Computer security - Fiction.
Overview
Works: | 298 works in 254 publications in 254 languages |
---|
Titles
Stabilization, safety, and security of distributed systems = 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010, proceedings /
by:
(Language materials, printed)
Information hiding = 12th international conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010 : revised selected papers /
by:
(Language materials, printed)
Critical infrastructure protection IV = Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, revised selected papers/
by:
(Language materials, printed)
Vulnerability scanner : = computer program, computer, computer network /
by:
(Language materials, printed)
ISSE 2010 Securing Electronic Business Processes = highlights of the Information Security Solutions Europe 2010 Conference /
by:
(Electronic resources)
Security and intelligent information systems = International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011 : revised selected papers /
by:
(Electronic resources)
Information security applications = 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011 : revised selected papers /
by:
(Electronic resources)
Topics in Cryptology - CT-RSA 2012 = the Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012 : proceedings /
by:
(Electronic resources)
Engineering secure software and systems = 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012 : proceedings /
by:
(Electronic resources)
Principles of security and trust = first international conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012 : proceedings /
by:
(Electronic resources)
Global security, safety, and sustainability & e-Democracy = 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2012 = 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012 : proceedings /
by:
(Electronic resources)
Information theoretic security = 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings /
by:
(Electronic resources)
Trust, privacy and security in digital business = 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012 : proceedings /
by:
(Electronic resources)
Network computing and information security = second international conference, NCIS 2012, Shanghai, China, December 7-9, 2012 : proceedings /
by:
(Electronic resources)
Digital forensics and cyber crime = third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Computational intelligence, cyber security and computational models = proceedings of ICC3, 2013 /
by:
(Electronic resources)
Privacy technologies and policy = first Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012 : revised selected papers /
by:
(Electronic resources)
Trustworthy global computing = 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013 : revised selected papers /
by:
(Electronic resources)
Information security applications = 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers /
by:
(Electronic resources)
Foundations and practice of security = 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013 : revised selected papers /
by:
(Electronic resources)
Data privacy management and autonomous spontaneous security = 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013 : revised selected papers /
by:
(Electronic resources)
Principles of security and trust = Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014 : proceedings /
by:
(Electronic resources)
Risk assessment and risk-driven testing = first International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013 : revised selected papers /
by:
(Electronic resources)
Information security and privacy = 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014 : proceedings /
by:
(Electronic resources)
Fast software encryption = 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : revised selected papers /
by:
(Electronic resources)
Emerging ICT for bridging the future = proceedings of the 49th Annual Convention of the Computer Society of India (CSI).. Volume 1 /
by:
(Electronic resources)
Emerging ICT for bridging the future = proceedings of the 49th Annual Convention of the Computer Society of India CSI.. Volume 2 /
by:
(Electronic resources)
Principles of security and trust = 4th International Conference, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015 : proceedings /
by:
(Electronic resources)
Trust management IX = 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /
by:
(Electronic resources)
Foundations and practice of security = 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014 : revised selected papers /
by:
(Electronic resources)
Human aspects of information security, privacy, and trust = third International Conference, HAS 2015, held as part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015 : proceedings /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2015 = 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015 : proceedings.. Part I /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2015 = 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015 : proceedings.. Part II /
by:
(Electronic resources)
Trust and trustworthy computing = 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015 : proceedings /
by:
(Electronic resources)
Fast software encryption = 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015 : revised selected papers /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2015 = 17th International Workshop, Saint-Malo, France, September 13-16, 2015 : proceedings /
by:
(Electronic resources)
Cyber security and privacy = 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015 : revised selected papers /
by:
(Electronic resources)
Digital forensics and cyber crime = 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015 : revised selected papers /
by:
(Electronic resources)
Security, privacy, and applied cryptography engineering = 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015 : proceedings.. Part I /
by:
(Electronic resources)
Computer security - ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015 : proceedings.. Part II /
by:
(Electronic resources)
Computer safety, reliability, and security = SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015 : proceedings /
by:
(Electronic resources)
Computer safety, reliability, and security = 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015 : proceedings /
by:
(Electronic resources)
Security and trust management = 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security = FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015 : revised selected papers /
by:
(Electronic resources)
Information security = 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013 : proceedings /
by:
(Electronic resources)
Cyber security = second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015 : revised selected papers /
by:
(Electronic resources)
Information security and privacy = 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.. Part I /
by:
(Electronic resources)
Constructive side-channel analysis and secure design = 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016 : revised selected papers /
by:
(Electronic resources)
Enhancing cryptographic primitives with techniques from error correcting codes
by:
(Language materials, printed)
Computer security - ESORICS 2010 = 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, proceedings /
by:
(Language materials, printed)
Trustworthly global computing = 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, revised selected papers /
by:
(Language materials, printed)
Information theoretic security = 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, revised selected papers /
by:
(Language materials, printed)
Information security and privacy = 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, proceedings /
by:
(Language materials, printed)
Recent advances in intrusion detection = 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, proceedings /
by:
(Language materials, printed)
Provable security = 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings /
by:
(Language materials, printed)
Computational intelligence in security for information systems 2010 = proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS 2010)/
by:
(Language materials, printed)
Autonomic and trusted computing = 7th international conference, ATC 2010, Xi'an, China, October 26-29, 2010 : proceedings /
by:
(Language materials, printed)
Advances in Information and computer security = 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, proceedings /
by:
(Language materials, printed)
Pairing-based cryptography - Pairing 2010 = 4th international conference, Yamanaka Hot Spring, Japan, December 2010, proceedings /
by:
(Language materials, printed)
Security technology, disaster recovery and business continuity = International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010, proceedings /
by:
(Language materials, printed)
The disaster recovery handbook : = a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
by:
(Language materials, printed)
Privacy and identity management for life = 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010 : revised selected papers /
by:
(Electronic resources)
Information security = 13th international conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systems = third International symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011 : proceedings /
by:
(Electronic resources)
Information security applications = 11th international workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010 : revised selected papers /
by:
(Electronic resources)
Data privacy management and autonomous spontaneous security = 5th international workshop, DPM 2010 and 3rd international workshop, SETOP 2010, Athens, Greece, September 23, 2010 : revised selected papers /
by:
(Electronic resources)
Formal aspects of security and trust = 7th international workshop, FAST 2010, Pisa, Italy, September 16-17, 2010 : revised selected papers /
by:
(Electronic resources)
Digital forensics and cyber crime = second international ICST conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010 : revised selected papers /
by:
(Electronic resources)
Proceedings of the International Conference on IT Convergence and Security 2011
by:
(Electronic resources)
Theory of security and applications = Joint Workshop, TOSCA 2011, Saarbrucken, Germany, March 31 - April 1, 2011 : revised selected papers /
by:
(Electronic resources)
Foundations and practice of security = 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers /
by:
(Electronic resources)
Selected areas in cryptography = 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011 : revised selected papers /
by:
(Electronic resources)
Data privacy management and autonomous spontaneus security = 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011 : revised selected papers /
by:
(Electronic resources)
Information security technology for applications = 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2012 = 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012 : proceedings /
by:
(Electronic resources)
Information security practice and experience = 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012 : proceedings /
by:
(Electronic resources)
Advanced computing, networking and security = International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011 : revised selected papers /
by:
(Electronic resources)
Information security technology for applications = 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Constructive side-channel analysis and secure design = Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012 : proceedings /
by:
(Electronic resources)
Security and trust management = 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011 : revised selected papers /
by:
(Electronic resources)
Identity, security and democracy = the wider social and ethical implications of automated systems for human identification /
by:
(Language materials, printed)
Communications and multimedia security = 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom /
by:
(Electronic resources)
Trust management VI = 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings /
by:
(Electronic resources)
Financial cryptography and data security = FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28-March 4, 2011, Revised selected papers /
by:
(Electronic resources)
Intelligence and security informatics = Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012 : proceedings /
by:
(Electronic resources)
Dependable networks and services = 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, Luxembourg, Luxembourg, June 4-8, 2012 : proceedings /
by:
(Electronic resources)
