Shelfclass |
Sortkey |
Title |
3.N |
ACISP |
ACISP 1996: Information Security and Privacy: 1st Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996: proceedings |
3.N |
ACISP |
ACISP 1997: Information Security and Privacy: 2nd Australasian Conference, ACISP '97, Sydney, NSW, Australia, June 7-9, 1997: proceedings |
3.N |
ACISP |
ACISP 1998: Information Security and Privacy: 3rd Australasian Conference, ACISP '98, Brisbane, Australia, July 13-15, 1998: proceedings |
3.N |
ACISP |
ACISP 1999: Information Security and Privacy: 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999: proceedings |
3.N |
ACISP |
ACISP 2000: Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000: proceedings |
3.N |
ACISP |
ACISP 2001: Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001: proceedings |
3.N |
ACISP |
ACISP 2002: Information Security and Privacy: 7th Australasian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002: proceedings |
3.N |
ACISP |
ACISP 2003: Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003: proceedings |
3.N |
ACISP |
ACISP 2004: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004: proceedings |
3.N |
ACISP |
ACISP 2005: Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005: proceedings |
3.N |
ACISP |
ACISP 2006: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006: proceedings |
3.N |
ACISP |
ACISP 2007: Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007: proceedings |
3.N |
ACISP |
ACISP 2008: Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings |
3.N |
ACISP |
Information Security and Privacy, 16th Australasian Conferences, ACISP 2011 |
3.N |
ACISP |
Information Security and Privacy, 18th Australasian Conferences, ACISP 2013 |
3.N |
ACNS |
ACNS 2003: Applied Cryptography and Network Security: 1st International Conference, ACNS 2003, Kunming, China, October 16-19, 2003: proceedings |
3.N |
ACNS |
ACNS 2004: Applied Cryptography and Network Security: 2nd International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004: proceedings |
3.N |
ACNS |
ACNS 2005: Applied Cryptography and Network Security: 3rd International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005: proceedings |
3.N |
ACNS |
ACNS 2006: Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006: proceedings |
3.N |
ACNS |
ACNS 2007: Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007: proceedings |
3.N |
ACNS |
ACNS 2008: Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008., Proceedings |
3.N |
ACNS |
Applied Cryptography and Network Security, 9th International Conference, ACNS 2011 |
3.N |
ADAMS, CARLISLE |
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations |
3.N |
ADAMS, RUSSELL E |
Sourcebook of Automatic Identification and Data Collection |
3.N |
AGRAWAL, MANISH |
Information Security and IT Risk Management |
3.N |
AHONEN, PASI |
TITAN-käsikirja: VTT:n päätuloksia Tekesin Turvallisuusohjelman TITAN-projektissa |
3.N |
AIMANI, LAILA EL |
Verifiable Composition of Signature and Encryption: A Comprehensive Study of the Design Paradigms |
3.N |
ALBRECHT, W. STEVE |
Fraud Examination |
3.N |
ALDINI, ALESSANDRO |
Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures |
3.N |
AMOROSO, EDWARD |
Fundamentals of Computer Security Technology |
3.N |
AMOROSO, EDWARD |
Intranet and Internet Firewall Strategies |
3.N |
AMOROSO, EDWARD |
Intrusion Detection |
3.N |
ANAND, SANJAY |
Sarbanes-Oxley Guide for Finance and Information Technology Professionals |
3.N |
ANDREASSEN, KARL |
Computer Cryptology: Beyond Decoder Rings |
3.N |
ANDRESS, JASON |
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners |
3.N |
ANDREWS, CHIP |
SQL Server Security |
3.N |
ANTS |
ANTS I: Algorithmic Number Theory: 1st International Symposium, ANTS-I, Ithaca, NY, USA, May 6-9, 1994: proceedings |
3.N |
ANTS |
ANTS II: Algorithmic Number Theory: 2nd International Symposium, ANTS-II, Talence, France, May 18-23, 1996: proceedings |
3.N |
ANTS |
ANTS III: Algorithmic Number Theory: 3rd International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998: proceedings |
3.N |
ANTS |
ANTS IV: Algorithmic Number Theory: 4th International Symposium, ANTS-IV, Leiden, the Netherlands, July 2-7, 2000: proceedings |
3.N |
ANTS |
ANTS V: Algebraic Number Theory: 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002: proceedings |
3.N |
ANTS |
ANTS VI: Algorithmic Number Theory: 6th International Symposium, ANTS-VI, Burlington, VT, USA, June 13-18, 2004: proceedings |
3.N |
ANTS |
ANTS VII: Algorithmic Number Theory: 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006: proceedings |
3.N |
ANTS |
ANTS VIII: Algorithmic Number Theory: 8th International Symposium, ANTS-VIII, Banff, Canada, May 17-22, 2008: Proceedings |
3.N |
APPLIED |
Applied Cryptology, Cryptographic Protocols, and Computer Security Models: Lecture Notes Prepared for the American Mathematical Society Short Course, Cryptology in Revolution: Mathematics and Models, held in San Francisco, California, January 5-6, 1981 |
3.N |
ARQUILLA, JOHN |
The Advent of Netwar |
3.N |
ASIACRYPT |
Advances in Cryptology - ASIACRYPT 2009 |
3.N |
ASIACRYPT |
Advances in Cryptology - ASIACRYPT 2018, part 3 |
3.N |
ASIACRYPT |
ASIACRYPT 1991: Advances in Cryptology - ASIACRYPT '91: International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings |
3.N |
ASIACRYPT |
ASIACRYPT 1994: Advances in Cryptology - ASIACRYPT '94: 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings |
3.N |
ASIACRYPT |
ASIACRYPT 1996: Advances in Cryptology - ASIACRYPT '96: International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings |
3.N |
ASIACRYPT |
ASIACRYPT 1998: Advances in Cryptology - ASIACRYPT'98: International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings |
3.N |
ASIACRYPT |
ASIACRYPT 1999: Advances in Cryptology - ASIACRYPT'99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings |
3.N |
ASIACRYPT |
ASIACRYPT 2000: Advances in Cryptology - ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings |
3.N |
ASIACRYPT |
ASIACRYPT 2001: Advances in Cryptology - ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings |
3.N |
ASIACRYPT |
ASIACRYPT 2002: Advances in Cryptology - ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings |
3.N |
ASIACRYPT |
ASIACRYPT 2003: Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings |
3.N |
ASIACRYPT |
ASIACRYPT 2004: Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings |
3.N |
ASIACRYPT |
ASIACRYPT 2005: Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings |
3.N |
ASIACRYPT |
ASIACRYPT 2006: Advances in Cryptology - ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings |
3.N |
AUSCRYPT |
AUSCRYPT 1990: Advances in Cryptology - AUSCRYPT '90: International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings |
