Data Encryption.
Overview
| Works: | 489 works in 489 publications in 489 languages | |
|---|---|---|
Titles
Forensics in Telecommunications, Information and Multimedia = Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers /
by:
(Electronic resources)
Information security = 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 : proceedings /
by:
(Electronic resources)
Security and privacy in mobile information and communication systems = First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009 : revised selected papers /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 2009 = 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009 : proceedings /
by:
(Electronic resources)
Provable security = third international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings /
by:
(Electronic resources)
Secure Data Management = 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings /
by:
(Electronic resources)
Information Theoretic Security = Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings /
by:
(Electronic resources)
Secure data management = 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, proceedings /
by:
(Electronic resources)
Advances in Information and computer security = 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, proceedings /
by:
(Electronic resources)
Radio frequency identification = security and privacy issues : 6th international workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010 : revised selected papers /
by:
(Electronic resources)
Global security, safety, and sustainability = 5th international conference, ICGS3 2009, London, UK, September 1-2, 2009 : proceedings /
by:
(Electronic resources)
Provable security = second international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings /
by:
(Electronic resources)
Trust, privacy and security in digital business = 6th international conference, TrustBus 2009, Linz, Austria, September 3-4, 2009 : proceedings /
by:
(Electronic resources)
Smart card research and advanced application = 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proceedings /
by:
(Electronic resources)
Information hiding = 10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008 : revised selected papers /
by:
(Electronic resources)
Trusted Computing - Challenges and Applications = First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings /
by:
(Electronic resources)
Global E-Security = 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings /
by:
(Electronic resources)
Information security theory and practice = smart devices, pervasive systems, and ubiquitous networks ; third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 ; proceedings /
by:
(Electronic resources)
Secure IT systems = 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 : proceedings /
by:
(Electronic resources)
Information and communications security = 14th international conference, ICICS 2012, Hong Kong, China, October 29-31, 2012 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXVI = 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 : Proceedings /
by:
(Electronic resources)
Advances in Cryptology -- CRYPTO 2008 = 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings /
by:
(Electronic resources)
Information security practice and experience = 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012 : proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2012 = 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012 : proceedings /
by:
(Electronic resources)
Recent advances in intrusion detection = 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 : proceedings /
by:
(Electronic resources)
Information security applications = 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers /
by:
(Electronic resources)
Computer applications for security, control and system engineering = International Conferences, SecTech, CA, CES3 2012, held in conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012 : proceedings /
by:
(Electronic resources)
NETWORKING 2012 = 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012 : proceedings.. Part I /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2009 = 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings /
by:
(Electronic resources)
Digital watermarking = 9th international workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 : revised selected papers /
by:
(Electronic resources)
Trusted systems = 4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(Electronic resources)
Information security theory and practices = smart devices, convergence and next generation networks : second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 : proceedings /
by:
(Electronic resources)
RFID: Security and privacy = 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Selected areas in cryptography = 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011 : revised selected papers /
by:
(Electronic resources)
Progress in cryptology = AFRICACRYP T 2011 : 4th international conference on cryptology in Africa, Dakar, Senegal, July 5-7, 2011 : proceedings /
by:
(Electronic resources)
Trust, privacy and security in digital business = 8th international conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011 : proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2010 = 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 : proceedings /
by:
(Electronic resources)
Security and Privacy in the Age of Ubiquitous Computing = IFIP TC11 20th International Information Security Conference May 30-June 1, 2005, Chiba, Japan /
by:
(Electronic resources)
