Your search returned 47 results.

Not what you expected? Check for suggestions
Sort
Results
1.
Engineering secure software and systems : second international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 : proceedings / Fabio Massacci, Dan Wallach, Nicola Zannone (eds.). by Series: Lecture notes in computer science ; 5965. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin : Springer, ©2010
Other title:
  • ESSoS 2010
Online resources:
Availability: Items available for loan: e-Library (1).
2.
Formal aspects in security and trust : 6th international workshop, FAST 2009, Eindhoven, the Netherlands, November 5-6, 2009, revised selected papers / Pierpaolo Degano, Joshua D. Guttman, (eds.). by Series: Lecture notes in computer science ; 5983. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher number:
  • 80012380
Publication details: Berlin : Springer, ©2010
Other title:
  • FAST 2009
Online resources:
Availability: Items available for loan: e-Library (1).
3.
Progress in cryptology - Africacrypt 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings / Daniel J. Bernstein, Tanja Lange, Eds. by Series: Lecture notes in computer science ; 6055. | LNCS sublibrary. SL 4, Security and cryptology.
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher number:
  • 80013130
Publication details: Berlin ; New York : Springer, ©2010
Online resources:
Availability: Items available for loan: e-Library (1).
4.
Topics in cryptology - CT-RSA 2010 : the Cryptographers' track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings / Josef Pieprzyk (Ed.). by Series: Lecture notes in computer science ; 5985. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; Heidelberg : Springer-Verlag, ©2010
Other title:
  • CT-RSA 2010
Online resources:
Availability: Items available for loan: e-Library (1).
5.
6.
Architecting critical systems : first international symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 / Holger Giese (ed.). by Series: Lecture notes in computer science ; 6150. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2010
Other title:
  • ISARCS 2010
Online resources:
Availability: Items available for loan: e-Library (1).
7.
8.
Trust and trustworthy computing : Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings / Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi (Eds.). by Series: Lecture notes in computer science ; 6101. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer-Verlag, ©2010
Online resources:
Availability: Items available for loan: e-Library (1).
9.
Fast software encryption : 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised selected papers / Seokhie Hong, Tetsu Iwata (Eds.). by Series: Lecture notes in computer science ; 6147. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2010
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
10.
Information, Security and Cryptology--ICISC 2009 : 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers / Donghoon Lee, Seokhie Hong (Eds.). by Series: Lecture notes in computer science ; 5984. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer-Verlag, ©2010
Online resources:
Availability: Items available for loan: e-Library (1).
11.
Post-quantum cryptography : third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 ; proceedings / Nicolas Sendrier (ed.). by Series: Lecture notes in computer science ; 6061. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin : Springer, 2010
Online resources:
Availability: Items available for loan: e-Library (1).
12.
Towards trustworthy elections : new directions in electronic voting / David Chaum [and others] (eds.). by Series: Lecture notes in computer science ; 6000. | Lecture notes in computer science. State-of-the-art survey. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin : Springer, ©2010
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
13.
Information security, practice and experience : 6th international conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010 : proceedings / Jin Kwak [and others] (eds.). by Series: Lecture notes in computer science ; 6047. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin : Springer, ©2010
Other title:
  • ISPEC 2010
Online resources:
Availability: Items available for loan: e-Library (1).
14.
Privacy enhancing technologies : 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings / Mikhail J. Atallah, Nicholas J. Hopper (Eds.). by Series: Lecture notes in computer science ; 6205. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; Heidelberg : Springer-Verlag, ©2010
Online resources:
Availability: Items available for loan: e-Library (1).
15.
Critical information infrastructures security : 4th international workshop, CRITIS 2009, Bonn, Germany, September 30-October 2, 2009 : revised papers / Erich Rome, Robin Bloomfield (Eds.). by Series: Lecture notes in computer science ; 6027. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; New York : Springer-Verlag, ©2010
Other title:
  • CRITIS 2009
Online resources:
Availability: Items available for loan: e-Library (1).
16.
17.
Smart card research and advanced application : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proceedings / Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny (eds.). by Series: Lecture notes in computer science ; 6035. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher number:
  • 80012258
Publication details: Berlin ; New York : Springer, ©2010
Online resources:
Availability: Items available for loan: e-Library (1).
18.
Theory of cryptography : 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings / Daniele Micciancio (ed.). by Series: Lecture notes in computer science ; 5978. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher number:
  • 12990504
Publication details: Berlin ; New York : Springer, ©2010
Other title:
  • TCC 2010
Online resources:
Availability: Items available for loan: e-Library (1).
19.
Trusted systems : first international conference, INTRUST 2009, Beijing, China, December 17-19, 2009 : revised selected papers / Liqun Chen, Moti Yung (Eds.). by Series: Lecture notes in computer science ; 6163. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; Heidelberg : Springer-Verlag, ©2010
Other title:
  • INTRUST 2009
Online resources:
Availability: Items available for loan: e-Library (1).
20.
Detection of intrusions and malware, and vulnerability assessment : 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings / Christian Kreibich, Marko Jahnke (Eds.). by Series: Lecture notes in computer science ; 6201. | LNCS sublibrary. SL 4, Security and cryptology.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Berlin ; Heidelberg : Springer-Verlag, ©2010
In: Springer eBooks
Online resources:
Availability: Items available for loan: e-Library (1).
Pages

Powered by Koha