LNCS sublibrary, SL 4, Security and cryptology
Resource Information
The series LNCS sublibrary, SL 4, Security and cryptology represents a set of related resources, especially of a specified kind, found in University of Missouri Libraries.
The Resource
LNCS sublibrary, SL 4, Security and cryptology
Resource Information
The series LNCS sublibrary, SL 4, Security and cryptology represents a set of related resources, especially of a specified kind, found in University of Missouri Libraries.
- Label
- LNCS sublibrary, SL 4, Security and cryptology
- Title number
- SL 4
- Title part
- Security and cryptology
378 Items in the Series LNCS sublibrary, SL 4, Security and cryptology
Context
Context of LNCS sublibrary, SL 4, Security and cryptologyMembers
No resources found
No enriched resources found
- Advances in Cryptology-- ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
- Advances in cryptology - ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings
- Advances in cryptology -- EUROCRYPT 2007 : 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007 ; proceedings
- Advances in cryptology -- EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008 : proceedings
- Advances in cryptology -- EUROCRYPT 2012 : 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings
- Advances in cryptology -- EUROCRYPT 2013 : 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013, proceedings
- Advances in cryptology : CRYPTO 2013 : 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013, proceedings, Part I
- Advances in cryptology : CRYPTO 2013 : 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18-22, 2013, proceedings, Part II
- Advances in cryptology : EUROCRYPT 2006 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28-June 1, 2006 : proceedings
- Advances in cryptology, ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008 : proceedings
- Advances in cryptology-- ASIACRYPT 2007 : 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedings
- Advances in cryptology-- ASIACRYPT 2011 : 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011, proceedings
- Advances in cryptology-- ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
- Advances in cryptology-- ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014, Part II
- Advances in cryptology-- ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014, Proceedings, Part I
- Advances in cryptology-- CRYPTO 2011 : 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011 : proceedings
- Advances in cryptology-- CRYPTO 2012 : 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings
- Advances in cryptology-- CRYPTO 2014 : 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I
- Advances in cryptology-- CRYPTO 2014 : 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II
- Advances in cryptology-- EUROCRYPT 2014 : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings
- Advances in cryptology--ASIACRYPT 2010 : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010 : proceedings
- Advances in cryptology--CRYPTO 2010 : 30th annual cryptology conference, Santa Barbara, CA, USA, August 15-19, 2010 : proceedings
- Advances in cryptology--EUROCRYPT 2011 : 30th annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011 : proceedings
- Advances in information and computer security : 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009, proceedings
- Advances in information and computer security : 5th international workshop on security, IWSEC 2010, Kobe, Japan, November 22-24, 2010 : proceedings
- Advances in information and computer security : 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
- Advances in information and computer security : 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
- Advances in information and computer security : Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007 : proceedings
- Advances in information and computer security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008 : proceedings
- Advances in information security and assurance : third international conference and workshops, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings
- Affine density in wavelet analysis
- Applied cryptography and network security : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
- Applied cryptography and network security : 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013 : proceedings
- Applied cryptography and network security : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
- Applied cryptography and network security : 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007 : proceedings
- Applied cryptography and network security : 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 ; proceedings
- Applied cryptography and network security : 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings
- Architecting critical systems : first international symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010
- Automated reasoning for security protocol analysis and issues in the theory of security : Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010 : revised selected papers
- Coding and Cryptology : third international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011 : proceedings
- Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papers
- Communications and multimedia security : 11th IFIP TC 6/TC ; 11 international conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010 ; proceedings
- Communications and multimedia security : 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011 : proceedings
- Communications and multimedia security : 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012, proceedings
- Communications and multimedia security : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings
- Communications and multimedia security : 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 : proceedings
- Computational intelligence in security for information systems : 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011, proceedings
- Computer security - ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013 : proceedings
- Computer security-- ESORICS 2011 : 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011, proceedings
- Computer security-- ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings
- Computer security-- ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
- Computer security-- ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
- Computer security--ESORICS 2006 : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006 : proceedings
- Computer security--ESORICS 2007 : 12th European Symposium on Research in Computer Security, Dresden, Germany, September 24-26, 2007 : proceedings
- Computer security--ESORICS 2010 : 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010 : proceedings
- Constructive side-channel analysis and secure design : 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised selected papers
- Critical Information Infrastructures Security : 8th International Workshop, CRITIS 2013, Amsterdam, the Netherlands, September 16-18, 2013, Revised Selected Papers
- Critical information infrastructure security : 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised selected papers
- Critical information infrastructures security : 4th international workshop, CRITIS 2009, Bonn, Germany, September 30-October 2, 2009 : revised papers
