Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 I58 2022 |
Cryptology and network security : 21st international conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022 : proceedings / Cryptography, codes and cyber security : First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, proceedings / Cyber security intelligence and analytics : the 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022). |
3 |
QA76.9.A25 I58 2022eb |
Advanced computing and systems for security. Progress in cryptology -- INDOCRYPT 2022 : 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings / |
2 |
QA76.9.A25 I58 2023 |
Public-key cryptography -- PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings. Ubiquitous security : third international conference, UbiSec 2023, Exeter, UK, November 1-3, 2023 : revised selected papers / Cyber security and digital forensics : select proceedings of the international conference, ReDCySec 2023 / |
4 |
QA76.9.A25 I58 2023eb |
Progress in cryptology -- INDOCRYPT 2023 : 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings. Cryptology and network security : 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings / Cyber Intelligence and Information Retrieval : proceedings of CIIR 2023. Network and system security : 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings / Cyber security intelligence and analytics : The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023). Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023 / |
8 |
Your match would be here. | ||
QA76.9.A25 I584 2009 |
Security protocols 14th international workshop, Cambridge, March 27-29 2006, revised selected papers / Advances in cryptology - ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings / Advances in information and computer security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009, proceedings / Information and communications security 11th international conference, ICICS 2009, Beijing, China, December 14-17, 2009 : proceedings / Advances in cryptology proceedings, CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009 / Cryptology and network security 8th international conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings / |
6 |
QA76.9.A25 I584 2010 | Information security and digital forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, revised selected papers / | 1 |
QA76.9.A25 I585 2002eb | An introduction to security in a CSM 1.3 for AIX 5L environment / | 2 |
QA76.9.A25 I595 2013 | Trusted systems : 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013 : proceedings / | 1 |
QA76.9.A25 I63 2021 | Information security and optimization / | 1 |
QA76.9.A25 I64 2008eb | ||
QA76.9.A25 .I73 2019eb | Information security : 22nd international conference, ISC 2019, New York City, NY, USA, September 16-18, 2019 : proceedings / | 1 |
QA76.9.A25 I73 2021 | Information security : 24th international conference, ISC 2021, virtual event, November 10-12, 2021 : proceedings / | 1 |
QA76.9.A25 I82 2015eb | Trustworthy computing and services : International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised selected papers / | 1 |
QA76.9.A25 I83 2011 |
Information security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010 : revised selected papers / Information security 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, proceedings / |
2 |
QA76.9.A25 I83 2012 |
Trustworthy computing and services International Conference, ISCTCS 2012, Beijing, China, May 28-June 2, 2012, Revised selected papers / Information security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings / |
2 |
QA76.9.A25 .I83 2013 | Transforming Cybersecurity / | 1 |
QA76.9.A25 I85 2001 | Information security : 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001 : proceedings / | 1 |
QA76.9.A25 I85 2002 | Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings / | 1 |
QA76.9.A25 I85 2005eb | Information security 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings / | 1 |
QA76.9.A25 I85 2006 | Information security 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings / | 1 |