3.N |
AUSCRYPT |
AUSCRYPT 1992: Advances in Cryptology - AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings |
3.N |
AUSTIN, TOM |
PKI: A Wiley Tech Brief |
3.N |
BACH, ERIC |
Algorithmic Number Theory: Volume I: Efficient Algorithms |
3.N |
BAKER, RICHARD H |
Computer Security Handbook |
3.N |
BARRETT, DANIEL J. |
SSH, the Secure Shell: The Definitive Guide |
3.N |
BAUER, FRIEDRICH LUDWIG |
Decrypted Secrets: Methods and Maxims of Cryptology |
3.N |
BEJTLICH, RICHARD |
The Practice of Network Security Monitoring |
3.N |
BEKER, HENRY |
Cryptography and Coding |
3.N |
BELL, D. E. |
Secure Computer System: Unified Exposition and Multics Interpretation |
3.N |
BELLOVIN, STEVEN M. |
Thinking Security: Stopping Next Year’s Hackers |
3.N |
BENANTAR, MESSAOUD |
Access Control Systems: Security, Identity Management and Trust Models |
3.N |
BERNSTEIN, DANIEL J. |
Post-Quantum Cryptography |
3.N |
BERTINO, ELISA |
Identity Management: Concepts, Technologies, and Systems |
3.N |
BEUTELSPACHER, ALBRECHT |
Cryptology: An Introduction to the Art and Science of Enciphering, Encrypting, Concealing, Hiding and Safeguarding Described without any Arcane Skullduggery but not ithout Cunning Waggery for the Delectation and instruction of the general public |
3.N |
BHARGAV, ABHAY |
PCI Compliance: The Definitive Guide |
3.N |
BHASKAR, KRISH |
Computer Security: Threats and Countermeasures |
3.N |
BIBA |
Integrity Considerations for Secure Computer Systems |
3.N |
BIHAM, ELI |
Differential Cryptanalysis of the Data Encryption Standard |
3.N |
BINNIE, CHRIST |
Linux Server Security |
3.N |
BIOSURVEILLANCE |
BIOSURVEILLANCE 2007: Intelligence and Security Informatics: Biosurveillance |
3.N |
BIRCH, DAVID |
Digital Identity Management: Perspectives on the Technological, Business and Social Implications |
3.N |
BIRMAN, KENNETH P |
Building Secure and Reliable Network Applications |
3.N |
BLACK, UYLESS |
Internet Security Protocols: Protecting IP Traffic |
3.N |
BLUNDEN, BILL |
Behold a Pale Farce: Cyberwar, Threat Inflation & the Malware Industrial Complex |
3.N |
BLUNDEN, BILL |
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System |
3.N |
BOLLINGER, JEFF |
Crafting the Infosec Playbook |
3.N |
BOSSELAERS, ANTOON |
Integrity Primitives for Secure Information Systems: Final Report of RACE Integrity Primitives Evaluation, RIPE-RACE 1040 |
3.N |
BOYD, COLIN |
Protocols for Authentication and Key Establishment |
3.N |
BRADLEY, TONY |
PCI Compliance: Implementing Effective PCI Data Security Standards |
3.N |
BRAND, KEVIN |
NTRU Cryptography: A Lattice-Based Cryptosystem and Attacks against it |
3.N |
BRANTLY, AARON FRANKLIN |
The Decision to Attack: Military and Intelligence Cyber Decision-Making |
3.N |
BRASSARD, GILLES |
Modern Cryptology: A Tutorial |
3.N |
BROWN, KEITH |
Programming Windows Security |
3.N |
BUCHMANN, JOHANNES A |
Introduction to Public Key Infrastructures: [Elektronisk resurs] / |
3.N |
BUNKER, GUY |
Data Leaks for Dummies |
3.N |
CALC |
CaLC 2001: Cryptography and Lattices: International Conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001, Revised Papers |
3.N |
CAMPEN, ALAN D. |
Cyberwar: Security, Strategy, and Conflict in the Information Age |
3.N |
CANS |
CANS 2006: Cryptology and Network Security: 5th International Conference, CANS 2006 Suzhou, China, December 2006: proceedings |
3.N |
CANS |
CANS 2007: Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. proceedings |
3.N |
CARASIK, ANNE |
Unix Secure Shell |
3.N |
CARDIS |
CARDIS 1998: Smart Card Research and Applications: Third International Conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings |
3.N |
CARDIS |
CARDIS 2008: Smart Card Research and Advanced Applications: 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008, Proceedings |
3.N |
CARR, JEFFREY |
Inside Cyber Warfare |
3.N |
CAVOUKIAN, ANN |
Who Knows: Safeguarding Your Privacy in a Networked World |
3.N |
CCS |
CCS 2001: 8th ACM Conference on Computer and Communications Security: Proceedings. Philadelphia, Pennsylvania, USA, November 5-8, 2001 |
3.N |
CCS |
CCS 2003: 10th ACM Conference on Computer and Communications Security: Proceedings. Washington, DC, USA, October 27-31, 2003 |
3.N |
CCS |
CCS 2004: 11th ACM Conference on Computer and Communications Security: Proceedings. Washington, DC, USA, October 25-29, 2004 |
3.N |
CCS |
CCS 2005: 12th ACM Conference on Computer and Communications Security: Proceedings. Alexandria, Virginia, USA, November 7-11, 2005 |
3.N |
CCS |
CCS 2006: 13th ACM Conference on Computer and Communications Security: Alexandria, Virginia, USA, October 30-November 3, 2006 |
3.N |
CCS |
CCS 2007: 14th ACM Conference on Computer and Communications Security: Alexandria, Virginia, USA, October 29 - November 2, 2007 |
3.N |
CCS |
CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security: Alexandria, Virginia, USA, October 27-31, 2008 |
3.N |
CCS |
CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security: November 9-13, 2009, Chicago, Illinois, USA |
3.N |
CCS |
CCS 2010: Proceedings of the 17th ACM Conference on Computer and Communications Security: October 4-8, 2010, Chicago, Illinois, USA |
3.N |
CERRI, CHRISTIAN |
AWS Scripted 2: Essential Security, SSH and MFA |
3.N |
CHAKRABARTI, ANIRBAN |
Grid Computing Security |
3.N |
CHAPMAN, D. BRENT |
Building Internet Firewalls |
3.N |
CHENG, LEBIN |
Cloud Security for Dummies: Netskope Special Edition |
3.N |
CHEN, ZHIQUN |
Java Card Technology for Smart Cards: Architecture and Programmer's Guide |
3.N |
CHES |
CHES 1999: Cryptographic Hardware and Embedded Systems: First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings |
3.N |
CHES |
CHES 2000: Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings |
3.N |
CHES |
CHES 2001: Cryptographic Hardware and Embedded Systems - CHES 2001: Third International Workshop, Paris, France, May 14-16, 2001, Proceedings |
3.N |
CHES |
CHES 2007: Cryptographic Hardware and Embedded Systems: 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings |
3.N |
CHOR, BEN-ZION |
Two Issues in Public Key Cryptography: RSA bit security and a new knapsack type system |
3.N |
CLARK, DAVID LEON |
IT Manager's Guide to Virtual Private Networks |
3.N |
CLARKE, RICHARD A. |
Cyber War: The Next Threat to National Security and What to Do About It |
3.N |
CLOUTIER, ROLAND P. |
Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders |
3.N |
COBIT |
COBIT Control Practices: [Elektronisk resurs]: Guidance to Achieve Control Objectives for Successful IT Governance |
3.N |
COHEN, FREDERICK B. |
A Short Course on Computer Viruses |
3.N |
COJOCARU, ALINA |
An Introduction to Sieve Methods and Their Applications |
3.N |
COLLINS, MICHAEL |