Information security and privacy = 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012 : proceedings /
by:
(Electronic resources)
Information security and cryptology - ICISC 2011 = 14th International Conference, Seoul, Korea, November 30 - December 2, 2011 : revised aelected papers /
by:
(Electronic resources)
Trusted systems = third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011 : revised selected papers /
by:
(Electronic resources)
omputer security - ESORICS 2012 = 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 : proceedings /
by:
(Electronic resources)
Provable security = 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012 : proceedings /
by:
(Electronic resources)
ICT critical infrastructures and society = 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012 : proceedings /
by:
(Electronic resources)
Communications and multimedia security = 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012 : proceedings /
by:
(Electronic resources)
Research in Attacks, Intrusions, and Defenses = 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012 : proceedings /
by:
(Electronic resources)
Information security = 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012 : proceedings /
by:
(Electronic resources)
Computer safety, reliability, and security = SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012 : proceedings /
by:
(Electronic resources)
Computer safety, reliability, and security = 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012 : proceedings /
by:
(Electronic resources)
Fast software encryption = 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012 : revised selected papers /
by:
(Electronic resources)
Computer network security = 6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012 : proceedings /
by:
(Electronic resources)
Information and communications security = 14th international conference, ICICS 2012, Hong Kong, China, October 29-31, 2012 : proceedings /
by:
(Electronic resources)
Secure IT systems = 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 : proceedings /
by:
(Electronic resources)
Security, privacy, and applied cryptography engineering = second international conference, SPACE 2012, Chennai, India, November 3-4, 2012 : proceedings /
by:
(Electronic resources)
Computer applications for security, control and system engineering = International Conferences, SecTech, CA, CES3 2012, held in conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012 : proceedings /
by:
(Electronic resources)
Advances in information and computer security = 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012 : proceedings /
by:
(Electronic resources)
Advances in Cryptology - ASIACRYPT 2012 = 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012 : proceedings /
by:
(Electronic resources)
Information security applications = 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers /
by:
(Electronic resources)
Computer security = ESORICS 2008 : 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008 : proceedings /
by:
(Electronic resources)
Information and communications security = 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 : proceedings /
by:
(Electronic resources)
Information hiding = 10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008 : revised selected papers /
by:
(Electronic resources)
Provable security = second international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings /
by:
(Electronic resources)
ISSE 2012 securing electronic business processes = highlights of the Information Security Solutions Europe 2012 Conference /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 2012 = 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012 : proceedings /
by:
(Electronic resources)
Information systems security = 8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(Electronic resources)
Trusted systems = 4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(Electronic resources)
Security protocols XX = 20th international workshop, Cambridge, UK, April 12-13, 2012 : revised selected papers /
by:
(Electronic resources)
Critical infrastructure protection VI = 6th IFIP WG 11.10 international conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012 : revised selected papers /
by:
(Electronic resources)
Handbook on securing cyber-physical critical infrastructure = foundation and challenges /
by:
(Electronic resources)
Thor's Microsoft security bible DUP_1 = a collection of practical security techniques /
by:
(Electronic resources)
ICT and critical infrastructure = proceedings of the 48th Annual Convention of Computer Society of India.. Volume II /
by:
(Electronic resources)
ICT and critical infrastructure = proceedings of the 48th Annual Convention of Computer Society of India.. Volume I /
by:
(Electronic resources)
Information theoretic security = 7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(Electronic resources)
Pairing-based cryptography - Pairing 2013 = 6th International Conference, Beijing, China, November 22-24, 2013 : revised selected papers /
by:
(Electronic resources)
Selected areas in cryptography - SAC 2013 = 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2014 = the Cryptographer's track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014 : proceedings /
by:
(Electronic resources)
Information security practice and experience = 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014 : proceedings /
by:
(Electronic resources)
Intelligence and security informatics = Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014 : proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2014 = 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014 : proceedings /
by:
(Electronic resources)
Privacy and identity management for emerging services and technologies = 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013 : revised selected papers /
by:
(Electronic resources)
ICT systems security and privacy protection = 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014 : proceedings /
by:
(Electronic resources)
Progress in cryptology - AFRICACRYPT 2014 = 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014 : proceedings /
by:
(Electronic resources)
Privacy technologies and policy = second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014 : proceedings /
by:
(Electronic resources)
Advanced computing, networking and informatics. = proceedings of the second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014) /. Volume 2,. Wireless networks and security
by:
(Electronic resources)
Intelligent data analysis and its applications. = proceeding of the First Euro-China Conference on Intelligent Data Analysis and Applications, June 13-15, 2014, Shenzhen, China /. Volume I
by:
(Electronic resources)
Trust Management VIII = 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014 : proceedings /
by:
(Electronic resources)
Trustworthy computing and services = International Conference, ISCTCS 2013, Beijing, China, November 2013 : revised selected papers /
by:
(Electronic resources)
Human aspects of information security, privacy, and trust = second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings /
by:
(Electronic resources)
Privacy enhancing technologies = 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings /
by:
(Electronic resources)
Detection of intrusions and malware, and vulnerability assessment = 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings /
by:
(Electronic resources)
Trust and trustworthy computing = 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 - July 2, 2014 : proceedings /
by:
(Electronic resources)
Information security theory and practice = securing the internet of things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXVIII = 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014 : proceedings /
by:
(Electronic resources)
Intelligent data analysis and its applications. = proceeding of the First Euro-China Conference on Intelligent Data Analysis and Applications, June 13-15, 2014, Shenzhen, China /. Volume II
by:
(Electronic resources)
Cryptography and security systems = Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014 : proceedings /
by:
(Electronic resources)
Advances in information and computer security = 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014 : proceedings /
by:
(Electronic resources)
Foundations of security analysis and design VII = FOSAD 2012/2013 tutorial lectures /
by:
(Electronic resources)
Constructive side-channel analysis and secure design = 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014 : revised selected papers /
by:
(Electronic resources)
Computer safety, reliability, and security = SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014 : proceedings /
by:
(Electronic resources)
Computer security - ESORICS 2014 = 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014 : proceedings.. Part I /
by:
(Electronic resources)
Computer security - ESORICS 2014 = 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014 : proceedings.. Part II /
by:
(Electronic resources)
Communications and multimedia security = 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 : proceedings /
by:
(Electronic resources)
Computer safety, reliability, and security = 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014 : proceedings /
by:
(Electronic resources)
Stabilization, safety, and security of distributed systems = 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 - October 1, 2014 : proceedings /
by:
(Electronic resources)
Security and trust management = 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2014 = 16th International Workshop, Busan, South Korea, September 23-26, 2014 : proceedings /
by:
(Electronic resources)
Testing software and systems = 26th IFIP WG 6.1 International Conference, ICTSS 2014, Madrid, Spain, September 23-25, 2014 : proceedings /
by:
(Electronic resources)
Cyber security and privacy = third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers /
by:
(Electronic resources)
Information security = 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2014 = 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014 : proceedings.. Part II /
by:
(Electronic resources)
Advances in cryptology - ASIACRYPT 2014 = 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014 : proceedings.. Part I /
by:
(Electronic resources)
Digital forensics and cyber crime = fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013 : revised selected papers /
by:
(Electronic resources)
Information systems security = 10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings /
by:
(Electronic resources)
Trustworthy global computing = 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014 : revised selected papers /
by:
(Electronic resources)
Security protocols XVIII = 18th International Workshop, Cambridge, UK, March 24-26, 2010 : revised selected papers /
by:
(Electronic resources)
Information security applications = 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systems = 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015 : proceedings /
by:
(Electronic resources)
Information security and cryptology - ICISC 2014 = 17th International Conference, Seoul, South Korea, December 3-5, 2014 : revised selected papers /
by:
(Electronic resources)
Progress in cryptology - LATINCRYPT 2014 = third International Conference on Cryptology and Information Security in Latin America Florianopolis, Brazil, September 17–19, 2014 : revised selected papers /
by:
(Electronic resources)
Lightweight cryptography for security and privacy = third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology = 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014 : revised selected papers /
by:
(Electronic resources)
Information theoretic security = 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015 : proceedings /
by:
(Electronic resources)
Information security practice and experience = 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015 : proceedings /
by:
(Electronic resources)
Fast software encryption = 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2015 = 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015 : proceedings.. Part I /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2015 = 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015 : proceedings.. Part II /
by:
(Electronic resources)
ICT systems security and privacy protection = 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /
by:
(Electronic resources)
Privacy and identity management for the future internet in the age of globalisation = 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014 : revised selected papers /