Information systems, technology and management = Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings /
by:
(Electronic resources)
Security and cryptography for networks = 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012 : proceedings /
by:
(Electronic resources)
Data and Applications Security XXII = 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings /
by:
(Electronic resources)
Coding Theory and Applications = Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings /
by:
(Electronic resources)
Information security practice and experience = 5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 ; proceedings /
by:
(Electronic resources)
Information and communications security = 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 : proceedings /
by:
(Electronic resources)
Trust, Privacy and Security in Digital Business = 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings /
by:
(Electronic resources)
Engineering secure software and systems = second international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 : proceedings /
by:
(Electronic resources)
Topics in cryptology--CT-RSA 2009 = the Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009 ; proceedings /
by:
(Electronic resources)
Applied cryptography and network security = 8th international conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings /
by:
(Electronic resources)
Research in cryptology = second western European workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007 : revised selected papers /
by:
(Electronic resources)
Ad hoc networks = Second International Conference, ADHOCNETS 2010, Victoria, BC, Canada, August 18-20, 2010, revised selected papers /
by:
(Electronic resources)
IP operations and management = 8th IEEE international workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008 : proceedings /
by:
(Electronic resources)
Post-quantum cryptography = second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings /
by:
(Electronic resources)
Theory of cryptography = 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings /
by:
(Electronic resources)
Advances in information security and its application = third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 ; proceedings /
by:
(Electronic resources)
Cryptology and Network Security = 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings /
by:
(Electronic resources)
Information systems, technology and management = 4th international conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010 : proceedings /
by:
(Electronic resources)
Communications and multimedia security = 11th IFIP TC 6/TC ; 11 international conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010 : proceedings /
by:
(Electronic resources)
Security and trust management = 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, revised selected papers /
by:
(Electronic resources)
Security aspects in information technology = first international conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011 : proceedings /
by:
(Electronic resources)
Cryptology and network security = 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008, proceedings /
by:
(Electronic resources)
Fast Software Encryption = 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers /
by:
(Electronic resources)
Secure data management = 6th VLDB workshop, SDM 2009, Lyon, France, August 28, 2009 : proceedings /
by:
(Electronic resources)
Advances in Cryptology - ASIACRYPT 2012 = 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012 : proceedings /
by:
(Electronic resources)
Security protocols = 14th international workshop, Cambridge, UK, March 27-29 2006 : revised selected papers /
by:
(Electronic resources)
Public key infrastructures, services and applications = 6th European workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009 : revised selected papers /
by:
(Electronic resources)
Recent trends in network security and applications = third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010, proceedings /
by:
(Electronic resources)
Provable security = 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings /
by:
(Electronic resources)
Information systems security = 7th international conference, ICISS 2011, Kolkata, India, December 15-19, 2011 : procedings /
by:
(Electronic resources)
Information Security Practice and Experience = 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings /
by:
(Electronic resources)
Intrusion and Malware Detection and Vulnerability Assessment = Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings /
by:
(Electronic resources)
Applied algebra, algebraic algorithms and error-correcting codes = 18th international symposium, AAECC-18, Tarragona, Spain, June 8-12, 2009 : proceedings /
by:
(Electronic resources)
Computer Network Security : = Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings
by:
(Electronic resources)
Secure Data Management : = Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings
by:
(Electronic resources)
Distributed computing and internet technology = 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012 : proceedings /
by:
(Electronic resources)
Theory of cryptography = 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings /
by:
(Electronic resources)
Image and Video Encryption = From Digital Rights Management to Secured Personal Communication /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2012 = 14th International Workshop, Leuven, Belgium, September 9-12, 2012 : proceedings /
by:
(Electronic resources)
omputer security - ESORICS 2012 = 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 : proceedings /