Network Security Through Data Analysis: Building Situational Awareness |
3.N |
CONVERY, SEAN |
Network Security Architectures |
3.N |
COOK, DEBRA |
CryptoGraphics: Exploiting Graphics Cards for Security |
3.N |
CORNDORF, ERIC |
Quantum Cryptography Using Coherent States: Randomized Encryption and Key Generation |
3.N |
COSTA, SUELI I. R. |
Lattices Applied to Coding for Reliable and Secure Communications |
3.N |
COX, INGEMAR J. |
Digital Watermarking |
3.N |
COX, PHILIP |
Windows 2000 Security Handbook |
3.N |
COYNE, EDWARD J. |
Role Engineering for Enterprise Security Management |
3.N |
CQRE |
CQRE 1999: Secure Networking - CQRE [Secure] '99: International Exhibition and Congress, Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings |
3.N |
CRACKING |
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design |
3.N |
CRUME, JEFF |
Inside Internet Security: What Hackers Don't Want You To Know |
3.N |
CRYPTO |
Advances in Cryptology - CRYPTO 2009 |
3.N |
CRYPTO |
Advances in Cryptology - CRYPTO 2011 |
3.N |
CRYPTO |
Advances in Cryptology - CRYPTO 2013, Part 1 |
3.N |
CRYPTO |
CRYPTO 1981-1997: Advances in Cryptology 1981-1997: Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conferences 1981-1997 |
3.N |
CRYPTO |
CRYPTO 1983: Advances in Cryptology: Proceedings of CRYPTO 83 |
3.N |
CRYPTO |
CRYPTO 1984: Advances in Cryptology: Proceedings of CRYPTO 84 |
3.N |
CRYPTO |
CRYPTO 1985: Advances in Cryptology - CRYPTO '85: Proceedings |
3.N |
CRYPTO |
CRYPTO 1986: Advances in Cryptology - CRYPTO '86: Proceedings |
3.N |
CRYPTO |
CRYPTO 1987: Advances in Cryptology - CRYPTO '87: Proceedings |
3.N |
CRYPTO |
CRYPTO 1988: Advances in Cryptology - CRYPTO '88: Proceedings |
3.N |
CRYPTO |
CRYPTO 1989: Advances in Cryptology - CRYPTO '89: Proceedings |
3.N |
CRYPTO |
CRYPTO 1990: Advances in Cryptology - CRYPTO '90: Proceedings |
3.N |
CRYPTO |
CRYPTO 1991: Advances in Cryptology - CRYPTO '91: Proceedings |
3.N |
CRYPTO |
CRYPTO 1992: Advances in Cryptology - CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings |
3.N |
CRYPTO |
CRYPTO 1993: Advances in Cryptology - CRYPTO '93: 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings |
3.N |
CRYPTO |
CRYPTO 1994: Advances in Cryptology - CRYPTO '94: 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings |
3.N |
CRYPTO |
CRYPTO 1995: Advances in Cryptology - CRYPTO '95: 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings |
3.N |
CRYPTO |
CRYPTO 1996: Advances in Cryptology - CRYPTO '96: 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings |
3.N |
CRYPTO |
CRYPTO 1997: Advances in Cryptology - CRYPTO '97: 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings |
3.N |
CRYPTO |
CRYPTO 1998: Advances in Cryptology - CRYPTO '98: 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings |
3.N |
CRYPTO |
CRYPTO 1999: Advances in Cryptology - CRYPTO '99: 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings |
3.N |
CRYPTO |
CRYPTO 2000: Advances in Cryptology - CRYPTO 2000: 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings |
3.N |
CRYPTO |
CRYPTO 2001: Advances in Cryptology - CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings |
3.N |
CRYPTO |
CRYPTO 2002: Advances in Cryptology - CRYPTO 2002: 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings |
3.N |
CRYPTO |
CRYPTO 2003: Advances in Cryptology - CRYPTO 2001: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings |
3.N |
CRYPTO |
CRYPTO 2004: Advances in Cryptology - CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings |
3.N |
CRYPTO |
CRYPTO 2005: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings |
3.N |
CRYPTO |
CRYPTO 2006: Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings |
3.N |
CRYPTOGRAPHY |
Cryptography 1982: Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982 |
3.N |
CRYPTOGRAPHY |
Cryptography 1995: Cryptography: Policy and Algorithms: International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings |
3.N |
CRYPTOGRAPHY |
Cryptography and Liberty: An International Survey of Encryption Policy |
3.N |
CSAW |
CSAW '07: Computer Security Architecture Workshop: Proceedings. Faifax, Virginia, USA, November 2, 2007. |
3.N |
CSPS |
Computer Security and Privacy Symposium: Proceedings, April 18-19, 1978, The Inn, McCormick Ranch, Scottsdale, Arizona |
3.N |
CT-RSA |
CT-RSA 2001: Topics in Cryptology - CT-RSA 2001: The Cryptographers' Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings |
3.N |
DAEMEN, JOAN |
The Design of Rijndael: AES - the Advanced Encryption Standard |
3.N |
DAMGÅRD, IVAN |
Lectures on Data Security: Modern Cryptology in Theory and Practice |
3.N |
DAVIS, CARLTON R. |
IPSec: Securing VPNs |
3.N |
DELFS, HANS |
Introduction to Cryptography: Principles and Applications |
3.N |
DELUCCIA, JAMES J. IV |
IT Compliance and Controls: Best Practices for Implementation |
3.N |
DEMILLO, RICHARD A |
Applied Cryptology, Cryptographic Protocols, and Computer Security Models |
3.N |
DENNING, DOROTHY ELISABETH ROBLING |
Secure Information Flow in Computer Systems |
3.N |
DENNING, DOROTHY ELIZABETH ROBLING |
Cryptography and Data Security |
3.N |
DESOKY, ABDELRAHMAN |
Noiseless Steganography: [Elektronisk resurs] :: The Key to Covert Communications |
3.N |
DHANJANI, NITESH |
Abusing the Internet of Things |
3.N |
DIGITAL |
Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA) |
3.N |
DIM |
DIM '05: Digital Idenitity Management: Proceedings of the 2005 ACM Workshop on Digital Identity Management: November 11, 2005, Fairfax, Virginia, USA: co-located with CCS 2005 |
3.N |
DIM 2007 |
DIM '07: Digital Identity Management: Proceedings of the 2007 ACM Workshop |
3.N |
DING, C |
The Stability Theory of Stream Ciphers |
3.N |
DIOGENES, YURI |
Microsoft Azure Security Infrastructure |
3.N |
DORASWAMY, NAGANAND |
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks |
3.N |
DORASWAMY, NAGANAND |
IPSec: The New Standard for the Internet, Intranets, and Virtual Private Networks |
3.N |
DOTZAUER, TIMO |
Das SSH Buch: Leitfaden für den sicheren Einsatz von OpenSSH |
3.N |
DRM |
DRM 2001: Security and Privacy in Digital Rights Management: ACM CCS-8 workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001: revised papers |
3.N |
DRM |
DRM 2002: Digital Rights Management: ACM CCS-9 Workshop DRM 2002, Washington, DC, USA, November 18, 2002: revised papers |
3.N |
DRM |
DRM 2003: Third ACM Workshop on Digital Rights Management: Proceedings of the Third ACM Workshop on Digital Rights Management: Washington, DC, USA |
3.N |
DRM |
DRM 2004: Fourth ACM Workshop on Digital Rights Management: Proceedings. Washington, DC, USA, October 25, 2004. Co-located with CCS 2004 |
3.N |
DRM |
DRM 2005: Fifth ACM Workshop on Digital Rights Management: November 7, 2005, Alexandria, Virginia, USA |
