Call Number (LC) Title Results
QA76.9.A25 I574 2005eb Security protocols 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers /
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers /
2
QA76.9.A25 I574 2011eb Security protocols XIX 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers / 1
QA76.9.A25 I574 2013 Security protocols XXI 21st international workshop, Cambridge, UK, March 19-20, 2013, revised selected papers / 1
QA76.9.A25 I574 2014 Security protocols XXII : 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised selected papers / 1
QA76.9.A25 I575 2005 Public key cryptography PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / 1
QA76.9.A25 I58 2008 Intrusion detection systems / 1
QA76.9.A25 I58 2008eb Advances in information and computer security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008 : proceedings /
Intrusion detection systems
Advances in cryptology, ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008 : proceedings /
3
QA76.9.A25 .I58 2009 Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised selected papers / 1
QA76.9.A25 I58 2009 Trusted computing Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings /
Progress in cryptology--AFRICACRYPT 2009 second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 : proceedings /
2
QA76.9.A25 I58 2010 Trusted systems first international conference, INTRUST 2009, Beijing, China, December 17-19, 2009 : revised selected papers /
Computer network security 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings /
Information security and assurance 4th international conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings /
Advances in information and computer security 5th international workshop on security, IWSEC 2010, Kobe, Japan, November 22-24, 2010 : proceedings /
Cryptology and network security 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010 : proceedings /
Computational intelligence in security for information systems 2010 proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS 2010) /
Progress in cryptology--LATINCRYPT 2010 first International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010 : proceedings /
7
QA76.9.A25 .I58 2011 Global security, safety, and sustainability & e-Democracy 7th International and 4th e-Democracy Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised selected papers /
Advances in cryptology-- ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011, proceedings /
2
QA76.9.A25 I58 2011 Cryptology and network security 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings /
Progress in cryptology - INDOCRYPT 2011 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011 : proceedings /
Information security and assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings /
Advances in information and computer security 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011 : proceedings /
Trusted systems second international conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised selected papers /
Security aspects in information technology first international conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011 : proceedings /
Information and communications security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings /
Public key cryptography--PKC 2011 14th International Conference on Practice and Theory of Public Key Cryptography, Taormina, Italy, March 6-9, 2011 : proceedings /
Computational intelligence in security for information systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011, proceedings /
Trusted systems third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised selected papers /
10
QA76.9.A25 I58 2011eb Security protocols XVI 16th international workshop, Cambridge, UK, April 16-18, 2008 : revised selected papers / 1
QA76.9.A25 .I58 2012 Multidisciplinary research and practice for information systems IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings /
Security protocols XX : 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised selected papers /
Progress in cryptology -- AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings /
3
QA76.9.A25 I58 2012 Proceedings of the International Conference on IT Convergence and Security 2011
Advances in information and computer security : 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings /
Progress in cryptology-- INDOCRYPT 2012 : 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings /
Trusted systems 4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
Computer safety, reliability, and security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings /
Introduction to hardware security and trust
Progress in cryptology-- LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings /
Pairing-based cryptography-- Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised selected papers /
Security, privacy, and applied cryptography engineering second international conference, SPACE 2012, Chennai, India, November 3-4, 2012 : proceedings /
Financial cryptography and data security FC 2012 workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012 : revised selected papers /
Public key cryptography-- PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings /
11
QA76.9.A25 .I58 2013 Availability, reliability, and security in information systems and HCI : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013 : proceedings / 1
QA76.9.A25 I58 2013 Security, privacy, and applied cryptography engineering : third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings /
Intelligent systems for security informatics /
Pairing-based cryptography-- Pairing 2013 : 6th International Conference, Beijing, China, November 22-24, 2013, Revised selected papers /
Intelligent systems for security informatics
Public-key cryptography-- PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26-March 1, 2013. Proceedings /
Progress in cryptology -- AFRICACRYPT 2013 : 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013, proceedings /
7
QA76.9.A25 I58 2013eb Human aspects of information security, privacy, and trust : first International Conference, HAS 2013, held as part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings / 1
QA76.9.A25 I58 2014 Information systems security : 10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, proceedings / 1
QA76.9.A25 I58 2014eb Trusted systems : sixth International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised selected papers / 1