Your search returned 117 results.

Not what you expected? Check for suggestions
Sort
Results
41.
Security and trust management : 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised selected papers / Catherine Meadows, Carmen Fernandez-Gago (eds.). by Series: Lecture notes in computer science ; 7170. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • STM 2011
In: Springer eBooks
Availability: Items available for loan: e-Library (1).
42.
Information security technology for applications : 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised selected papers / Peeter Laud (ed.). by Series: Lecture notes in computer science ; 7161. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • NordSec 2011
Online resources:
Availability: Items available for loan: e-Library (1).
43.
Public key infrastructures, services and applications : 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers / Svetla Petkova-Nikova, Andreas Pashalidis, Günther Pernul (eds.). by Series: Lecture notes in computer science ; 7163. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • EuroPKI 2011
Online resources:
Availability: Items available for loan: e-Library (1).
44.
45.
Wired/Wireless internet communication : 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012. Proceedings / Yevgeni Koucheryavy [and others] (eds.). by Series: Lecture notes in computer science ; 7277. | LNCS sublibrary. SL 5, Computer communication networks and telecommunications.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
46.
Applied cryptography and network security : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings / Feng Bao, Pierangela Samarati, Jianying Zhou (eds.). by Series: Lecture notes in computer science ; 7341. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • ACNS 2012
Online resources:
Availability: Items available for loan: e-Library (1).
47.
48.
Progress in cryptology -- AFRICACRYPT 2012 : 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings / Aikaterini Mitrokotsa, Serge Vaudenay (eds.). by Series: Lecture notes in computer science ; 7374. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • AFRICACRYPT 2012
Online resources:
Availability: Items available for loan: e-Library (1).
49.
Formal aspects of security and trust : 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised selected papers / Gilles Barthe, Anupam Datta, Sandro Etalle (eds.). by Series: Lecture notes in computer science ; 7140. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • FAST 2011
Online resources:
Availability: Items available for loan: e-Library (1).
50.
Data and applications security and privacy XXVI : 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings / Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro (eds.). by Series: Lecture notes in computer science ; 7371. | LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • DBSec 2012
  • Data and applications security and privacy 26
Online resources:
Availability: Items available for loan: e-Library (1).
51.
Privacy enhancing technologies : 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings / Simone Fischer-Hübner, Matthew Wright (eds.). by Series: Lecture notes in computer science ; 7384. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • PETS 2012
Online resources:
Availability: Items available for loan: e-Library (1).
52.
Pervasive computing : 10th International Conference, Pervasive 2012, Newcastle, UK, June 18-22, 2012. Proceedings / Judy Kay [and others] (eds.). by Series: Lecture notes in computer science ; 7319. | LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • Pervasive 2012
Online resources:
Availability: Items available for loan: e-Library (1).
53.
Information security and privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings / Willy Susilo, Yi Mu, Jennifer Seberry (eds.). by Series: Lecture notes in computer science ; 7372. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • ACISP 2012
Online resources:
Availability: Items available for loan: e-Library (1).
54.
Trusted systems : third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised selected papers / Liqun Chen, Moti Yung, Liehuang Zhu (eds.). by Series: Lecture notes in computer science ; 7222. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • INTRUST 2011
Online resources:
Availability: Items available for loan: e-Library (1).
55.
Information security and cryptology-- ICISC 2011 : 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised selected papers / Howon Kim (ed.). by Series: Lecture notes in computer science ; 7259. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • ICISC 2011
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
56.
Information theoretic security : 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings / Adam Smith (ed.). by Series: Lecture notes in computer science ; 7412. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Berlin ; New York : Springer, [2012]Copyright date: ©2012
Other title:
  • International Conference of Information-theoretic Security 2012
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
57.
Transactions on data hiding and multimedia security VIII : special issue on pattern recognition for IT security / Yun Q. Shi (editor-in-chief), Stefan Katzenbeisser (guest editor). by Series: Lecture notes in computer science ; 7228.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • Transactions on data hiding and multimedia security 8
Online resources:
Availability: Items available for loan: e-Library (1).
58.
Business system management and engineering : from open issues to applications / Claudio A. Ardagna [and others] (eds.). by Series: Lecture notes in computer science ; 7350. | Lecture notes in computer science. Services science. | Lecture notes in computer science. State-of-the-art survey. | LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
59.
Advances in cryptology-- CRYPTO 2012 : 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings / Reihaneh Safavi-Naini, Ran Canetti (eds.). by Series: Lecture notes in computer science ; 7417. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Berlin ; New York : Springer, 2012Copyright date: ©2012
Other title:
  • CRYPTO 2012
Online resources:
Availability: Items available for loan: e-Library (1).
60.
Interactive theorem proving : third International Conference, ITP 2012, Princeton, NJ, USA, August 13-15, 2012. Proceedings / Lennart Beringer, Amy Felty (eds.). by Series: Lecture notes in computer science ; 7406. | LNCS sublibrary. SL 1, Theoretical computer science and general issues.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Other title:
  • ITP 2012
Online resources:
Availability: Items available for loan: e-Library (1).
Pages

Powered by Koha