3.N |
DRM |
DRM 2007: Digital Rights Management: Alexandria, Virginia, USA, October 29, 2007, Proceedings |
3.N |
DULANEY, EMMETT |
CompTIA Security+, Study Guide |
3.N |
DUNSMORE, BRADLEY |
Mission Critical! Internet Security |
3.N |
DWIVEDI, HIMANSHU |
Implementing SSH: Strategies for Optimizing the Secure Shell |
3.N |
DWIVEDI, HIMANSHU |
Implementing SSH: Strategies for Optimizing the Secure Shell |
3.N |
EILAM, ELDAD |
Reversing: Secrets of Reverse Engineering |
3.N |
EISS |
EISS 1991: Public-Key Cryptography: State of the Art and Future Directions: E.I.S.S. Workshop, Oberwolfach, Germany, July 3-6, 1991, Final Report |
3.N |
ENGER, NORMAN L |
Computer Security: A Management Audit Approach |
3.N |
ESAS |
ESAS 2004: Security in Ad-Hoc and Sensor Networks: First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004: revised selected papers |
3.N |
ESAS |
ESAS 2005: Security and Privacy in Ad-Hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005: revised selected papers |
3.N |
ESCAMILLA, TERRY |
Intrusion Detection: Network Security Beyond the Firewall |
3.N |
ESORICS |
ESORICS 1992: Computer Security - ESORICS 92: Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings |
3.N |
ESORICS |
ESORICS 1994: Computer Security: Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994: Proceedings |
3.N |
ESORICS |
ESORICS 1998: Computer Security - ESORICS 98: 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings |
3.N |
ESORICS |
ESORICS 2000: Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings |
3.N |
ESORICS |
ESORICS 2007: Computer Security: 12th European Symposium on Research in Computer Security, Dresden, Germany, September 24-26, 2007: proceedings |
3.N |
ESORICS |
ESORICS 2008: Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008, Proceedings |
3.N |
ESORICS 1996 |
ESORICS 1996: Computer Security - ESORICS 96: 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996: Proceedings |
3.N |
EU GENERAL |
EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide |
3.N |
EUROCRYPT |
Advances in Cryptology - EUROCRYPT 2011 |
3.N |
EUROCRYPT |
Advances in Cryptology - EUROCRYPT 2012 |
3.N |
EUROCRYPT |
EUROCRYPT 1984: Advances in Cryptology: Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9-11, 1984 |
3.N |
EUROCRYPT |
EUROCRYPT 1985: Advances in Cryptology - EUROCRYPT '85: Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques, Linz, Austria, April 1985 |
3.N |
EUROCRYPT |
EUROCRYPT 1987: Advances in Cryptology - EUROCRYPT '87: Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 1988: Advances in Cryptology - EUROCRYPT '88: Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 1989: Advances in Cryptology - EUROCRYPT '89: Workshop on the Theory and Application of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 1990: Advances in Cryptology - EUROCRYPT '90: Workshop on the Theory and Application of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 1991: Advances in Cryptology - EUROCRYPT '91: Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 1992: Advances in Cryptology - EUROCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 1993: Advances in Cryptology - EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 1994: Advances in Cryptology - EUROCRYPT '94: Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 1995: Advances in Cryptology - EUROCRYPT '95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21 - 25, 1995, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 1996: Advances in Cryptology - EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 1997: Advances in Cryptology - EUROCRYPT '97: International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 1998: Advances in Cryptology - EUROCRYPT '98: International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 1999: Advances in Cryptology - EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 2000: Advances in Cryptology - EUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 2001: Advances in Cryptology - EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 2002: Advances in Cryptology - EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 2003: Advances in Cryptology - EUROCRYPT 2003: International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 2004: Advances in Cryptology - EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 2005: Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 2006: Advances in Cryptology - EUROCRYPT 2006: 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings: [electronic resource] |
3.N |
EUROCRYPT |
EUROCRYPT 2008: Advances in Cryptology - EUROCRYPT 2008: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008, Proceedings |
3.N |
EUROCRYPT |
EUROCRYPT 2014: Advances in Cryptology - EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings |
3.N |
FAST |
FAST 2006: Formal Aspects in Security and Trust: 4th International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006: revised selected papers |
3.N |
FAST |
Fast Software Encryption Workshop 1999 |
3.N |
FC |
FC 1997: Financial Cryptography: 1st International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997: proceedings |
3.N |
FC |
FC 1998: Financial Cryptography: 2nd International Conference, FC '98, Anguilla, British West Indies, February 23-25, 1998: proceedings |
3.N |
FC |
FC 1999: Financial Cryptography: 3rd International Conference, FC '99, Anguilla, British West Indies, February 22-25, 1999: proceedings |
3.N |
FC |
FC 2000: Financial Cryptography: 4th International Conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000: proceedings |
3.N |
FC |
FC 2001: Financial Cryptography: 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001: proceedings |
3.N |
FC |
FC 2002: Financial Cryptography: 6th International Conference, FC 2002, Southampton, Bermuda, March 11-14, 2002: revised papers |
3.N |
FC |
FC 2003: Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003: revised papers |
3.N |
FC |
FC 2004: Financial Cryptography: 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004: revised papers |
3.N |
FC |
FC 2005: Financial Cryptography and Data Security: 9th International Conference, FC 2005, Roseau, The Commonwaelth of Dominica, February 28- March 3, 2005: revised papers |
3.N |
FC |
FC 2006: Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006: revised selected papers |
3.N |
FC |
FC 2007: Financial Cryptography and Data Security: 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. revised selected papers |
3.N |
FEDERATED |
Federated Identity Management and Web Services Security with IBM Tivoli Security Solutions |
3.N |
FEGHHI, JALAL |
Digital Certificates: Applied Internet Security |
3.N |
FERGUSON, NIELS |
Cryptography Engineering: Design Principles and Practical Applications |