by:
(Electronic resources)
Recent advances in intrusion detection = 14th international symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011 : proceedings /
by:
(Electronic resources)
Public Key Infrastructure = 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings /
by:
(Electronic resources)
Information security and assurance = 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, proceedings /
by:
(Electronic resources)
Formal aspects in security and trust = 5th international workshop, FAST 2008, Malaga, Spain, October 9-10, 2008 ; revised selected papers /
by:
(Electronic resources)
Computer security = ESORICS 2011 : 16th European symposium on research in computer security, Leuven, Belgium, September 12-14,2011 : proceedings /
by:
(Electronic resources)
Provable security = 5th international conference, ProvSec 2011, Xi'an, China, October 16-18, 2011 : proceedings /
by:
(Electronic resources)
Public key infrastructures, services and applications = 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010 : revised selected papers /
by:
(Electronic resources)
Foundations of security analysis and design VI = FOSAD tutorial lectures /
by:
(Electronic resources)
Network and system security = 6th international conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings /
by:
(Electronic resources)
Trustworthy global computing = 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011 : revised selected papers /
by:
(Electronic resources)
Security protocols = 15th international workshop, Brno, Czech Republic, April 18-20, 2007 : revised selected papers /
by:
(Electronic resources)
Cryptography and Coding : = 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings
by:
(Electronic resources)
Fast software encryption = 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012 : revised selected papers /
by:
(Electronic resources)
Critical infrastructure protection = information infrastructure models, analysis, and defense /
by:
(Electronic resources)
Communications and Multimedia Security : = 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings
by:
(Electronic resources)
Ethics and policy of biometrics = Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010 : revised papers /
by:
(Electronic resources)
Information security practice and experience = 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 : proceedings /
by:
(Electronic resources)
Selected areas in cryptography = 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010 : revised selected papers /
by:
(Electronic resources)
Fast Software Encryption = 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers /
by:
(Electronic resources)
Sequences and Their Applications - SETA 2004 = Third International Conference, Seoul, Korea, October 24-28, 2004, Revised Selected Papers /
by:
(Electronic resources)
Cryptographic hardware and embedded systems = CHES 2011 : 13th international workshop, Nara, Japan, September 28 - October 1, 2011 : proceedings /
by:
(Electronic resources)
Pro PHP security = from application security principles to the implementation of XSS defenses /
by:
(Electronic resources)
Eco-friendly computing and communication systems = International Conference, ICECCS 2012, Kochi, India, August 9-11, 2012 : proceedings /
by:
(Electronic resources)
Coding and cryptology = third international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011 : proceedings /
by:
(Electronic resources)
Cyberspace safety and security = 4th international symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012 : proceedings /
by:
(Electronic resources)
Advances in cryptology = CRYPTO 2011 : 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011 : proceedings /
by:
(Electronic resources)
Information security = 14th international conference, ISC 2011, Xi'an, China, October 26-29, 2011 : proceedings /
by:
(Electronic resources)
Cryptology and network security = 10th international conference, CANS 2011, Sanya, China, December 10-12, 2011 : proceedings /
by:
(Electronic resources)
Algorithmic number theory = 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010 : proceedings /
by:
(Electronic resources)
Detection of intrusions and malware, and vulnerability assessment = 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 : proceedings /
by:
(Electronic resources)
Selected Areas in Cryptography = 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, revised selected papers /
by:
(Electronic resources)
Wireless and mobile networking = Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009 : proceedings /
by:
(Electronic resources)
Future generation information technology = first international conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 : proceedings /
by:
(Electronic resources)
Information Security and Privacy = 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings /
by:
(Electronic resources)
Applied Cryptography and Network Security = 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings /
by:
(Electronic resources)
Financial Cryptography and Data Security = 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers /
by:
(Electronic resources)
Advances in network security and applications = 4th international conference, CNSA 2011, Chennai, India, July 15-17, 2011 /
by:
(Electronic resources)
Information Security = 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings /
by:
(Electronic resources)
Advances in cryptology -- EUROCRYPT 2008 = 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008 : proceedings /
by:
(Electronic resources)
Intelligence and security informatics = Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 : proceedings /
