Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 I574 2005eb |
Security protocols 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers / Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers / |
2 |
QA76.9.A25 I574 2011eb | Security protocols XIX 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers / | 1 |
QA76.9.A25 I574 2013 | Security protocols XXI 21st international workshop, Cambridge, UK, March 19-20, 2013, revised selected papers / | 1 |
QA76.9.A25 I574 2014 | Security protocols XXII : 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised selected papers / | 1 |
QA76.9.A25 I575 2005 | Public key cryptography PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / | 1 |
QA76.9.A25 I58 2008 | Intrusion detection systems / | 1 |
QA76.9.A25 I58 2008eb |
Advances in information and computer security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008 : proceedings / Intrusion detection systems Advances in cryptology, ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008 : proceedings / |
3 |
QA76.9.A25 .I58 2009 | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised selected papers / | 1 |
QA76.9.A25 I58 2009 |
Trusted computing Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings / Progress in cryptology--AFRICACRYPT 2009 second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 : proceedings / |
2 |
QA76.9.A25 I58 2010 |
Trusted systems first international conference, INTRUST 2009, Beijing, China, December 17-19, 2009 : revised selected papers / Computer network security 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings / Information security and assurance 4th international conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings / Advances in information and computer security 5th international workshop on security, IWSEC 2010, Kobe, Japan, November 22-24, 2010 : proceedings / Cryptology and network security 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010 : proceedings / Computational intelligence in security for information systems 2010 proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS 2010) / Progress in cryptology--LATINCRYPT 2010 first International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010 : proceedings / |
7 |
QA76.9.A25 .I58 2011 |
Global security, safety, and sustainability & e-Democracy 7th International and 4th e-Democracy Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised selected papers / Advances in cryptology-- ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011, proceedings / |
2 |
QA76.9.A25 I58 2011 |
Cryptology and network security 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings / Progress in cryptology - INDOCRYPT 2011 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011 : proceedings / Information security and assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings / Advances in information and computer security 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011 : proceedings / Trusted systems second international conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised selected papers / Security aspects in information technology first international conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011 : proceedings / Information and communications security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings / Public key cryptography--PKC 2011 14th International Conference on Practice and Theory of Public Key Cryptography, Taormina, Italy, March 6-9, 2011 : proceedings / Computational intelligence in security for information systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011, proceedings / Trusted systems third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised selected papers / |
10 |
QA76.9.A25 I58 2011eb | Security protocols XVI 16th international workshop, Cambridge, UK, April 16-18, 2008 : revised selected papers / | 1 |
QA76.9.A25 .I58 2012 |
Multidisciplinary research and practice for information systems IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings / Security protocols XX : 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised selected papers / Progress in cryptology -- AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings / |
3 |
QA76.9.A25 I58 2012 |
Proceedings of the International Conference on IT Convergence and Security 2011 Advances in information and computer security : 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings / Progress in cryptology-- INDOCRYPT 2012 : 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings / Trusted systems 4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings / Computer safety, reliability, and security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings / Introduction to hardware security and trust Progress in cryptology-- LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings / Pairing-based cryptography-- Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised selected papers / Security, privacy, and applied cryptography engineering second international conference, SPACE 2012, Chennai, India, November 3-4, 2012 : proceedings / Financial cryptography and data security FC 2012 workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012 : revised selected papers / Public key cryptography-- PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings / |
11 |
QA76.9.A25 .I58 2013 | Availability, reliability, and security in information systems and HCI : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013 : proceedings / | 1 |
QA76.9.A25 I58 2013 |
Security, privacy, and applied cryptography engineering : third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings / Intelligent systems for security informatics / Pairing-based cryptography-- Pairing 2013 : 6th International Conference, Beijing, China, November 22-24, 2013, Revised selected papers / Intelligent systems for security informatics Public-key cryptography-- PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26-March 1, 2013. Proceedings / Progress in cryptology -- AFRICACRYPT 2013 : 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013, proceedings / |
7 |
QA76.9.A25 I58 2013eb | Human aspects of information security, privacy, and trust : first International Conference, HAS 2013, held as part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings / | 1 |
QA76.9.A25 I58 2014 | Information systems security : 10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, proceedings / | 1 |
QA76.9.A25 I58 2014eb | Trusted systems : sixth International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised selected papers / | 1 |