3.N |
FERRAIOLO, DAVID |
Role-Based Access Control |
3.N |
FINCH, JAMES H |
Computer Security: A Global Challenge: Proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10-12 September, 1984 |
3.N |
FISCHER-HÜBNER, SIMONE |
IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms |
3.N |
FISHER, ROYAL P. |
Information Systems Security |
3.N |
FMSE |
FMSE '03: Formal Methods in Security Engineering: Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering: Washington, DC, USA, October 30, 2003: co-located with CCS'03 |
3.N |
FMSE |
FMSE '05: Formal Methods in Security Engineering: Proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering: November 11, 2005, Fairfax, Virginia, USA: co-located with CCS 2005 |
3.N |
FMSE |
FMSE '07: Formal Methods in Security Engineering: Proceedings of the 2007 ACM Workshop on Formal Methods in Security Engineering, Fairfax, Virginia, USA, November 2, 2007 |
3.N |
FORD, WARWICK |
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption |
3.N |
FORSHAW, JAMES |
Attacking Network Protocols: A Hacker’s Guide to Capture, Analysis, and Exploitation |
3.N |
FOSTER, JAMES C |
Sockets, Shellcode, Porting & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals |
3.N |
FRANKEL, SHEILA |
Demystifying the IPSec Puzzle |
3.N |
FROLOV, KONSTANTIN |
Protection of Civilian Infrastructure from Acts of Terrorism |
3.N |
FSE |
Fast Software Encryption: 15th International Workshop, FSE 2008 |
3.N |
FSE |
Fast Software Encryption: 16th International Workshop, FSE 2009 |
3.N |
FSE |
Fast Software Encryption: 17th International Workshop, FSE 2010 |
3.N |
FSE |
Fast Software Encryption: 18th International Workshop, FSE 2011 |
3.N |
FSE |
Fast Software Encryption: 20th International Workshop, FSE 2013 |
3.N |
FSE |
Fast Software Encryption: 21th International Workshop, FSE 2014 |
3.N |
FSE |
FSE 1993: Fast Software Encryption: 1st International Workshop, Cambridge Security Workshop, Cambridge, U.K., December 9-11, 1993: proceedings |
3.N |
FSE |
FSE 1994: Fast Software Encryption: Second International Workshop, Leuven, Belgium, December 14-16, 1994, Proceedings |
3.N |
FSE |
FSE 1996: Fast Software Encryption: 3rd International Workshop, Cambridge, UK, February 21-23, 1996: proceedings |
3.N |
FSE |
FSE 1997: Fast Software Encryption: 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997: proceedings |
3.N |
FSE |
FSE 1998: Fast Software Encryption: 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998: proceedings |
3.N |
FSE |
FSE 1999: Fast Software Encryption: 6th International Workshop, FSE'99, Rome, Italy, March 24-26, 1999: proceedings |
3.N |
FSE |
FSE 2000: Fast Software Encryption: 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000: proceedings |
3.N |
FSE |
FSE 2001: Fast Software Encryption: 8th International Workshop, FSE 2001, Yokohama, Japan, April 2-4, 2001: revised papers |
3.N |
FSE |
FSE 2002: Fast Software Encryption: 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002: revised papers |
3.N |
FSE |
FSE 2003: Fast Software Encryption: 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003: revised papers |
3.N |
FSE |
FSE 2004: Fast Software Encryption: 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004 ; revised papers |
3.N |
FSE |
FSE 2007: Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers |
3.N |
FSE 2016 |
Fast Software Encryption: 23rd International Conference, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, Proceedings |
3.N |
FUMY, WALTER |
Enterprise Security: IT Security Solutions: Concepts, Practical Experiences, Technologies |
3.N |
FURTEK, FREDERICK C |
A Validation Technique for Computer Security Based on the Theory of Constraints |
3.N |
GAINES, HELEN FOUCHÉ |
Cryptanalysis: A Study of Ciphers and Their Solution |
3.N |
GARDNER, BILL |
Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats |
3.N |
GARFINKEL, SIMSON |
Practical UNIX and Internet Security |
3.N |
GARFINKEL, SIMSON |
Web Security and Commerce |
3.N |
GARRETT, PAUL |
Making, Breaking Codes: An Introduction to Cryptography |
3.N |
GARRETT, PAUL |
Public-Key Cryptography: American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland |
3.N |
GATHEN, JOACHIM VON ZUR |
CryptoSchool |
3.N |
GHOSH, ANUP K. |
E-Commerce Security: Weak Links, Best Defences |
3.N |
GILMAN, EVAN |
Zero Trust Networks: Building Secure Systems in Untrusted Networks |
3.N |
GOLDREICH, ODED |
Foundations of Cryptography: Volume I: Basic Tools |
3.N |
GOLDREICH, ODED |
Foundations of Cryptography: Volume II: Basic Applications |
3.N |
GOLDREICH, ODED |
Modern Cryptography, Probabilistic Proofs and Pseudorandomness |
3.N |
GOLLMANN, DIETER |
Computer Security |
3.N |
GOLOMB, SOLOMON W |
Shift Register Sequences |
3.N |
GONCALVES, MARCUS |
Firewalls Complete |
3.N |
GONCALVES, MARCUS |
Firewalls Complete |
3.N |
GOODMAN, SEYMOUR |
Executive Briefing: An Examination of High-Performance Computing Export Control policy in the 1990s |
3.N |
GORDON, ADAM |
The Official (ISC)² Guide to the CCSPSM CBK |
3.N |
GRANT, GAIL L. |
Understanding Digital Signatures |
3.N |
GREENFIELD, JONATHAN S |
Distributed Programming Paradigms with Cryptography Applications |
3.N |
GREER, MELVIN B., JR. |
Practical Cloud Security: A Cross-Industry View |
3.N |
GUTMANN, PETER |
Design and Verification of a Cryptographic Security Architecture |
3.N |
HARDY, G |
An Introduction to the Theory of Numbers |
3.N |
HARRISON, ANNETTE |
The Problem of Privacy in the Computer Age: An Annotated Bibliography |
3.N |
HARRISON, RICHARD |
ASP/MTS/ADSI: Web Security |
3.N |
HARRIS, SHON |
CISSP All-in-one Exam Guide |
3.N |
HECKMAN, KRISTIN E. |
Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense |
3.N |
HEIDERICH, MARIO |
Web Application Obfuscation: [Elektronisk resurs] :: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' |
3.N |
HELOPURO, SANNA |
Sähköisen Viestinnän Tietosuoja |
3.N |
HENRY, RYAN |
The Information Revolution and International Security |
3.N |
HERBIG, CHRISTOPHER FRED |
Use of OpenSSH Support for Remote Login to a Multilevel Secure System |
3.N |
HOFFMAN, LANCE J |
Security and Privacy in Computer Systems |
3.N |
HOFFMAN, LANCE J. |
Building in Big Brother: the Cryptographic Policy Debate |
3.N |
HOFFSTEIN, JEFFREY |
An Introduction to Mathematical Cryptography |
3.N |
HOGLUND, GREG |
Rootkits: Subverting the Windows Kernel |
3.N |
HOLTMANNS, SILKE |
Cellular Authentication for Mobile and Internet Services |
3.N |
HOSEK, SUSAN D. |
Patient Privacy, Consent, and Identity Management in Health Information Exchange: Issues for the Military Health System |
3.N |
HOUSLEY, RUSS |
Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure |
3.N |
HOWARD, JOHN D. |
An Analysis of Security Incidents on the Internet 1989-1995 |