- Critical information infrastructures security : 5th international workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010 : revised papers
- Critical information infrastructures security : 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised selected papers
- Critical information infrastructures security : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers
- Critical information infrastructures security : third international workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 : revised papers
- Critical infrastructure protection : information infrastructure models, analysis, and defense
- Cryptographic hardware and embedded systems - CHES 2010 : 12th international workshop, Santa Barbara, USA, August 17-20,2010 : proceedings
- Cryptographic hardware and embedded systems -- CHES 2014 : 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings
- Cryptographic hardware and embedded systems : CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008 : proceedings
- Cryptographic hardware and embedded systems-- CHES 2012 : 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings
- Cryptographic hardware and embedded systems-- CHES 2013 : 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings
- Cryptographic hardware and embedded systems--CHES 2007 : 9th international workshop, Vienna, Austria, September 10-13, 2007 : proceedings
- Cryptography and coding : 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 : proceedings
- Cryptography and coding : 12th IMA International Conference, cryptography and coding 2009, Cirencester, UK, December 15-17, 2009 : proceedings
- Cryptography and coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011 : proceedings
- Cryptography and coding : 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
- Cryptography and security : from theory to applications ; essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday
- Cryptography and security : from theory to applications ; essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday
- Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings
- Cryptology and network security : 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012, proceedings
- Cryptology and network security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings
- Cryptology and network security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings
- Cryptology and network security : 5th international conference, CANS 2006 Suzhou, China, December 2006 : proceedings
- Cryptology and network security : 6th international conference, CANS 2007, Singapore, December 8-10, 2007 ; proceedings
- Cryptology and network security : 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 : proceedings
- Cryptology and network security : 8th international conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings
- Cryptology and network security : 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010 : proceedings
- Cyberspace safety and security : 4th international symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, proceedings
- Cyberspace safety and security : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings
- Data privacy management and autonomous spontaneous security : 4th international workshop, DPM 2009, and second international workshop, SETOP 2009, St. Malo, France, September 24-25, 2009 : revised selected papers
- Data privacy management and autonomous spontaneous security : 5th international workshop, DPM 2010 and 3rd international workshop, SETOP 2010, Athens, Greece, September 23, 2010 : revised selected papers
- Data privacy management and autonomous spontaneous security : 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised selected papers
- Data privacy management and autonomous spontaneous security : 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised selected papers
- Data privacy management and autonomous spontaneus [sic] security : 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers
- Decision and game theory for security : 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings
- Decision and game theory for security : 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings
- Decision and game theory for security : first international conference, GameSec 2010, Berlin, Germany, November 22-23, 2010 : proceedings
- Decision and game theory for security : second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings
- Detection of intrusions and malware, and vulnerability assessment : 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013, proceedings
- Detection of intrusions and malware, and vulnerability assessment : 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings
- Detection of intrusions and malware, and vulnerability assessment : 4th international conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 : proceedings
- Detection of intrusions and malware, and vulnerability assessment : 6th international conference, DIMVA 2009, Como, Italy, July 9-10, 2009 : proceedings
- Detection of intrusions and malware, and vulnerability assessment : 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings
- Detection of intrusions and malware, and vulnerability assessment : 8th international conference, DIMVA 2011, Amsterdam, the Netherlands, July 7-8, 2011 : proceedings
- Detection of intrusions and malware, and vulnerability assessment : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised selected papers
- Digital forensics and watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31-November 3, 2012, Revised selected papers
- Digital forensics and watermarking : 10th International Workshop, IWDW 2011, Atlantic City, NY, October 23-26, 2011, Revised selected papers
- Digital privacy : PRIME--Privacy and Identity Management for Europe
- Digital watermarking : 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, proceedings
- Digital watermarking : 7th international workshop, IWDW 2008, Busan, Korea, November 10-12, 2008 : selected papers
- Digital watermarking : 8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings
- Digital-forensics and watermarking : 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised selected papers
- E-voting and identify : 4th international conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, proceedings
- E-voting and identity : first international conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007 : revised selected papers
- E-voting and identity : third international conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised selected papers
- Engineering secure future internet services and systems : current research
- Engineering secure software and systems : 4th international symposium, ESSoS 2012, Eindhoven, the Netherlands, February, 16-17, 2012 : proceedings
- Engineering secure software and systems : 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings
- Engineering secure software and systems : 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014 : proceedings
- Engineering secure software and systems : second international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 : proceedings
- Engineering secure software and systems : third International symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011 : proceedings
- Ethics and policy of biometrics : third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010 : revised selected papers
- Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 : revised selected papers