by:
(Electronic resources)
Privacy Enhancing Technologies = 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers /
by:
(Electronic resources)
E-voting and identity = third international conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011 : revised selected papers /
by:
(Electronic resources)
Networked services and applications - engineering, control and management = 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010 : proceedings /
by:
(Electronic resources)
Information theoretic security = second international conference, ICITS 2007, Madrid, Spain, May 25-29, 2007 : revised selected papers /
by:
(Electronic resources)
Advanced Encryption Standard - AES = 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers /
by:
(Electronic resources)
NETWORKING 2011 = 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011 : proceedings.. Part II /
by:
(Electronic resources)
Trust management VI = 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings /
by:
(Electronic resources)
Recent trends in computer networks and distributed systems security = International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXV = 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing = 4th international conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011 : proceedings /
by:
(Electronic resources)
Information Security and Privacy = 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011 : proceedings /
by:
(Electronic resources)
Autonomic and trusted computing = 8th international conference, ATC 2011, Banff, Canada, September 2-4, 2011 : proceedings /
by:
(Electronic resources)
Advances in cryptology = ASIACRYPT 2011 : 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4-8, 2011 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 2009 = 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009 : proceedings /
by:
(Electronic resources)
Advances in Cryptology - ASIACRYPT 2005 : = 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings
by:
(Electronic resources)
Information security and digital forensics = First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009 : revised selected papers /
by:
(Electronic resources)
Trust and trustworthy computing = third international conference, TRUST 2010, Berlin, Germany, June 21-23, 2010 : proceedings /
by:
(Electronic resources)
NETWORKING 2010 = 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010 : proceedings /
by:
(Electronic resources)
Pairing-based cryptography - Pairing 2010 = 4th international conference, Yamanaka Hot Spring, Japan, December 2010, proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2010 = 12th international workshop, Santa Barbara, USA, August 17-20, 2010 : proceedings /
by:
(Electronic resources)
Data and applications security XXIII = 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 : proceedings /
by:
(Electronic resources)
Progress in cryptology - AFRICACRYPT 2012 = 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012 : proceedings /
by:
(Electronic resources)
Information security = 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012 : proceedings /
by:
(Electronic resources)
Communications and multimedia security = 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012 : proceedings /
by:
(Electronic resources)
Information and communications security = 11th international conference, ICICS 2009, Beijing, China, December 14-17, 2009 : proceedings /
by:
(Electronic resources)
Digital watermarking = 6th international workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 proceedings /
by:
(Electronic resources)
Public key cryptography - PKC 2010 = 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings /
by:
(Electronic resources)
Critical information infrastructures security = second international workshop, CRITIS 2007, Malaga, Spain, October 3-5, 2007 : revised papers /
by:
(Electronic resources)
E-business and telecommunications = international conference, ICETE 2008, Porto, Portugal, July 26 - 29, 2008 : revised selected papers /
by:
(Electronic resources)
Autonomic and trusted computing = 6th international conference, ATC 2009, Brisbane, Australia, July 7-9, 2009 ; proceedings /
by:
(Electronic resources)
Information and automation = international symposium, ISIA 2010, Guangzhou, China, November 10-11, 2010 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2010 = 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, proceedings /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2010 = the Cryptographers' track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010 : proceedings /
by:
(Electronic resources)
Moving target defense = creating asymmetric uncertainty for cyber threats /
by:
(Electronic resources)
Privacy in statistical databases = UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012 : proceedings /
by:
(Electronic resources)
Topics in Cryptology - CT-RSA 2012 = the Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012 : proceedings /
by:
(Electronic resources)
Theory of Cryptography = Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings /
by:
(Electronic resources)
Trusted computing = second international conference, Trust 2009, Oxford, UK, April 6-8, 2009 ; Proceedings /
by:
(書目-電子資源)
Information security and privacy = 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, proceedings /
by:
(書目-電子資源)
E-voting and identity = second international conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009 : proceedings /
by:
(書目-電子資源)
Impacts and Risk Assessment of Technology for Internet Security = Enabled Information Small-Medium Enterprises (TEISMES) /
