|
1. |
Security and Cryptography for Networks : 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings / edited by Vassilis Zikas, Roberto De Prisco. - Cham: Springer, 2016. - Online-Ressource (XIX, 606 p. 75 illus, online resource), ISBN 978-3-319-44618-9 (Lecture Notes in Computer Science ; 9841) (Springer eBook Collection : Computer Science) (SpringerLink : Bücher) (Security and Cryptology ; 9841) DOI: 10.1007/978-3-319-44618-9
Online-Ressource
|
|
|
2. |
Provable Security : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings / edited by Liqun Chen, Jinguang Han. - Cham: Springer, 2016. - Online-Ressource (XIII, 394 p. 34 illus, online resource), ISBN 978-3-319-47422-9 (Lecture Notes in Computer Science ; 10005) (Security and Cryptology ; 10005) (Springer eBook Collection : Computer Science) (SpringerLink : Bücher) DOI: 10.1007/978-3-319-47422-9
Online-Ressource
|
|
|
3. |
Cryptology and Network Security : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings / edited by Sara Foresti, Giuseppe Persiano. - Cham: Springer, 2016. - Online-Ressource (XVI, 762 p. 116 illus, online resource), ISBN 978-3-319-48965-0 (Lecture Notes in Computer Science ; 10052) (Security and Cryptology ; 10052) (SpringerLink : Bücher) (Springer eBook Collection : Computer Science) DOI: 10.1007/978-3-319-48965-0
Online-Ressource
|
|
|
4. |
Advances in Cryptology – ASIACRYPT 2016 : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II / edited by Jung Hee Cheon, Tsuyoshi Takagi. - Berlin, Heidelberg: Springer, 2016. - Online-Ressource (XXIV, 1055 p. 198 illus, online resource), ISBN 978-3-662-53890-6 (Lecture Notes in Computer Science ; 10032) (Springer eBook Collection : Computer Science) (SpringerLink : Bücher) (Security and Cryptology ; 10032) DOI: 10.1007/978-3-662-53890-6
Online-Ressource
|
|
|
5. |
Advances in Cryptology – ASIACRYPT 2016 : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I / edited by Jung Hee Cheon, Tsuyoshi Takagi. - Berlin, Heidelberg: Springer, 2016. - Online-Ressource (XXIV, 941 p. 217 illus, online resource), ISBN 978-3-662-53887-6 (Lecture Notes in Computer Science ; 10031) (SpringerLink : Bücher) (Springer eBook Collection : Computer Science) (Security and Cryptology ; 10031) DOI: 10.1007/978-3-662-53887-6
Online-Ressource
|
|
|
6. |
Information Security Applications : 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers / edited by Ho-won Kim, Dooho Choi. - 1st ed. 2016. - Cham: Springer, 2016. - Online-Ressource (XVI, 438 p. 127 illus, online resource), ISBN 978-3-319-31875-2 (Lecture Notes in Computer Science ; 9503) (Springer eBook Collection : Computer Science) (SpringerLink : Bücher) (Security and Cryptology ; 9503) DOI: 10.1007/978-3-319-31875-2
Online-Ressource
|
|
|
7. |
Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II / edited by Joseph K. Liu, Ron Steinfeld. - Cham: Springer, 2016. - Online-Ressource (XVIII, 517 p. 46 illus, online resource), ISBN 978-3-319-40367-0 (Lecture Notes in Computer Science ; 9723) (SpringerLink : Bücher) (Springer eBook Collection : Computer Science) (Security and Cryptology ; 9723) DOI: 10.1007/978-3-319-40367-0
Online-Ressource
|
|
|
8. |
Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I / edited by Joseph K. Liu, Ron Steinfeld. - Cham: Springer, 2016. - Online-Ressource (XVIII, 543 p. 114 illus, online resource), ISBN 978-3-319-40253-6 (Lecture Notes in Computer Science ; 9722) (Security and Cryptology ; 9722) (Springer eBook Collection : Computer Science) (SpringerLink : Bücher) DOI: 10.1007/978-3-319-40253-6
Online-Ressource
|
|
|
9. |
Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / edited by Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang. - Cham: Springer, 2016. - Online-Ressource (XII, 380 p. 82 illus, online resource), ISBN 978-3-319-49151-6 (Lecture Notes in Computer Science ; 10060) (Springer eBook Collection : Computer Science) (SpringerLink : Bücher) (Security and Cryptology ; 10060) DOI: 10.1007/978-3-319-49151-6
Online-Ressource
|
|
|
10. |
Research in Attacks, Intrusions, and Defenses : 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings / edited by Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro. - Cham: Springer, 2016. - Online-Ressource (XIII, 482 p. 126 illus, online resource), ISBN 978-3-319-45719-2 (Lecture Notes in Computer Science ; 9854) (Security and Cryptology ; 9854) (Springer eBook Collection : Computer Science) (SpringerLink : Bücher) DOI: 10.1007/978-3-319-45719-2
Online-Ressource
|
|
|
11. |