- Fast software encryption : 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised selected papers
- Fast software encryption : 18th international workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011 : revised selected papers
- Fast software encryption : 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised selected papers
- Financial cryptography and data security : 10th international conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006 : revised selected papers
- Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
- Financial cryptography and data security : 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009 : revised selected papers
- Financial cryptography and data security : 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers
- Financial cryptography and data security : 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised selected papers
- Financial cryptography and data security : 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised selected papers
- Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers
- Financial cryptography and data security : FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canaray Islands, Spain, January 25-28, 2010 : revised selected papers
- Financial cryptography and data security : FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28-March 4, 2011 : revised selected papers
- Financial cryptography and data security : FC 2012 workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012 : revised selected papers
- Financial cryptography and data security : FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers
- Financial cryptography and data security : FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014 : revised selected papers
- Formal aspects in security and trust : 6th international workshop, FAST 2009, Eindhoven, the Netherlands, November 5-6, 2009, revised selected papers
- Formal aspects in security and trust : Fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papers
- Formal aspects of security and trust : 7th international workshop, FAST 2010, Pisa, Italy, September 16-17, 2010 : revised selected papers
- Formal aspects of security and trust : 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised selected papers
- Foundations and applications of security analysis : Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009 : revised selected papers
- Foundations and practice of security : 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers
- Foundations and practice of security : 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised selected papers
- Foundations and practice of security : 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers
- Foundations of security analysis and design IV : FOSAD 2006/2007 tutorial lectures
- Foundations of security analysis and design VI : FOSAD tutorial lectures
- Foundations of security analysis and design VII : FOSAD 2012/2013 tutorial lectures
- Identity and privacy in the internet age : 14th Nordic Conference on Secure It Systems, Nordsec 2009, Oslo, Norway, 14-16 October 2009 : proceedings
- Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, revised selected papers
- Information Systems Security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, proceedings
- Information and communications security : 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008 ; proceedings
- Information and communications security : 11th international conference, ICICS 2009, Beijing, China, December 14-17, 2009 : proceedings
- Information and communications security : 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 : proceedings
- Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings
- Information and communications security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
- Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings
- Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings
- Information hiding : 12th international conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010 : revised selected papers
- Information hiding : 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, revised selected papers
- Information hiding : 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised selected papers
- Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papers
- Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings
- Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings
- Information security : 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, proceedings
- Information security : 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings
- Information security : 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings
- Information security : 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings
- Information security and cryptology -- ICISC 2013 : 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised selected papers
- Information security and cryptology : 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009 : revised selected papers
- Information security and cryptology : 7th international conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011 : revised selected papers
- Information security and cryptology : 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012 : revised selected papers
- Information security and cryptology : 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised selected papers
- Information security and cryptology : third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007 : revised selected papers
- Information security and cryptology-- ICISC 2010 : 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers
- Information security and cryptology-- ICISC 2011 : 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised selected papers
- Information security and cryptology--ICISC 2012 : 15th International Conference, Seoul, Korea, November 28-30, 2012 : revised selected papers
- Information security and privacy : 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008 : proceedings
- Information security and privacy : 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009 : proceedings
- Information security and privacy : 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011 : proceedings
- Information security and privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
- Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
- Information security and privacy : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
- Information security applications : 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers
- Information security applications : 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised selected papers
- Information security applications : 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised selected papers
- Information security applications : 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers
- Information security applications : 7th international workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006 : revised selected papers
- Information security applications : 8th international workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007 : revised selected papers
- Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
- Information security practice and experience : 4th international conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008 : proceedings
