papers /
by:
(Electronic resources)
Global security, safety, and sustainability = 5th international conference, ICGS3 2009, London, UK, September 1-2, 2009 : proceedings /
by:
(Electronic resources)
Provable security = second international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings /
by:
(Electronic resources)
Trust, privacy and security in digital business = 6th international conference, TrustBus 2009, Linz, Austria, September 3-4, 2009 : proceedings /
by:
(Electronic resources)
Smart card research and advanced application = 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proceedings /
by:
(Electronic resources)
Information hiding = 10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008 : revised selected papers /
by:
(Electronic resources)
Trusted Computing - Challenges and Applications = First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings /
by:
(Electronic resources)
Global E-Security = 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings /
by:
(Electronic resources)
Information security theory and practice = smart devices, pervasive systems, and ubiquitous networks ; third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 ; proceedings /
by:
(Electronic resources)
Secure IT systems = 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 : proceedings /
by:
(Electronic resources)
Information and communications security = 14th international conference, ICICS 2012, Hong Kong, China, October 29-31, 2012 : proceedings /
by:
(Electronic resources)
Critical infrastructure protection VI = 6th IFIP WG 11.10 international conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012 : revised selected papers /
by:
(Electronic resources)
Data and applications security and privacy XXVI = 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 : Proceedings /
by:
(Electronic resources)
Advances in Cryptology -- CRYPTO 2008 = 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings /
by:
(Electronic resources)
Network-Based Information Systems = 2nd International Conference, NBiS 2008, Turin, Italy, September 1-5, 2008. Proceedings /
by:
(Electronic resources)
Internet and distributed computing systems = 5th international conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings /
by:
(Electronic resources)
Information security practice and experience = 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012 : proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2012 = 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012 : proceedings /
by:
(Electronic resources)
Information security applications = 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers /
by:
(Electronic resources)
Service-oriented and cloud computing = First European Conference, ESOCC 2012, Bertinoro, Italy, September 19-21, 2012 : proceedings /
by:
(Electronic resources)
Decision and game theory for security = third international conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012 : proceedings /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2009 = 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings /
by:
(Electronic resources)
Trusted systems = 4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(Electronic resources)
Computer safety, reliability, and security = 27th international conference, Safecomp 2008 Newcastle upon Tyne, UK, September 22-25, 2008 proceedings /
by:
(Electronic resources)
Information security theory and practices = smart devices, convergence and next generation networks : second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 : proceedings /
by:
(Electronic resources)
Advances in systems safety = proceedings of the nineteenth Safety-Critical Systems Symposium, Southampton, UK, 8-10th February 2011 /
by:
(Electronic resources)
RFID: Security and privacy = 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Selected areas in cryptography = 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011 : revised selected papers /
by:
(Electronic resources)
Progress in cryptology = AFRICACRYP T 2011 : 4th international conference on cryptology in Africa, Dakar, Senegal, July 5-7, 2011 : proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2010 = 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 : proceedings /
by:
(Electronic resources)
Security and cryptography for networks = 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012 : proceedings /
by:
(Electronic resources)
Data and Applications Security XXII = 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings /
by:
(Electronic resources)
Information security practice and experience = 5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 ; proceedings /
by:
(Electronic resources)
Information and communications security = 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 : proceedings /
by:
(Electronic resources)
Trust, Privacy and Security in Digital Business = 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings /
by:
(Electronic resources)
Topics in cryptology--CT-RSA 2009 = the Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009 ; proceedings /
by:
(Electronic resources)
Applied cryptography and network security = 8th international conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings /
by:
(Electronic resources)
Research in cryptology = second western European workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007 : revised selected papers /
by:
(Electronic resources)
IP operations and management = 8th IEEE international workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008 : proceedings /
by:
(Electronic resources)
Post-quantum cryptography = second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings /
by:
(Electronic resources)
Theory of cryptography = 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings /
by:
(Electronic resources)
Cryptology and Network Security = 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings /
by:
(Electronic resources)
Active and programmable networks = IFIP TC6 7th international working conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005 : revised papers /