Detection of Intrusions and Malware, and Vulnerability Assessment : 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings / edited by Juan Caballero, Urko Zurutuza, Ricardo J. Rodríguez. - Cham: Springer, 2016. - Online-Ressource (XIV, 442 p. 103 illus, online resource), ISBN 978-3-319-40667-1 (Lecture Notes in Computer Science ; 9721) (Security and Cryptology ; 9721) (SpringerLink : Bücher) (Springer eBook Collection : Computer Science) DOI: 10.1007/978-3-319-40667-1
Online-Ressource
|
|
|
12. |
Information Security Theory and Practice : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings / edited by Sara Foresti, Javier Lopez. - Cham: Springer, 2016. - Online-Ressource (X, 271 p. 59 illus, online resource), ISBN 978-3-319-45931-8 (Lecture Notes in Computer Science ; 9895) (SpringerLink : Bücher) (Springer eBook Collection : Computer Science) (Security and Cryptology ; 9895) DOI: 10.1007/978-3-319-45931-8
Online-Ressource
|
|
|
13. |
Post-Quantum Cryptography : 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings / edited by Tsuyoshi Takagi. - 1st ed. 2016. - Cham: Springer, 2016. - Online-Ressource (X, 267 p. 39 illus. in color, online resource), ISBN 978-3-319-29360-8 (Lecture Notes in Computer Science ; 9606) (SpringerLink : Bücher) (Springer eBook Collection : Computer Science) (Security and Cryptology ; 9606) DOI: 10.1007/978-3-319-29360-8
Online-Ressource
|
|
|
14. |
Fast Software Encryption : 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers / edited by Thomas Peyrin. - Berlin, Heidelberg: Springer, 2016. - Online-Ressource (XI, 592 p. 105 illus, online resource), ISBN 978-3-662-52993-5 (Lecture Notes in Computer Science ; 9783) (SpringerLink : Bücher) (Springer eBook Collection : Computer Science) (Security and Cryptology ; 9783) DOI: 10.1007/978-3-662-52993-5
Online-Ressource
|
|
|
15. |
The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday / edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater. - 1st ed. 2016. - Berlin, Heidelberg: Springer, 2016. - Online-Ressource (XIV, 551 p. 135 illus, online resource), ISBN 978-3-662-49301-4 (Lecture Notes in Computer Science ; 9100) (Security and Cryptology ; 9100) (Springer eBook Collection : Computer Science) (SpringerLink : Bücher) DOI: 10.1007/978-3-662-49301-4
Online-Ressource
|
|
|
16. |
Advances in Information and Computer Security : 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings / edited by Kazuto Ogawa, Katsunari Yoshioka. - Cham: Springer, 2016. - Online-Ressource (XII, 335 p. 64 illus, online resource), ISBN 978-3-319-44524-3 (Lecture Notes in Computer Science ; 9836) (Security and Cryptology ; 9836) (SpringerLink : Bücher) (Springer eBook Collection : Computer Science) DOI: 10.1007/978-3-319-44524-3
Online-Ressource
|
|
|
17. |
Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II / edited by Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows. - Cham: Springer, 2016. - Online-Ressource (XIX, 609 p. 117 illus, online resource), ISBN 978-3-319-45741-3 (Lecture Notes in Computer Science ; 9879) (Security and Cryptology ; 9879) (Springer eBook Collection : Computer Science) (SpringerLink : Bücher) DOI: 10.1007/978-3-319-45741-3
Online-Ressource
|
|
|
18. |
Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I / edited by Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows. - Cham: Springer, 2016. - Online-Ressource (XIX, 623 p. 153 illus, online resource), ISBN 978-3-319-45744-4 (Lecture Notes in Computer Science ; 9878) (Springer eBook Collection : Computer Science) (SpringerLink : Bücher) (Security and Cryptology ; 9878) DOI: 10.1007/978-3-319-45744-4
Online-Ressource
|
|
|
19. |
Information and Communications Security : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings / edited by Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing. - Cham: Springer, 2016. - Online-Ressource (XII, 478 p. 83 illus, online resource), ISBN 978-3-319-50011-9 (Lecture Notes in Computer Science ; 9977) (SpringerLink : Bücher) (Springer eBook Collection : Computer Science) (Security and Cryptology ; 9977) DOI: 10.1007/978-3-319-50011-9
Online-Ressource
|
|
|
20. |
Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers / edited by Anderson C.A. Nascimento, Paulo Barreto. - Cham: Springer, 2016. - Online-Ressource (VIII, 301 p. 28 illus, online resource), ISBN 978-3-319-49175-2 (Lecture Notes in Computer Science ; 10015) (SpringerLink : Bücher) (Springer eBook Collection : Computer Science) (Security and Cryptology ; 10015) DOI: 10.1007/978-3-319-49175-2
Online-Ressource
|
|
|
|