Refine your search

Your search returned 309 results.

Not what you expected? Check for suggestions
Sort
Results
Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papers / Jan L. Camenisch [and others] (eds.).

by IH (Conference) (8th : 2006 : Alexandria, Va.) | Camenisch, Jan.

Series: Serienbezeichnung | Lecture notes in computer science ; 4437. | LNCS sublibrary. SL 4, Security and cryptology.Source: Springer e-booksMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Berlin ; New York : Springer, ©2007Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Information security theory and practices : smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings / Damien Sauveron [and others] (eds.).

by WISTP 2007 (2007 : Ērakleion, Greece) | Sauveron, Damien | International Federation for Information Processing. Technical Committee 6 | IFIP WG 8.8 (Smart Cards).

Series: Serienbezeichnung | Lecture notes in computer science ; 4462.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Berlin ; New York : Springer, ©2007Other title: First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007 | 1st IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007 | IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007 | WISTP 2007.Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings / Lynn Margaret Batten, Reihaneh Safavi-Naini (eds.).

by ACISP (Conference) (11th : 2006 : Melbourne, Vic.) | Batten, Lynn Margaret | Safavi-Naini, Reihanah.

Series: Serienbezeichnung | Lecture notes in computer science ; 4058.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Berlin ; New York : Springer, 2006Other title: ACISP 2006.Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Digital watermarking : 5th international workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006 : proceedings / Yun Qing Shi, Byeungwoo Jeon (eds.).

by IWDW (Conference) (5th : 2006 : Cheju-do, Korea) | Shi, Yun Q | Jeon, Byeungwoo.

Series: Serienbezeichnung | Lecture notes in computer science ; 4283.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Berlin ; New York : Springer, ©2006Other title: IWDW 2006.Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Detection of Intrusions and Malware, and Vulnerability Assessment. 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings.

by Hutchison, David, 1949-.

Series: Serienbezeichnung | Lecture notes in computer science ; 5137.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Berlin : Springer-Verlag, 2008Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Information security theory and practice : smart devices, pervasive systems, and ubiquitous networks ; third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 ; proceedings / Olivier Markowitch [and others] (eds.).

by WISTP 2009 (2009 : Brussels, Belgium) | Markowitch, Olivier | IFIP WG 11.2.

Series: Serienbezeichnung | Lecture notes in computer science ; 5746.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Berlin : Springer-Verlag, ©2009Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Transactions on data hiding and multimedia security V / Yun Q. Shi (Ed.).

by Shi, Yun Q.

Series: Serienbezeichnung | Lecture notes in computer science ; 6010. | LNCS sublibrary. SL 1, Theoretical computer science and general issues.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Berlin ; Heidelberg : Springer-Verlag, ©2010Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Digital privacy : PRIME--Privacy and Identity Management for Europe / Jan Camenisch, Ronald Leenes, Dieter Sommer (eds.).

by Camenisch, Jan | Leenes, Ronald | Sommer, Dieter.

Series: Serienbezeichnung | Lecture notes in computer science ; 6545. | Lecture notes in computer science. State-of-the-art survey. | LNCS sublibrary. SL 4, Security and cryptology.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Berlin ; New York : Springer, ©2011Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Foundations of security analysis and design VI : FOSAD tutorial lectures / Alessandro Aldini, Roberto Gorrieri (eds.).

by International School on Foundations of Security Analysis and Design (2010 : Bertinoro, Italy) | Aldini, Alessandro | Gorrieri, Roberto.

Series: Serienbezeichnung | Lecture notes in computer science ; 6858. | Lecture notes in computer science. Tutorial. | LNCS sublibrary. SL 4, Security and cryptology.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Berlin : Springer, ©2011Other title: FOSAD tutorial lectures | FOSAD 2010 | Foundations of security analysis and design 6 | Foundations of security analysis and design six.Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Transactions on data hiding and multimedia security VI / Yun Q. Shi [and others] (eds.).

by Shi, Yun Q.

Series: Serienbezeichnung | Lecture notes in computer science ; 6730.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Berlin ; New York : Springer, ©2011Other title: Transactions on data hiding and multimedia security 6.Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Dependable and Historic Computing : Essays Dedicated to Brian Randell on the Occasion of His 75th Birthday / edited by Cliff B. Jones, John L. Lloyd.

by Jones, Cliff B | Lloyd, J. L. (John L.).