3.N |
HOWARD, MICHAEL |
The Security Development Lifecycle: SDL, a Process for Developing Demonstrably More Secure Software |
3.N |
HRUSKA, JAN |
Computer Viruses and Anti-Virus Warfare |
3.N |
HUANG, ANDREW |
Hacking the Xbox: an Introduction to Reverse Engineering |
3.N |
HUDAK, TYLER |
OpenSSH: A Survival Guide for Secure Shell Handling: Version 1.0 |
3.N |
HU, FEI |
Security and Privacy on Internet of Things (IoTs): Models, Algorithms, and Implementations |
3.N |
HU, WEI |
DCE Security Programming |
3.N |
ICICS |
ICICS 1997: Information and Communications Security: First International Conference, ICICS '97, Beijing, China, November 11-14, 1997, Proceedings |
3.N |
ICICS |
ICICS 1999: Information and Communication Security: Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings |
3.N |
ICICS |
ICICS 2006: Information and Communications Security: 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006: proceedings |
3.N |
ICICS |
ICICS 2007: Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. proceedings |
3.N |
ICICS |
ICICS 2008: Information and Communications Security: 10th International Conference, ICICS 2008, Birmingham, UK, October 20 - 22, 2008, Proceedings |
3.N |
ICISC |
ICISC 1999: Information Security and Cryptology - ICISC'99: Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings |
3.N |
ICISC |
ICISC 2000: Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings |
3.N |
ICISC |
ICISC 2002: Information Security and Cryptology - ICISC 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002: Revised Papers |
3.N |
ICISC |
ICISC 2006: Information Security and Cryptology - ICISC 2006: 9th International Conference, Busan, Korea, November 30 - December 1, 2006 ; proceedings |
3.N |
ICISS |
ICISS 2006: Information Systems Security: 2nd International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006: proceedings |
3.N |
ICISS |
ICISS 2007: Information Systems Security: 3rd International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. proceedings |
3.N |
IFIP |
IFIP 1999: Research Advances in Database and Information Systems Security: IFIP TC 11 WG 11.3 Thirteenth Working Conference on Database Security, July 25-28, 1999, Seattle, Washington, USA |
3.N |
IFIP |
IFIP 2007: Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007: proceedings |
3.N |
IFIP |
IFIP 2008: Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings |
3.N |
IH |
IH 2005: Information Hiding: 7th International Workshop |
3.N |
IH |
IH 2008: Information Hiding: 10th International Workshop |
3.N |
IH |
IH 2010: Information Hiding: 12th International Workshop |
3.N |
IH |
IH 2011: Information Hiding: 13th International Workshop |
3.N |
IH |
IH 2012: Information Hiding: 14th International Workshop |
3.N |
IH 1996 |
IH 1996: Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996, Proceedings |
3.N |
IH 1998 |
IH 1998: Information Hiding: Second International Workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings |
3.N |
IH 1999 |
IH 1999: Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999, Proceedings |
3.N |
IH 2002 |
IH 2002: Information Hiding: 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers |
3.N |
IH 2006 |
IH 2006: Information Hiding: 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Selected Papers |
3.N |
IH 2007 |
IH 2007: Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers |
3.N |
IIVARI, MIKA |
Liiketoiminnan jatkuvuussuunnittelu ja ICT-varautuminen |
3.N |
IMA |
IMA 1991: Cryptography and Coding III: Based on the Proceedings of a Conference Organized by the Institute of Mathematics and its Applications on Cryptography and Coding, held at the Royal Agricultural College, Cirencester, in December 1991 |
3.N |
IMA |
IMA 1995: Cryptography and Coding: 5th IMA Conference, Cirencester, UK, December 18-20, 1995, Proceedings |
3.N |
IMA |
IMA 1997: Cryptography and Coding: 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings |
3.N |
IMA |
IMA 1999: Cryptography and Coding: 7th IMA International Conference, Cirencester, UK, December 20-22, 1999, Proceedings |
3.N |
IMA |
IMA 2007: Cryptography and Coding: 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings |
3.N |
INDOCRYPT |
INDOCRYPT 2000: Progress in Cryptology: 1st International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000: proceedings |
3.N |
INDOCRYPT |
INDOCRYPT 2001: Progress in Cryptology: 2nd International Conference on Cryptology in India, Chennai, India, December 16-20, 2001: proceedings |
3.N |
INDOCRYPT |
INDOCRYPT 2002: Progress in Cryptology: 3rd International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002: proceedings |
3.N |
INDOCRYPT |
INDOCRYPT 2003: Progress in Cryptology: 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003: proceedings |
3.N |
INDOCRYPT |
INDOCRYPT 2004: Progress in Cryptology: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004: proceedings |
3.N |
INDOCRYPT |
INDOCRYPT 2006: Progress in Cryptology: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006 ; proceedings |
3.N |
INDOCRYPT |
INDOCRYPT 2007: Progress in Cryptology: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. proceedings |
3.N |
INFOWAR |
InfoWar |
3.N |
INSCRYPT |
INSCRYPT 2006: Information Security and Cryptology: 2nd SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006 ; proceedings |
3.N |
INSCRYPT |
Inscrypt 2007: Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers |
3.N |
IPSEC |
IPSEC ISV VeriSign Integration Guide |
3.N |
ISC |
ISC 2001: Information Security: 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001: Proceedings |
3.N |
ISC |
ISC 2003: Information Security: 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003: Proceedings |
3.N |
ISC |
ISC 2004: Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings |
3.N |
ISC |
ISC 2005: Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005: Proceedings |
3.N |
ISC |
ISC 2007: Information Security: 10th International Conference, ISC 2007, Valparaâiso, Chile, October 9-12, 2007: proceedings |
3.N |
ISPEC |
ISPEC 2005: Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings |
3.N |
ISPEC |
ISPEC 2007: Information Security Practice and Experience: 3rd International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007: proceedings |
3.N |
ISPEC |
ISPEC 2008: Information Security Practice and Experience: 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings |
3.N |
ISW |
ISW 1997: Information Security: First International Workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997, Proceedings |
3.N |
ISW |
ISW 1999: Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999, Proceedings |
3.N |
ISW |
ISW 2000: Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000, Proceedings |
3.N |
IWSEC |