by:
(Electronic resources)
Security aspects in information technology = first international conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011 : proceedings /
by:
(Electronic resources)
Advances in information and computer security = Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008, proceedings /
by:
(Electronic resources)
Cryptology and network security = 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008, proceedings /
by:
(Electronic resources)
Advances in Cryptology - ASIACRYPT 2012 = 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012 : proceedings /
by:
(Electronic resources)
Stabilization, safety, and security of distributed systems = 11th international symposium, SSS 2009, Lyon, France, November 3-6, 2009 : proceedings /
by:
(Electronic resources)
Security protocols = 14th international workshop, Cambridge, UK, March 27-29 2006 : revised selected papers /
by:
(Electronic resources)
Public key infrastructures, services and applications = 6th European workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009 : revised selected papers /
by:
(Electronic resources)
Provable security = 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings /
by:
(Electronic resources)
Information systems security = 7th international conference, ICISS 2011, Kolkata, India, December 15-19, 2011 : procedings /
by:
(Electronic resources)
Information Security Practice and Experience = 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings /
by:
(Electronic resources)
Theory of cryptography = 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings /
by:
(Electronic resources)
Distributed computing and networking = 13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2012 = 14th International Workshop, Leuven, Belgium, September 9-12, 2012 : proceedings /
by:
(Electronic resources)
omputer security - ESORICS 2012 = 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 : proceedings /
by:
(Electronic resources)
Formal aspects in security and trust = 5th international workshop, FAST 2008, Malaga, Spain, October 9-10, 2008 ; revised selected papers /
by:
(Electronic resources)
Wired/wireless internet communications = 8th International Conference, WWIC 2010, Lulea, Sweden, June 1-3, 2010 : proceedings /
by:
(Electronic resources)
Programming languages and systems = 7th Asian Symposium, APLAS 2009, Seoul, Korea, December 14-16, 2009 : proceedings /
by:
(Electronic resources)
Provable security = 5th international conference, ProvSec 2011, Xi'an, China, October 16-18, 2011 : proceedings /
by:
(Electronic resources)
Public key infrastructures, services and applications = 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010 : revised selected papers /
by:
(Electronic resources)
Foundations of security analysis and design VI = FOSAD tutorial lectures /
by:
(Electronic resources)
Network and system security = 6th international conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings /
by:
(Electronic resources)
Computer safety, reliability, and security = SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012 : proceedings /
by:
(Electronic resources)
Network computing and information security = second international conference, NCIS 2012, Shanghai, China, December 7-9, 2012 : proceedings /
by:
(Electronic resources)
Fast software encryption = 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012 : revised selected papers /
by:
(Electronic resources)
Critical infrastructure protection = information infrastructure models, analysis, and defense /
by:
(Electronic resources)
Information security practice and experience = 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems = CHES 2011 : 13th international workshop, Nara, Japan, September 28 - October 1, 2011 : proceedings /
by:
(Electronic resources)
Cyberspace safety and security = 4th international symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012 : proceedings /
by:
(Electronic resources)
Advances in cryptology = CRYPTO 2011 : 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011 : proceedings /
by:
(Electronic resources)
Information security = 14th international conference, ISC 2011, Xi'an, China, October 26-29, 2011 : proceedings /
by:
(Electronic resources)
Cryptology and network security = 10th international conference, CANS 2011, Sanya, China, December 10-12, 2011 : proceedings /
by:
(Electronic resources)
Wired/wireless internet communications = 7th international conference, WWIC 2009, Enschede, The Netherlands, May 27-29, 2009 ; proceedings /
by:
(Electronic resources)
Selected Areas in Cryptography = 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, revised selected papers /
by:
(Electronic resources)
Computer safety, reliability, and security = 28th international conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009 : proceedings /
by:
(Electronic resources)
Future generation information technology = first international conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 : proceedings /
by:
(Electronic resources)
Information Security and Privacy = 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings /
by:
(Electronic resources)
Applied Cryptography and Network Security = 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings /
by:
(Electronic resources)
Financial Cryptography and Data Security = 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers /
by:
(Electronic resources)
Security and Privacy in Mobile Information and Communication Systems = 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012 : revised selected papers /
by:
(Electronic resources)
Information technology convergence, secure and trust computing, and data management = ITCS 2012 & STA 2012 /
by:
(Electronic resources)
Ambient intelligence = European Conference, AmI 2008, Nuremberg, Germany, November 19-22, 2008 : proceedings /
by:
(Electronic resources)
Information Security = 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings /
by:
(Electronic resources)
Advances in cryptology -- EUROCRYPT 2008 = 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008 : proceedings /
by:
(Electronic resources)
E-voting and identity = third international conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011 : revised selected papers /
by:
(Electronic resources)
Networked services and applications - engineering, control and management = 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010 : proceedings /
by:
(Electronic resources)
Information theoretic security = second international conference, ICITS 2007, Madrid, Spain, May 25-29, 2007 : revised selected papers /
by:
(Electronic resources)
Business system management and engineering = from open issues to applications /
by:
(Electronic resources)
Wired/Wireless internet communication = 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012 : proceedings /
by:
(Electronic resources)
IT security management = IT securiteers - setting up an IT security function /
by:
(Electronic resources)
Recent trends in computer networks and distributed systems security = International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXV = 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011 : proceedings /
by:
(Electronic resources)
Autonomic and trusted computing = 8th international conference, ATC 2011, Banff, Canada, September 2-4, 2011 : proceedings /
by:
(Electronic resources)
Programming languages and systems = 9th Asian symposium, APLAS 2011, Kenting, Taiwan, December 5-7, 2011 : proceedings /
by:
(書目-電子資源)
ISSE 2009 Securing Electronic Business Processes = highlights of the Information Security Solutions Europe 2009 Conference /
by:
(書目-電子資源)
Information security = 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012 : proceedings /
by:
(書目-電子資源)
Autonomic and trusted computing = 6th international conference, ATC 2009, Brisbane, Australia, July 7-9, 2009 ; proceedings /
by:
(書目-電子資源)
Theory of Cryptography = Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings /
by:
(書目-電子資源)
Trusted computing = second international conference, Trust 2009, Oxford, UK, April 6-8, 2009 ; Proceedings /
by:
(書目-電子資源)
Web-age information management = 13th International Conference, WAIM 2012, Harbin, China, August 18-20, 2012 : proceedings /
by:
(書目-電子資源)
Information security and privacy = 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, proceedings /
by:
(書目-電子資源)
E-voting and identity = second international conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009 : proceedings /
by:
(書目-電子資源)
Dependable and historic computing = essays dedicated to Brian Randell on the occasion of his 75th birthday /
by:
(書目-電子資源)
Achieving systems safety = proceedings of the twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012 /
by:
(書目-電子資源)
Intelligence management = knowledge driven frameworks for combating terrorism and organized crime /
by:
(書目-電子資源)
Making systems safer = proceedings of the eighteenth Safety-Critical Systems Symposium, Bristol, UK, 9-11th February 2010 /
by:
(書目-電子資源)
Cryptography and coding = 13th IMA international conference, IMACC 2011, Oxford, UK, December 12-15, 2011 : proceedings /
by:
(書目-電子資源)
Transactions on data hiding and multimedia security VIII = special issue on pattern recognition for IT security /
by:
(書目-電子資源)
Secure data management = 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012 : proceedings /
by:
(書目-電子資源)
Provable security = 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012 : proceedings /
by:
(書目-電子資源)
Information systems security = 5th international conference, ICISS 2009, Kolkata, India, December 14-18, 2009 : proceedings /
by:
(書目-電子資源)
Privacy and anonymity in information management systems = new techniques for new practical problems /
by:
(書目-電子資源)
Information systems security = 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings /
by:
(書目-電子資源)
Privacy enhancing technologies = 9th international symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009 : proceedings /
by:
(書目-電子資源)
Computer networks = 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012 : proceedings /
by:
(書目-電子資源)
Ubiquitous Intelligence and Computing = 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings /
by:
(書目-電子資源)
Future security = 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012 : proceedings /
by:
(書目-電子資源)
Autonomic and Trusted Computing = 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings /
by:
(書目-電子資源)
Foundations of security analysis and design V = FOSAD 2007/2008/2009 tutorial lectures /
by:
(書目-電子資源)
Information systems security = 8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(書目-電子資源)
Privacy enhancing technologies = 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010 : proceedings /
by:
(書目-電子資源)
Pervasive computing = 6th international conference, Pervasive 2008, Sydney, Australia, May 19-22, 2008 : proceedings /
by:
(書目-電子資源)
Collaborative financial infrastructure protection = tools, abstractions, and middleware /
by:
(書目-電子資源)
The Internet of Things = First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings /
by:
(書目-電子資源)
Interactive theorem proving = Third International Conference, ITP 2012, Princeton, NJ, USA, August 13-15, 2012 : proceedings /
by:
(書目-電子資源)
Future of trust in computing = Proceedings of the first International Conference Future of Trust in Computing 2008 /
by:
(書目-電子資源)
Evaluation of electronic voting = requirements and evaluation procedures to support responsible election authorities /
by:
(書目-電子資源)
Information hiding = 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers /
by:
(書目-電子資源)
Autonomic and trusted computing = 7th international conference, ATC 2010, Xi'an, China, October 26-29, 2010 : proceedings /
by:
(書目-電子資源)
ISSE 2008 securing electronic business processes = highlights of the Information Security Solutions Europe 2008 Conference /
by:
(書目-電子資源)
Computer networks = 17th Conference, CN 2010, Ustron, Poland, June 15-19, 2010 : proceedings /
by:
(書目-電子資源)
更多
較少的
主題