by:
(Electronic resources)
Intelligence and security informatics = Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015 : proceedings /
by:
(Electronic resources)
Codes, cryptology, and information security = first International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015 : proceedings - In Honor of Thierry Berger /
by:
(Electronic resources)
Trustworthy computing and services = International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 : revised selected papers /
by:
(Language materials, printed)
Information security and privacy = 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015 : proceedings /
by:
(Language materials, printed)
Detection of intrusions and malware, and vulnerability assessment = 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015 : proceedings /
by:
(Language materials, printed)
Data and applications security and privacy XXIX = 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015 : proceedings /
by:
(Language materials, printed)
Cryptography and information security in the Balkans = first International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014 : revised selected papers /
by:
(Electronic resources)
Constructive side-channel analysis and secure design = 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015 : revised selected papers /
by:
(Electronic resources)
Security in computing and communications = third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015 : proceedings /
by:
(Electronic resources)
Stabilization, safety, and security of distributed systems = 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015 : proceedings /
by:
(Electronic resources)
Progress in Cryptology - LATINCRYPT 2015 = 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015 : proceedings /
by:
(Electronic resources)
Advances in information and computer security = 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015 : proceedings /
by:
(Electronic resources)
Information security = 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 : proceedings /
by:
(Electronic resources)
Information security theory and practice = 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 : proceedings /
by:
(Electronic resources)
Global security, safety and sustainability = tomorrow's challenges of cyber security : 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015 : proceedings /
by:
(Electronic resources)
International Conference on Security and Privacy in Communication Networks = 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers.. Part I /
by:
(Electronic resources)
Advances in Digital Forensics XI = 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015 : revised selected papers /
by:
(Electronic resources)
Decision and game theory for security = 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015 : proceedings /
by:
(Electronic resources)
Network and system security = 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(Electronic resources)
Provable security = 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(Electronic resources)
Security protocols XXIII = 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(Electronic resources)
Future data and security engineering = second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015 : proceedings /
by:
(Electronic resources)
Secure IT systems = 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(Electronic resources)
International Conference on Security and Privacy in Communication Networks = 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers.. Part II /
by:
(Electronic resources)
Information systems security = 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings /
by:
(Electronic resources)
Innovative security solutions for information technology and communications = 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : revised selected papers /
by:
(Electronic resources)
Trusted systems = 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers /
by:
(Electronic resources)
Theory of cryptography = 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.. Part I /
by:
(Electronic resources)
Transactions on large-scale data- and knowledge-centered systems XXIII = selected papers from FDSE 2014 /
by:
(Electronic resources)
Computational intelligence, cyber security and computational models = proceedings of ICC3 2015 /
by:
(Electronic resources)
Trustworthy global computing = 10th International Symposium, TGC 2015 Madrid, Spain, August 31 - September 1, 2015 : revised selected papers /
by:
(Electronic resources)
Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC - 16')
by:
(Electronic resources)
Proceedings of International Conference on ICT for Sustainable Development = ICT4SD 2015 Volume 1 /
by:
(Electronic resources)
Proceedings of International Conference on ICT for Sustainable Development = ICT4SD 2015.. Volume 2 /
by:
(Electronic resources)
Lightweight cryptography for security and privacy = 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015 : revised selected papers /
by:
(Electronic resources)
Cryptography and information security in the Balkans = second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015 : revised selected papers /
by:
(Electronic resources)
Information and communications security = 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015 : revised selected papers /
by:
(Electronic resources)
Data privacy management, and security assurance = 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015 : revised selected papers /
by:
(Electronic resources)
Foundations and practice of security = 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015 : revised selected papers /
by:
(Electronic resources)
Engineering secure software and systems = 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016 : proceedings /
by:
(Electronic resources)
Information security and cryptology - ICISC 2015 = 18th International Conference, Seoul, South Korea, November 25-27, 2015 : revised selected papers /
by:
(Electronic resources)
Privacy technologies and policy = third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015 : revised selected papers /
by:
(Electronic resources)
Trusted systems = 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015 : revised selected papers /
by:
(Electronic resources)