Series: Serienbezeichnung | Lecture notes in computer science ; 6875.Material type: Text Text; Format: available online remote; Literary form: Not fiction Copyright date: ©2011Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Integrity primitives for secure information systems : final report of RACE Integrity Primitives Evaluation RIPE RACE (1040) / Antoon Bosselaers, Bart Preneel, eds.

by Bosselaers, Antoon | Preneel, Bart, 1963-.

Series: Serienbezeichnung | Lecture notes in computer science ; 1007.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Berlin ; New York : Springer-Verlag, ©1995Other title: RIPE.Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Information theoretic security : 7th international conference, ICITS 2013, Singapore, November 28-30, 2013, proceedings / Carles Padró (ed.).

by ICITS (Conference) (7th : 2013 : Singapore) | Padró, Carles [editor.].

Series: Serienbezeichnung | Lecture notes in computer science ; 8317. | LNCS sublibrary. SL 4, Security and cryptology.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, [2014]Copyright date: ©2014Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Passive and active measurement : 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014 : proceedings / Michalis Faloutsos, Aleksandar Kuzmanovic (eds.).

by PAM (Conference) (15th : 2014 : Los Angeles, Calif.) | Faloutsos, Michalis [editor.] | Kuzmanovic, Aleksandar [editor.].

Series: Serienbezeichnung | Lecture notes in computer science ; 8362. | LNCS sublibrary. SL 5, Computer communication networks and telecommunications.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2014Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Advances in information and computer security : 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings / Maki Yoshida, Koichi Mouri (eds.).

by International Workshop on Security (9th : 2014 : Hirosaki-shi, Japan) | Yoshida, Maki [editor.] | Mouri, Koichi [editor.].

Series: Serienbezeichnung | Lecture notes in computer science ; 8639. | LNCS sublibrary. SL 4, Security and cryptology.Source: Springer eBooksMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, [2014]Copyright date: ©2014Other title: IWSEC 2014.Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Security protocols XXII : 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised selected papers / Bruce Christianson, James Malcolm, Vashek Matyáš, Petr Švenda, Frank Stajano, Jonathan Anderson (eds.).

by International Workshop on Security Protocols (22nd : 2014 : Cambridge, Great Britain) | Christianson, Bruce [editor.] | Malcolm, James (Computer scientist) [editor.] | Matyáš, Vashek [editor.] | Švenda, Petr [editor.] | Stajano, Frank [editor.] | Anderson, Jonathan (Computer scientist) [editor.].

Series: Serienbezeichnung | Lecture notes in computer science ; 8809. | LNCS sublibrary. SL 4, Security and cryptology.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2014Other title: Security protocols 22.Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Selected areas in cryptography -- SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 14-15, 2014 : revised selected papers / Antoine Joux, Amr Youssef (Eds.).

by SAC (Conference) (21st : 2014 : Montréal, Québec) | Joux, Antoine [editor.] | Youssef, Amr [editor.].

Series: Serienbezeichnung | Lecture notes in computer science ; 8781. | LNCS sublibrary. SL 4, Security and cryptology.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, [2014]Copyright date: ©2014Other title: SAC 2014.Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Information systems security : 10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, proceedings / Atul Prakash, Rudrapatna Shyamasundar (Eds.).

by ICISS (Conference) (10th : 2014 : Hyderabad, India) | Prakash, Atul [editor.] | Shyamasundar, Rudrapatna, 1950- [editor.].

Series: Serienbezeichnung | Lecture notes in computer science ; 8880. | LNCS sublibrary. SL 4, Security and cryptology.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, [2014]Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Security protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers / Bruce Christianson, James Malcolm (eds.).

by International Workshop on Security Protocols (18th : 2010 : Cambridge, England) | Christianson, Bruce [editor.] | Malcolm, James (Computer scientist) [editor.].

Series: Serienbezeichnung | Lecture notes in computer science ; 7061, | LNCS sublibrary. SL 4, Security and cryptology.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin : Springer, 2014Other title: Security protocols 18.Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Emerging Technologies for Authorization and Authentication : Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings / edited by Andrea Saracino, Paolo Mori.

by ETAA (Workshop) (2nd : 2019 : Luxembourg City, Luxembourg) | Saracino, Andrea | Mori, Paolo (Computer scientist).

Series: Serienbezeichnung | Lecture notes in computer science ; 11967. | LNCS sublibrary. SL 4, Security and cryptology.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2020Other title: ETAA 2019.Online access: Click here to access online Availability: Items available for loan: e-Library (1).
Pages

Powered by Koha