IWSEC 2006: Advances in Information and Computer Security: 1st International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006: proceedings |
3.N |
IWSEC |
IWSEC 2007: Advances in Information and Computer Security: 2nd International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: proceedings |
3.N |
JAVACARD |
JavaCard 2000: Java on Smart Cards: Programming and Security: First International Workshop, JavaCard 2000, Cannes, France, September 14, 2000, Revised Papers |
3.N |
JOHNSON, ROB |
Security Policies and Implementation Issues |
3.N |
KAPLAN, FRED |
Dark Territory: The Secret History of Cyber War |
3.N |
KAPLAN, JAMES M. |
Beyond Cybersecurity: Protecting Your Digital Business |
3.N |
KASPERSKY, KRIS |
Hacker Disassembling Uncovered |
3.N |
KOBLITZ, NEAL |
A Course in Number Theory and Cryptography |
3.N |
KOBLITZ, NEAL |
Algebraic Aspects of Cryptography |
3.N |
KOBLITZ, NEAL |
Introduction to Elliptic Curves and Modular Forms |
3.N |
KOBLITZ, NEAL |
Towards a Quarter-Century of Public key Cryptography |
3.N |
KONHEIM, ALAN G |
Cryptography: a Primer |
3.N |
KOSIUR, DAVE |
Building and Managing Virtual Private Networks |
3.N |
KOZIOL, JACK |
The Shellcoder's Handbook: Discovering and Exploiting Security Holes |
3.N |
KRANAKIS, EVANGELOS |
Selected Areas in Cryptography |
3.N |
KRUTZ, RONALD L. |
Cloud Security: A Comprehensive Guide to Secure Cloud Computing |
3.N |
KULLBACK, SOLOMON |
Statistical Methods in Cryptanalysis |
3.N |
LAHTI, CHRISTIAN B. |
Sarbanes-Oxley: IT Compliance Using COBIT and Open Source Tools |
3.N |
LAI, XUEJIA |
On the Design and Security of Block Ciphers |
3.N |
LANDOLL, DOUGLAS J. |
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments |
3.N |
LANG, SERGE |
Elliptic Functions |
3.N |
LANSEC |
LANSEC 1989: Local Area Network Security: Workshop LANSEC '89, European Institute for System Security (E.I.S.S.), Karlsruhe, FRG, April 3-6, 1989, Proceedings |
3.N |
LAURENT, MARYLINE |
Digital Identity Management |
3.N |
LIU, DALE |
Next Generation SSH2 Implementation: Securing Data in Motion |
3.N |
LOBEL, JEROME |
Foiling the System Breakers: Computer Security and Access Control |
3.N |
LOCATI, FABIO ALESSANDRO |
OpenStack Cloud Security: Build a secure OpenStack cloud to withstand all common attacks |
3.N |
LOCKHART, ANDREW |
Network Security Hacks |
3.N |
LUBY, MICHAEL |
Pseudorandomness and Cryptographic Applications |
3.N |
LUCAS, MICHAEL W. |
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys |
3.N |
LUDWIG, MARK |
The Giant Black Book of Computer Viruses |
3.N |
MACAULAY, TYSON |
RIoT Control: Understanding and Managing Risks and the Internet of Things |
3.N |
MALOOF, MARCUS A |
Machine Learning and Data Mining for Computer Security: Methods and Applications |
3.N |
MANSFIELD, KENNETH C. |
Computer Networking from LANs to WANs: Hardware, Software, and Security |
3.N |
MAO, WENBO |
Modern Cryptography: Theory and Practice |
3.N |
MARAS, MARIE-HELEN |
Computer Forensics: Cybercriminals, Laws, and Evidence |
3.N |
MARTINELLI, STEVE |
Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone, OpenStack’s Identity Service |
3.N |
MATHER, TIM |
Cloud Security and Privacy |
3.N |
MCCLURE, STUART |
Hacking Exposed: Network Security Secrets and Solutions |
3.N |
MCGRAW, GARY |
Java Security: Hostile Applets, Holes, and Antidotes: What Every Netscape and Internet Explorer User Needs to Know |
3.N |
MCINERNEY, MICHAEL |
Windows NT Security |
3.N |
MCLOONE, MAIRE |
System-on-Chip Architectures and Implementations for Private-Key Data Encryption |
3.N |
MEHAN, JULIE E. |
CyberWar, CyberTerror, CyberCrime and CyberActivism: An in-depth guide to the role of standards in the cybersecurity environment |
3.N |
MEHROTRA, KISHAN G. |
Anomaly Detection Principles and Algorithms |
3.N |
MENEZES, ALFRED |
Elliptic Curve Public Key Cryptosystems |
3.N |
MENEZES, ALFRED J. |
Handbook of Applied Cryptography |
3.N |
MEYER, CARL H |
Cryptography: A New Dimension in Computer Data Security: A Guide for the Design and Implementation of Secure Systems |
3.N |
MINASI, MARK |
Administering Windows Vista Security: The Big Surprises |
3.N |
MITNICK, KEVIN D. |
The Art of Deception: Controlling the Human Element of Security |
3.N |
MMM-ACNS |
MMM-ACNS 2001: Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security: International Workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings |
3.N |
MM&SEC |
MM&Sec 2007: MM&Sec '07: Proceedings of the Multimedia & Security Workshop 2007: Dallas, Texas, USA, September 20-21, 2007 |
3.N |
MM&SEC |
MM&Sec 2008: MM&Sec'08: Proceedings of the Multimedia & Security Workshop 2008: Oxford, United Kingdom, September 22-23, 2008 |
3.N |
MM&SEC |
MM&Sec 2009: MM&Sec'09: Proceedings of the 2009 ACM SIGMM Multimedia and Security Workshop 2009: September 7-8, 2009, Princeton, New Jersey, USA |
3.N |
MOELLER, ROBERT R |
Sarbanes-Oxley Internal Controls: Effective Auditing with AS5, CobiT, and ITIL |
3.N |
MOELLER, ROBERT R. |
Executive’s Guide to COSO Internal Controls: Understanding and Implementing the New Framework |
3.N |
MONTE, MATTHEW |
Network Attacks & Exploitation |
3.N |
MURAMATSU, HIDEKAZU |
図解入門よくわかるインターネットセキュリティと「安号」の仕組み (How‐nual図解入門) |
3.N |
NASH, ANDREW |
PKI: Implementing and Managing Esecurity |
3.N |
NATAN, RON BEN |
Implementing Database Security and Auditing |
3.N |
NAUHEIMER, FRANK |
Development of a Lattice Based Blind Signature Scheme: Post-quantum Cryptography |
3.N |
NEUENSCHWANDER, DANIEL |
Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics |
3.N |
NEW SECURITY |
New Security Paradigms Workshop |
3.N |
NEW SECURITY |
New Security Paradigms Workshop |
3.N |
NEWTON, DAVID E |
Encyclopedia of Cryptology |
3.N |
NIEDERREITER, HARALD |
Coding Theory and Cryptology |
3.N |
NIST |
A Framework for Designing Cryptographic Key Management Systems |
3.N |
NIST |
Cryptographic Key Management Workshop Summary: June 8-9, 2009 |
3.N |
NIST |
Recommendation for Key Management - Part 1: General (Revision 3) |
3.N |
NIST |
Recommendation for Key Management - Part 2: Best Practices for Key Management Organization |
3.N |
NIST |
Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance |
3.N |
NORDSEC |
NORDSEC 1998: The Third Workshop on Secure IT Systems (NORDSEC '98): Trondheim, Norway, November 5-6, 1998: proceedings |
3.N |
OAKS, SCOTT |
Java Security |
3.N |
O'LEARY, MIKE |
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks |
3.N |
O’NEILL, MARK |
Web Services Security |
3.N |
OPPLIGER, ROLF |
Authentication Systems for Secure Networks |
3.N |
OPPLIGER, ROLF |
Contemporary Cryptography |
3.N |
ORONDI, OMONDO |
Identity & Access Management: A Systems Engineering Approach |
3.N |
PABBATHI, KIRAN KUMAR |