Critical information infrastructures security = 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers /
by:
(Electronic resources)
Intelligence and security informatics = 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings /
by:
(Electronic resources)
Information security applications = 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015 : revised selected papers /
by:
(Electronic resources)
Principles of security and trust = 5th International Conference, POST 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, the Netherlands, April 2-8, 2016 : proceedings /
by:
(Electronic resources)
ICT systems security and privacy protection = 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings /
by:
(Electronic resources)
Critical Information Infrastructures Security = 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015 : revised selected papers /
by:
(Electronic resources)
Information security and cryptology = 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015 : revised selected papers /
by:
(Electronic resources)
Human aspects of information security, privacy, and trust = 4th international conference, HAS 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings /
by:
(Electronic resources)
Security of industrial control systems and cyber physical systems = first Workshop, CyberICS 2015 and first Workshop, WOS-CPS 2015 Vienna, Austria, September 21-22, 2015 : revised selected papers /
by:
(Electronic resources)
Recent advances in information and communication technology 2016 = proceedings of the 12th International Conference on Computing and Information Technology (IC2IT) /
by:
(Electronic resources)
Trust management X = 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 : proceedings /
by:
(Electronic resources)
Privacy and identity management = time for a revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015 : revised selected papers /
by:
(Electronic resources)
Information security and privacy = 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.. Part II /
by:
(Electronic resources)
Data and applications security and privacy XXX = 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016 : proceedings /
by:
(Electronic resources)
Security and cryptography for networks = 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, proceedings /
by:
(Language materials, printed)
Information security and assurance = 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, proceedings /
by:
(Language materials, printed)
Global security, safety, and sustainability = 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, proceedings /
by:
(Language materials, printed)
Fast software encryption = 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2016 = 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings.. Part II /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2016 = 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings.. Part III /
by:
(Electronic resources)
Advances in cryptology - CRYPTO 2016 = 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : proceedings.. Part I /
by:
(Electronic resources)
Transactions on computational science XXVIII = special issue on cyberworlds and cybersecurity /
by:
(Electronic resources)
Computer safety, reliability, and security = SAFECOMP 2016 Workshops, ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20, 2016 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing = 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016 : proceedings /
by:
(Electronic resources)
Information security = 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016 : proceedings /
by:
(Electronic resources)
Data and applications security and privacy XXIV = 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, proceedings /
by:
(Language materials, printed)
Progress in cryptology - LATINCRYPT 2010 = First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedings/
by:
(Language materials, printed)
Security and privacy - silver linings in the cloud = 25th IFIP TC-11 International Information Security Conference, SEC 2010, held as part of WCC 2010, Brisbane, Australia, September 20-23, 2010, proceedings/
by:
(Language materials, printed)
ISSE 2014 securing electronic business processes = highlights of the Information Security Solutions Europe 2014 Conference /
by:
(Electronic resources)
Critical infrastructure protection VIII = 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014 : revised selected papers /
by:
(Electronic resources)
Secure IT systems = 19th Nordic Conference, NordSec 2014, Tromso, Norway, October 15-17, 2014 : proceedings /
by:
(Electronic resources)
Network and system security = 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014 : proceedings /
by:
(Electronic resources)
Security, privacy, and applied cryptography engineering = 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014 : proceedings /
by:
(Electronic resources)
Information security and cryptology - ICISC 2013 = 16th International Conference, Seoul, Korea, November 27-29, 2013 : revised selected papers /
by:
(Electronic resources)
Security protocols XXII = 22nd International Workshop, Cambridge, UK, March 19-21, 2014 : revised selected papers /
by:
(Electronic resources)
Provable security = 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014 : proceedings /
by:
(Electronic resources)
Future data and security engineering = first International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security = FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014 : revised selected papers /
by:
(Electronic resources)
Progress in cryptology - AFRICACRYPT 2016 = 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016 : proceedings /
by:
(Electronic resources)
Risks and security of internet and systems = 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2016 = 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.. Part I /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2016 = 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.. Part II /
by:
(Electronic resources)
Foundations of security analysis and design VIII = FOSAD 2014/2015/2016 tutorial lectures /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2016 = 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016 : proceedings /
by:
(Electronic resources)
Show more
Fewer
Subjects