Your search returned 108 results.

Not what you expected? Check for suggestions
Sort
Results
1.
2.
Foundations of security analysis and design : tutorial lectures / Riccardo Focardi, Robert Gorrieri (eds.). by Series: Lecture notes in computer science ; 2171.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2001
Online resources:
Availability: Items available for loan: e-Library (1).
3.
Foundations of security analysis and design II : FOSAD 2001/2002 turorial lectures / Riccardo Focardi, Roberto Gorrieri (eds.). by Series: Lecture notes in computer science ; 2946.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, 2004
Online resources:
Availability: Items available for loan: e-Library (1).
4.
Querying databases privately : a new approach to private information retrieval / Dmitri Asonov. by Series: Lecture notes in computer science ; 3128.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2004
Dissertation note: doctoral Humboldt Universität, Berlin 2003
Online resources:
Availability: Items available for loan: e-Library (1).
5.
Autonomic and trusted computing : third international conference, ATC 2006, Wuhan, China, September 3-6, 2006 : proceedings / Laurence T. Yang [and others] (eds.). by Series: Lecture notes in computer science ; 4158.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2006
Other title:
  • ATC 2006
Online resources:
Availability: Items available for loan: e-Library (1).
6.
7.
Privacy enhancing technologies : 5th international workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005 : revised selected papers / George Danezis, David Martin (eds.). by Series: Lecture notes in computer science ; 3856.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, 2006
Other title:
  • PET 2005
In: OhioLINK electronic book center In: SpringerLink
Online resources:
Availability: Items available for loan: e-Library (1).
8.
Detection of intrusions and malware & vulnerability assessment : third international conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006 : proceedings / Roland Büschkes, Pavel Laskov (eds.). by Series: Lecture notes in computer science ; 4064.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Berlin ; New York : Springer, ©2006
Other title:
  • DIMVA 2006
Online resources:
Availability: Items available for loan: e-Library (1).
9.
Public key infrastructure : Third European PKI Workshop : theory and practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006 : proceedings / Andrea S. Atzeni, Antonio Lioy (eds.). by Series: Lecture notes in computer science ; 4043.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2006
Other title:
  • EuroPKI 2006
In: OhioLINK electronic book center In: SpringerLink
Online resources:
Availability: Items available for loan: e-Library (1).
10.
Secure transaction protocol analysis : models and applications / Qinggeng Chen, Chengqi Zhang, Shichao Zhang. by Series: Lecture notes in computer science ; 5111.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer-Verlag, ©2008
Online resources:
Availability: Items available for loan: e-Library (1).
11.
Critical infrastructure protection : information infrastructure models, analysis, and defense / Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.). by Series: Lecture notes in computer science ; 7130. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2012
Online resources:
Availability: Items available for loan: e-Library (1).
12.
Transactions on computational science XVII / Marina L. Gavrilova, C.J. Kenneth Tan (eds.). by Series: Lecture notes in computer science ; 7420.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2013
Other title:
  • Transactions on computational science 17
In: Springer e-books
Online resources:
Availability: Items available for loan: e-Library (1).
13.
Transactions on computational science XVIII : special issue on cyberworlds / Marina L. Gavrilova, C.J. Kenneth Tan, Arjan Kuijper (eds.). by Series: Lecture notes in computer science ; 7848. | Lecture notes in computer science. Journal subline.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin : Springer, ©2013
Other title:
  • Transactions on computational science 18
Online resources:
Availability: Items available for loan: e-Library (1).
14.
Engineering secure future internet services and systems : current research / Maritta Heisel, Wouter Joosen, Javier Lopez, Fabio Martinelli (Eds.). by Series: Lecture notes in computer science ; 8431. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Cham : Springer, [2014]Copyright date: ©2014 In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
15.
Secure and trustworthy service composition : the Aniketos approach / Achim D. Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios (Eds.). by Series: Lecture notes in computer science ; 8900. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Cham : Springer, [2014]Copyright date: ©2014
Online resources:
Availability: Items available for loan: e-Library (1).
16.
Theory and models for cyber situation awareness / Peng Liu, Sushil Jajodia, Cliff Wang (eds.). by Series: Lecture notes in computer science ; 10030. | LNCS sublibrary. SL 2, Programming and software engineering.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Cham, Switzerland : Springer, 2017 In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
17.
Transactions on computational science XXXI : special issue on signal processing and security in distributed systems / Marina L. Gavrilova, C.J. Kenneth Tan, Nabendu Chaki, Khalid Saeed (eds.). by Series: Lecture notes in computer science ; 10730.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Berlin, Germany : Springer, [2018]
Other title:
  • Transactions on Computational Science 31
Online resources:
Availability: Items available for loan: e-Library (1).
18.
Policy-based autonomic data governance / Seraphin Calo, Elisa Bertino, Dinesh Verma (eds.). by Series: Lecture notes in computer science ; 11550.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Cham, Switzerland : Springer, [2019]
Online resources:
Availability: Items available for loan: e-Library (1).
19.
Transactions on computational science XXXV : special issue on signal processing and security in distributed systems / Marina L. Gavrilova, C.J. Kenneth Tan, Khalid Saeed, Nabendu Chaki (eds.). by Series: Lecture notes in computer science ; 11960.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin : Springer, 2020
Other title:
  • Transactions on computational science 35
  • Special issue on signal processing and security in distributed systems
Online resources:
Availability: Items available for loan: e-Library (1).
20.
Security and trust management : 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, Proceedings / Kostantinos Markantonakis, Marinella Petrocchi (eds.). by Series: Lecture notes in computer science ; 12386. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Cham : Springer, 2020
Other title:
  • STM 2020
Online resources:
Availability: Items available for loan: e-Library (1).
Pages

Powered by Koha