Call Number (LC) Title Results
QA76.9.A25 I58 2022 Cryptology and network security : 21st international conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022 : proceedings /
Cryptography, codes and cyber security : First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, proceedings /
Cyber security intelligence and analytics : the 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022).
3
QA76.9.A25 I58 2022eb Advanced computing and systems for security.
Progress in cryptology -- INDOCRYPT 2022 : 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings /
2
QA76.9.A25 I58 2023 Public-key cryptography -- PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings.
Ubiquitous security : third international conference, UbiSec 2023, Exeter, UK, November 1-3, 2023 : revised selected papers /
Cyber security and digital forensics : select proceedings of the international conference, ReDCySec 2023 /
4
QA76.9.A25 I58 2023eb Progress in cryptology -- INDOCRYPT 2023 : 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings.
Cryptology and network security : 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings /
Cyber Intelligence and Information Retrieval : proceedings of CIIR 2023.
Network and system security : 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings /
Cyber security intelligence and analytics : The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023).
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023 /
8
Your match would be here.
QA76.9.A25 I584 2009 Security protocols 14th international workshop, Cambridge, March 27-29 2006, revised selected papers /
Advances in cryptology - ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings /
Advances in information and computer security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009, proceedings /
Information and communications security 11th international conference, ICICS 2009, Beijing, China, December 14-17, 2009 : proceedings /
Advances in cryptology proceedings, CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009 /
Cryptology and network security 8th international conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings /
6
QA76.9.A25 I584 2010 Information security and digital forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, revised selected papers / 1
QA76.9.A25 I585 2002eb An introduction to security in a CSM 1.3 for AIX 5L environment / 2
QA76.9.A25 I595 2013 Trusted systems : 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013 : proceedings / 1
QA76.9.A25 I63 2021 Information security and optimization / 1
QA76.9.A25 I64 2008eb  
QA76.9.A25 .I73 2019eb Information security : 22nd international conference, ISC 2019, New York City, NY, USA, September 16-18, 2019 : proceedings / 1
QA76.9.A25 I73 2021 Information security : 24th international conference, ISC 2021, virtual event, November 10-12, 2021 : proceedings / 1
QA76.9.A25 I82 2015eb Trustworthy computing and services : International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised selected papers / 1
QA76.9.A25 I83 2011 Information security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010 : revised selected papers /
Information security 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, proceedings /
2
QA76.9.A25 I83 2012 Trustworthy computing and services International Conference, ISCTCS 2012, Beijing, China, May 28-June 2, 2012, Revised selected papers /
Information security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings /
2
QA76.9.A25 .I83 2013 Transforming Cybersecurity / 1
QA76.9.A25 I85 2001 Information security : 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001 : proceedings / 1
QA76.9.A25 I85 2002 Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings / 1
QA76.9.A25 I85 2005eb Information security 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings / 1
QA76.9.A25 I85 2006 Information security 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings / 1