- Information security practice and experience : 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 : proceedings
- Information security practice and experience : 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings
- Information security practice and experience : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings
- Information security technology for applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29 2010 : revised selected papers
- Information security technology for applications : 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised selected papers
- Information security theory and practice : securing the internet of things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30-July 2, 2014 : proceedings
- Information security theory and practice : security and privacy of mobile devices in wireless communication : 5th IFIP WG 11.2 international workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011 : proceedings
- Information security theory and practice : security of mobile and cyber-physical systems : 7th IFIP WG 11.2 international workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013 : proceedings
- Information security theory and practice : security, privacy and trust in computing systems and ambient intelligent ecosystems ; 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
- Information security theory and practices : security and privacy of pervasive systems and smart devices : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010 : proceedings
- Information security theory and practices : smart devices, convergence and next generation networks : second IFIP WG 11.2 international workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 : proceedings
- Information security, practice and experience : 6th international conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010 : proceedings
- Information systems security : 10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, proceedings
- Information systems security : 5th international conference, ICISS 2009, Kolkata, India, December 14-18, 2009 ; proceedings
- Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 : proceedings
- Information systems security : 9th international conference, ICISS 2013, Kolkata, India, December 16-20, 2013, proceedings
- Information systems security : third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings
- Information systems security : third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings
- Information theoretic security : 4th international conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009 : revised selected papers
- Information theoretic security : 5th international conference, ICITS 2011, Amsterdam, the Netherlands, May 21-24, 2011, Proceedings
- Information theoretic security : 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
- Information theoretic security : 7th international conference, ICITS 2013, Singapore, November 28-30, 2013, proceedings
- Information theoretic security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008 : proceedings
- Information theoretic security : second international conference, ICITS 2007, Madrid, Spain, May 25-29, 2007 : revised selected papers
- Information, Security and Cryptology--ICISC 2009 : 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers
- Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013, proceedings
- Intelligence and security informatics : Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings
- Intelligence and security informatics : Pacific Asia workshop, PAISI 2011, Beijing, China, July 9, 2011 : proceedings
- Intelligence and security informatics : Pacific asia workshop, paisi 2014, tainan, taiwan, may 13, 2014, proceedings
- Intelligence and security informatics : first European conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008, proceedings
- Lightweight Cryptography for Security and Privacy : Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013 : revised selected papers
- Network and system security : 6th international conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings
- Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
- Network and system security : 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings
- New stream cipher designs : the eSTREAM finalists
- Open problems in network security : IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised selected papers
- Pairing-based cryptography - Pairing 2008 : second international conference, Egham, UK, September 1-3, 2008 ; proceedings
- Pairing-based cryptography - Pairing 2009 : Third International Conference, Palo Alto, CA, USA, August 12-14, 2009 : proceedings
- Pairing-based cryptography-- : Pairing 2007 : first international conference, Tokyo, Japan, July 2-4, 2007 : proceedings
- Pairing-based cryptography-- Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised selected papers
- Pairing-based cryptography-- Pairing 2013 : 6th International Conference, Beijing, China, November 22-24, 2013, Revised selected papers
- Pairing-based cryptography--Pairing 2010 : 4th international conference, Yamanaka Hot Spring, Japan, December 13-15, 2010 : proceedings
- Post-quantum cryptography : 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings
- Post-quantum cryptography : 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014 : proceedings
- Post-quantum cryptography : second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings
- Post-quantum cryptography : third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 ; proceedings
- Principles of security and trust : 7th International Conference, POST 2018, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
- Principles of security and trust : Third International Conference, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, proceedings
- Principles of security and trust : first international conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings
- Principles of security and trust : second International Conference, POST 2013, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings
- Privacy enhancing technologies : 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings
- Privacy enhancing technologies : 11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011 : proceedings
- Privacy enhancing technologies : 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings
- Privacy enhancing technologies : 13th international symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, proceedings
- Privacy enhancing technologies : 14th International Symposium, PETS 2014, Amsterdam, the Netherlands, July 16-18, 2014. Proceedings
- Privacy enhancing technologies : 7th international symposium, PET 2007, Ottawa, Canada, June 20-22, 2007 : revised selected papers
- Privacy enhancing technologies : 8th international symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008 : proceedings
- Privacy enhancing technologies : 9th international symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009 : proceedings
- Privacy technologies and policy : first Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised selected papers
- Privacy technologies and policy : second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, proceedings
- Privacy, security, and trust in KDD : first ACM SIGKDD international workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007 : revised selected papers