by:
(書目-電子資源)
Security protocols XX = 20th international workshop, Cambridge, UK, April 12-13, 2012 : revised selected papers /
by:
(書目-電子資源)
Digital Watermarking : = 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings
by:
(書目-電子資源)
Personal Satellite Services = International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009 : revised selected papers /
by:
(書目-電子資源)
Arithmetic of finite fields = third international workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings /
by:
(書目-電子資源)
Transactions on computational science XI = special issue on security in computing, part II /
by:
(書目-電子資源)
Digital watermarking = 8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings /
by:
(書目-電子資源)
Information systems security = 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings /
by:
(書目-電子資源)
Privacy enhancing technologies = 9th international symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009 : proceedings /
by:
(書目-電子資源)
Information Systems Security : = First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
by:
(書目-電子資源)
Arithmetic of finite fields = 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012 : proceedings /
by:
(書目-電子資源)
Transactions on computational science X = special issue on security in computing, part I /
by:
(書目-電子資源)
Information Security : = 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings
by:
(書目-電子資源)
Trust and trustworthy computing = 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012 : proceedings /
by:
(書目-電子資源)
Information Hiding : = 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers
by:
(書目-電子資源)
Autonomic and Trusted Computing = 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings /
by:
(書目-電子資源)
Information Security and Cryptology : = First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
by:
(書目-電子資源)
Security protocols XIX = 19th international workshop, Cambridge, UK, March 28-30, 2011 : revised selected papers /
by:
(書目-電子資源)
Post-quantum cryptography = third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 : proceedings /
by:
(書目-電子資源)
Multiple access communications = 4th international workshop, MACOM 2011, Trento, Italy, September 12-13, 2011 : proceedings /
by:
(書目-電子資源)
NETWORKING 2011 = 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011 : proceedings.. Part I /
by:
(書目-電子資源)
Voice over IP security = a comprehensive survey of vulnerabilities and academic research /
by:
(書目-電子資源)
Security Protocols = 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers /
by:
(書目-電子資源)
Privacy Enhancing Technologies = 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings /
by:
(書目-電子資源)
Privacy enhancing technologies = 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012 : proceedings /
by:
(書目-電子資源)
Algorithmic number theory = 8th international symposium, ANTS-VIII, Banff, Canada, May 17-22, 2008 : proceedings /
by:
(書目-電子資源)
Foundations of security analysis and design V = FOSAD 2007/2008/2009 tutorial lectures /
by:
(書目-電子資源)
Cryptology and Network Security : = 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings
by:
(書目-電子資源)
Arithmetic of Finite Fields = 2nd International Workshop, WAIFI 2008 Siena, Italy, July 6-9, 2008 Proceedings /
by:
(書目-電子資源)
Public Key Cryptography - PKC 2005 = 8th International Workshop on Theory and Practice in Public Key Cryptography /
by:
(書目-電子資源)
Information systems security = 8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(書目-電子資源)
Privacy enhancing technologies = 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010 : proceedings /
by:
(書目-電子資源)
Studies in complexity and cryptography = miscellanea on the interplay between randomness and computation /
by:
(書目-電子資源)
Pairing-Based Cryptography -- Pairing 2008 = Second International Conference, Egham, UK, September 1-3, 2008. Proceedings /
by:
(書目-電子資源)
Secure data management = 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011 : proceedings /
by:
(書目-電子資源)
Formal to practical security = papers issued from the 2005 - 2008 French Japanese collaboration /
by:
(書目-電子資源)
Digital watermarking = 7th international workshop, IWDW 2008, Busan, Korea, November 10-12, 2008 : selected papers /
by:
(書目-電子資源)
Information hiding = 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers /
by:
(書目-電子資源)
Information hiding = 12th international conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010 : revised selected papers /
by:
(書目-電子資源)
Autonomic and trusted computing = 7th international conference, ATC 2010, Xi'an, China, October 26-29, 2010 : proceedings /
by:
(書目-電子資源)
Cryptography and coding = 13th IMA international conference, IMACC 2011, Oxford, UK, December 12-15, 2011 : proceedings /
by:
(書目-電子資源)
Expert oracle and Java Security = programming secure Oracle database applications with Java /
by:
(書目-電子資源)
Network and parallel computing = IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008 : proceedings /
by:
(書目-電子資源)
Coding and cryptology = second international workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009 : proceedings /
by:
(書目-電子資源)
Transactions on data hiding and multimedia security VIII = special issue on pattern recognition for IT security /
by:
(書目-電子資源)
Secure data management = 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012 : proceedings /
by:
(書目-電子資源)
Security protocols XVI = 16th international workshop, Cambridge, UK, April 16-18, 2008 : revised selected papers /
by:
(書目-電子資源)
Provable security = 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012 : proceedings /
by:
(書目-電子資源)
更多
較少的
主題