1 |
![Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II](Cover.cls?type=cover&isbn=9783319706979&size=100) |
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II [E-Book]
|
|
2017 |
500268069
|
.
|
2 |
![Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III](Cover.cls?type=cover&isbn=9783319707006&size=100) |
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III [E-Book]
|
|
2017 |
500268070
|
.
|
3 |
![Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I](Cover.cls?type=cover&isbn=9783319706948&size=100) |
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I [E-Book]
|
|
2017 |
500268072
|
.
|
4 |
![Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings](Cover.cls?type=cover&isbn=9783642040917&size=100) |
Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings [E-Book]
|
Herrero, Álvaro
|
2009 |
|
.
|
5 |
![Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10) Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)](Cover.cls?type=cover&isbn=9783642166266&size=100) |
Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10) [E-Book]
|
Herrero, Álvaro
|
2010 |
|
.
|
6 |
![Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I](Cover.cls?type=cover&isbn=9783319664026&size=100) |
Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I [E-Book]
|
|
2017 |
500256220
|
.
|
7 |
![Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II](Cover.cls?type=cover&isbn=9783319663999&size=100) |
Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II [E-Book]
|
|
2017 |
500256222
|
.
|
8 |
![Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers](Cover.cls?type=cover&isbn=9783319713687&size=100) |
Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers [E-Book]
|
|
2017 |
500268079
|
.
|
9 |
![Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings](Cover.cls?type=cover&isbn=9783319694719&size=100) |
Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings [E-Book]
|
|
2017 |
500258191
|
.
|
10 |
![Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss](Cover.cls?type=cover&isbn=9783642167676&size=100) |
Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss [E-Book]
|
Biedermann, Alexander
|
2011 |
|
.
|
11 |
![Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers](Cover.cls?type=cover&isbn=9783319534657&size=100) |
Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers [E-Book]
|
|
2017 |
500245307
|
.
|
12 |
![Feistel Ciphers: Security Proofs and Cryptanalysis Feistel Ciphers: Security Proofs and Cryptanalysis](Cover.cls?type=cover&isbn=9783319495309&size=100) |
Feistel Ciphers: Security Proofs and Cryptanalysis [E-Book]
|
Nachef, Valerie
|
2017 |
|
.
|
13 |
![Handbook of Information and Communication Security Handbook of Information and Communication Security](Cover.cls?type=cover&isbn=9783642041174&size=100) |
Handbook of Information and Communication Security [E-Book]
|
Stavroulakis, Peter
|
2010 |
|
.
|
14 |
![Information Security Applications: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers Information Security Applications: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers](Cover.cls?type=cover&isbn=9783319565491&size=100) |
Information Security Applications: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers [E-Book]
|
|
2017 |
500248048
|
.
|
15 |
![Intelligence and Security Informatics: Techniques and Applications Intelligence and Security Informatics: Techniques and Applications](Cover.cls?type=cover&isbn=9783540692096&size=100) |
Intelligence and Security Informatics: Techniques and Applications [E-Book]
|
|
2008 |
|
.
|
16 |
![Intelligent Networking, Collaborative Systems and Applications Intelligent Networking, Collaborative Systems and Applications](Cover.cls?type=cover&isbn=9783642167935&size=100) |
Intelligent Networking, Collaborative Systems and Applications [E-Book]
|
Caballé, Santi
|
2011 |
|
.
|
17 |
![International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions](Cover.cls?type=cover&isbn=9783642330186&size=100) |
International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions [E-Book]
|
Herrero, Álvaro
|
2013 |
|
.
|
18 |
![Internet – Technical Development and Applications Internet – Technical Development and Applications](Cover.cls?type=cover&isbn=9783642050190&size=100) |
Internet – Technical Development and Applications [E-Book]
|
Tkacz, Ewaryst
|
2009 |
|
.
|
19 |
![Internet-Security aus Software-Sicht: Ein Leitfaden zur Software-Erstellung für sicherheitskritische Bereiche Internet-Security aus Software-Sicht: Ein Leitfaden zur Software-Erstellung für sicherheitskritische Bereiche](Cover.cls?type=cover&isbn=9783540689065&size=100) |
Internet-Security aus Software-Sicht: Ein Leitfaden zur Software-Erstellung für sicherheitskritische Bereiche [E-Book]
|
|
2008 |
|
.
|
20 |
![Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmustern Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmustern](Cover.cls?type=cover&isbn=9783540482581&size=100) |
Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmustern [E-Book]
|
|
2007 |
|
.
|