- Privacy, security, and trust in KDD : second ACM SIGKDD international workshop, PinKDD 2008, Las Vegas, NV, USA, August 24-27, 2008 : revised selected papers
- Progress in Cryptology -- INDOCRYPT 2014 : 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings
- Progress in Cryptology-- INDOCRYPT 2013 : 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings
- Progress in cryptology - AFRICACRYPT 2014 : 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014 : proceedings
- Progress in cryptology - Africacrypt 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings
- Progress in cryptology - INDOCRYPT 2011 : 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011 : proceedings
- Progress in cryptology -- AFRICACRYPT 2012 : 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings
- Progress in cryptology -- AFRICACRYPT 2013 : 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013, proceedings
- Progress in cryptology : INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007 : proceedings
- Progress in cryptology : INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008 : proceedings
- Progress in cryptology : INDOCRYPT 2009 : 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009 : proceedings
- Progress in cryptology-- INDOCRYPT 2012 : 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings
- Progress in cryptology-- LATINCRYPT 2012 : 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings
- Progress in cryptology--AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008 : proceedings
- Progress in cryptology--AFRICACRYPT 2009 : second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 : proceedings
- Progress in cryptology--AFRICACRYPT 2011 : 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011 : proceedings
- Progress in cryptology--INDOCRYPT 2010 : 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010 : proceedings
- Progress in cryptology--LATINCRYPT 2010 : first International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010 : proceedings
- Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings
- Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
- Provable security : 5th international conference, ProvSec 2011, Xi'an, China, October 16-18, 2011 : proceedings
- Provable security : 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings
- Provable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
- Provable security : first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings
- Provable security : third international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings
- Public key cryptography : PKC 2008 : 11th International Workshop on Practice and Theory in Public Key Cryptography, Barcelona, Spain, March 9-12, 2008 : proceedings
- Public key cryptography, PKC 2009 : 12th international conference on practice and theory in public-key cryptography Irvine, CA, USA, March 18-20, 2009 proceedings
- Public key cryptography-- PKC 2012 : 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings
- Public key cryptography--PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings
- Public key cryptography--PKC 2011 : 14th International Conference on Practice and Theory of Public Key Cryptography, Taormina, Italy, March 6-9, 2011 : proceedings
- Public key infrastructure : 5th European PKI workshop : theory and practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008 : proceedings
- Public key infrastructures : 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, revised selected papers
- Public key infrastructures, services and applications : 6th European workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009 : revised selected papers
- Public key infrastructures, services and applications : 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010, revised selected papers
- Public key infrastructures, services and applications : 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers
- Public key infrastructures, services and applications : 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised selected papers
- Public-key cryptography-- PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26-March 1, 2013. Proceedings
- Public-key cryptography-- PKC 2014 : 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014 : proceedings
- Radio frequency identification : Security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, the Netherlands, July 2-3, 2012, Revised selected papers
- Radio frequency identification : security and privacy Issues : 6th international workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010 : revised selected papers
- Radio frequency identification : security and privacy issues : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014 : revised selected papers
- Recent advances in intrusion detection : 10th international symposium, RAID 2007, Gold Goast [i.e. Coast], Australia, September 5-7, 2007 : proceedings
- Recent advances in intrusion detection : 11th international symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008 : proceedings
- Recent advances in intrusion detection : 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 : proceedings
- Recent advances in intrusion detection : 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, proceedings
- Recent advances in intrusion detection : 14th international symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011 : proceedings
- Recent advances in intrusion detection : 9th international symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006 : proceedings
- Research in Attacks, Intrusions, and Defenses : 15th International Symposium, RAID 2012, Amsterdam, the Netherlands, September 12-14, 2012. Proceedings
- Research in attacks, intrusions and defenses : 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, proceedings
- Research in attacks, intrusions and defenses : 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings
- Research in cryptology : 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers
- Secure IT systems : 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31-November 2, 2012 : proceedings
- Secure IT systems : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings
- Secure IT systems : 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings
- Secure and trustworthy service composition : the Aniketos approach
- Security and cryptography for networks : 7th international conference, SCN 2010, Amalfi, Italy, September 13-15, 2010 : proceedings
- Security and cryptography for networks : 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings
- Security and cryptography for networks : 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings
- Security and trust management : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings
- Security and trust management : 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised selected papers
- Security and trust management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012 : revised selected papers
- Security and trust management : 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings
- Security aspects in information technology : first international conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011 : proceedings
- Security protocols : 12th international workshop, Cambridge, UK, April 26-28, 2004 : revised selected papers
- Security protocols : 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
- Security protocols : 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
- Security protocols : 15th international workshop, Brno, Czech Republic, April 18-20, 2007 : revised selected papers
- Security protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers
- Security protocols XVI : 16th international workshop, Cambridge, UK, April 16-18, 2008 : revised selected papers
- Security protocols XVII : 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised selected papers
- Security protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
- Security protocols XX : 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised selected papers
- Security protocols XXI : 21st international workshop, Cambridge, UK, March 19-20, 2013, revised selected papers
- Security protocols XXII : 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised selected papers
- Security standardisation research : first International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings
- Security, privacy, and applied cryptography engineering : 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings
- Security, privacy, and applied cryptography engineering : second international conference, SPACE 2012, Chennai, India, November 3-4, 2012 : proceedings
- Security, privacy, and applied cryptography engineering : third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings
- Selected areas in cryptography - SAC 2013 : 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers
- Selected areas in cryptography -- SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 14-15, 2014 : revised selected papers
- Selected areas in cryptography : 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 : revised selected papers
- Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
- Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
- Selected areas in cryptography : 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15 : revised selected papers
- Selected areas in cryptography : 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, revised selected papers
- Selected areas in cryptography : 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010 : revised selected papers
- Selected areas in cryptography : 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised selected papers
- Selected areas in cryptography : 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised selected papers
- Sequences, subsequences, and consequences : international workshop, SSC 2007, Los Angeles, CA, USA, May 31-June 2, 2007 : revised invited papers
- Smart card research and advanced application : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proceedings
- Smart card research and advanced applications : 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011 : revised selected papers
- Smart card research and advanced applications : 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised selected papers
- Smart card research and advanced applications : 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013 : revised selected papers
- Smart grid security : first International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012 : revised selected papers
- Theory of Cryptography : 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009 : proceedings
- Theory of cryptography : 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings
- Theory of cryptography : 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings
- Theory of cryptography : 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings
- Theory of cryptography : 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011 : proceedings
- Theory of cryptography : 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings
- Theory of cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008 : proceedings
- Theory of security and applications : joint workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011 : revised selected papers
- Topics in cryptology - CT-RSA 2010 : the Cryptographers' track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings
- Topics in cryptology -- CT-RSA 2014 : the Cryptographers' track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014 : proceedings
- Topics in cryptology : CT-RSA 2008, the Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008 : proceedings
- Topics in cryptology-- CT-RSA 2011 : the cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14-18, 2011 : proceedings
- Topics in cryptology-- CT-RSA 2012 : the Cryptographers' track at the RSA Conference 2012, San Francisco, CA, USA, February 27-March 2, 2012. Proceedings
- Topics in cryptology-- CT-RSA 2013 : the Cryptographers' track at the RSA Conference 2013, San Francisco, CA, USA, February 25-March 1, 2013. Proceedings
- Towards trustworthy elections : new directions in electronic voting
- Transactions on data hiding and multimedia security III
- Trust and trustworthy computing : 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011 : proceedings
- Trust and trustworthy computing : 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings
- Trust and trustworthy computing : 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings
- Trust and trustworthy computing : 7th International Conference, Trust 2014, Heraklion, Crete, Greece, June 30-July 2, 2014 : proceedings
- Trust and trustworthy computing : Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings
- Trust, privacy and security in digital business : 4th international conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 : proceedings
- Trust, privacy and security in digital business : 7th international conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, proceedings
- Trust, privacy and security in digital business : 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011, proceedings
- Trust, privacy and security in digital business : 9th international conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012, Proceedings
- Trust, privacy, and security in digital business : 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013 : proceedings
- Trust, privacy, and security in digital business : 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings
- Trusted computing, challenges and applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008 : Proceedings
- Trusted systems : 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013 : proceedings
- Trusted systems : first international conference, INTRUST 2009, Beijing, China, December 17-19, 2009 : revised selected papers
- Trusted systems : second international conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised selected papers
- Trusted systems : third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised selected papers
- Visualization for computer security : 5th international workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008 : proceedings
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/Z56Lm3DjRyY/" typeof="Series http://bibfra.me/vocab/lite/Series"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/Z56Lm3DjRyY/">LNCS sublibrary, SL 4, Security and cryptology</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Series LNCS sublibrary, SL 4, Security and cryptology
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/Z56Lm3DjRyY/" typeof="Series http://bibfra.me/vocab/lite/Series"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/Z56Lm3DjRyY/">LNCS sublibrary, SL 4, Security and cryptology</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>