Focus on IAM (Identity and Access Management): CSFs, metrics, checklists, best practices, and guidelines for defining IAM processes and implementing IAM solutions |
3.N |
PAIRING |
PAIRING 2007: Pairing-Based Cryptography: 1st International Conference, Tokyo, Japan, July 2-4, 2007: proceedings |
3.N |
PAISI |
PAISI 2007: Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007: proceedings |
3.N |
PATTERSON, WAYNE |
Mathematical Cryptology for Computer Scientists and Mathematicians |
3.N |
PELTIER, THOMAS R |
Information Security Risk Analysis |
3.N |
PET |
PET 2006: Privacy Enhancing Technologies: 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006: revised selected papers |
3.N |
PET |
PET 2007: Privacy Enhancing Technologies: 7th International Symposium, PET 2007, Ottawa, Canada, June 20-22, 2007: revised selected papers |
3.N |
PFITZMANN, BIRGIT |
Digital Signature Schemes: General Framework and Fail-Stop Signatures |
3.N |
PIEPRZYK, JOSEF |
Design of Hashing Algorithms |
3.N |
PKC |
PKC 1998: Public Key Cryptography: 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998: proceedings |
3.N |
PKC |
PKC 1999: Public Key Cryptography: 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999: proceedings |
3.N |
PKC |
PKC 2000: Public Key Cryptography: 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000: proceedings |
3.N |
PKC |
PKC 2001: Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001: proceedings |
3.N |
PKC |
PKC 2002: Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems [i.e. Cryptography], PKC 2002, Paris, France, February 12-14, 2002: proceedings |
3.N |
PKC |
PKC 2003: Public Key Cryptography: 6th International Workshop on Practice and Theory in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003: proceedings |
3.N |
PKC |
PKC 2004: Public Key Cryptography: 7th International Workshop on Practice and Theory in Public Key Cryptography, Singapore, March 1-4, 2004: proceedings |
3.N |
PKC |
PKC 2005: Public Key Cryptography: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005: proceedings |
3.N |
PKC |
PKC 2006: Public Key Cryptography: 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006: proceedings |
3.N |
PKC |
PKC 2007: Public Key Cryptography: 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007: proceedings |
3.N |
PKC |
PKC 2008: Public Key Cryptography - PKC 2008: 11th International Workshop on Practice and Theory in Public Key Cryptography, Barcelona, Spain, March 9-12, 2008: Proceedings |
3.N |
PKC |
Public Key Cryptography - PKC 2009 |
3.N |
PKC |
Public Key Cryptography - PKC 2010 |
3.N |
PKC |
Public Key Cryptography - PKC 2011 |
3.N |
PKC |
Public Key Cryptography - PKC 2013 |
3.N |
PKC |
Public Key Cryptography - PKC 2014 |
3.N |
POHLMAN, MARLIN B |
Oracle Identity Management: Governance, Risk, and Compliance Architecture |
3.N |
POLICY |
POLICY 2001: Policies for Distributed Systems and Networks: International Workshop, POLICY 2001, Bristol, UK, January 29-31, 2001, Proceedings |
3.N |
POMERANCE, CARL |
Cryptology and Computational Number Theory |
3.N |
PORTER, THOMAS |
Practical VoIP Security: [Elektronisk resurs] |
3.N |
PQCRYPTO |
Post-Quantum Cryptography: 10th International Workshop, PQCrypto 2019 |
3.N |
PQCRYPTO |
Post-Quantum Cryptography: 11th International Workshop, PQCrypto 2020 |
3.N |
PQCRYPTO |
Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 |
3.N |
PQCRYPTO |
Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011 |
3.N |
PQCRYPTO |
Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013 |
3.N |
PQCRYPTO |
Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016 |
3.N |
PQCRYPTO |
Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017 |
3.N |
PQCRYPTO |
Post-Quantum Cryptography: 9th International Workshop, PQCrypto 2018 |
3.N |
PQCRYPTO |
Post-Quantum Cryptography, Proceedings, PQCrypto 2010 |
3.N |
PQCRYPTO |
Post-Quantum Cryptography, Proceedings, PQCrypto 2014 |
3.N |
PQCRYPTO |
Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 |
3.N |
PRAGOCRYPT |
Proceedings of the 1st International Conference on the Theory and Applications of Cryptology, PRAGOCRYPT ’96, vol 1 |
3.N |
PRAGOCRYPT |
Proceedings of the 1st International Conference on the Theory and Applications of Cryptology, PRAGOCRYPT ’96, vol 2 |
3.N |
PRENEEL, BART |
State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures |
3.N |
PSD |
PSD 2006: Privacy in Statistical Databases: CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006: proceedings |
3.N |
PSD |
PSD 2008: Privacy in Statistical Databases: UNESCO Chair in Data Privacy, International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008, Proceedings |
3.N |
PUBLIC |
Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA) |
3.N |
PURPURA, PHILIP P. |
Security and Loss Prevention: An Introduction |
3.N |
QOP |
QoP' 07: Quality of Protection: Proceedings of the 2007 ACM Workshop. Alexandria, Virginia, USA. October 29, 2007. |
3.N |
QUANTUM SAFE |
Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges |
3.N |
RADHAKRISHNAN, RAKESH |
Identity & Security: A Common Architecture & Framework for SOA and Network Convergence |
3.N |
RAID |
RAID 2000: Recent Advances in Intrusion Detection: Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings |
3.N |
RAID |
RAID 2007: Recent Advances in Intrusion Detection: 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings |
3.N |
RAID |
RAID 2008: Recent Advances in Intrusion Detection: 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008, Proceedings |
3.N |
RAJ, ADITYA |
MOSH (MOBILE SHELL): A New Era of Remote Access |
3.N |
RAMEY, KENNETH |
Pro Oracle Identity and Access Management Suite |
3.N |
RANKIN, KYLE |
Linux Hardening in Hostile Networks: Server Security from TLS to Tor |
3.N |
RANKL, W. |
Smart Card Handbook |
3.N |
RATTRAY, GREGORY J |
Strategic Warfare in Cyberspace |
3.N |
REID, JASON |
Secure Shell in the Enterprise |
3.N |
REID, JASON |
Secure Shell in the Enterprise |
3.N |
RHEE, MAN YOUNG |
CDMA Cellular Mobile Communications and Network Security |
3.N |
RHEE, MAN YOUNG |
Cryptography and Secure Communications |
3.N |
RHEE, MAN YOUNG |
Internet Security: Cryptographic Principles, Algorithms and Protocols |
3.N |
RHOTON, JOHN |
Cloud Computing Protected |
3.N |
RIEDEL, SVEN |
SSH: kurz & gut |
3.N |
ROONEY, ANNE |
Computer Science and IT: Investigating a Cyber Attack |
3.N |
ROPER, CARL A. |
Risk Management for Security Professionals |
3.N |
ROTENBERG, LEO J |
Making Computers Keep Secrets |
3.N |
ROZENBLIT, MOSHE |
Security for Telecommunications Network Management |
3.N |
RUBIN, AVIEL D. |
Web Security Sourcebook: A Complete Guide to Web Security Threats and Solutions |
3.N |
RUIZ, KEVIN |
Active Directory 33 Success Secrets, 33 Most Asked Questions On Active Directory, What You Need To Know |
3.N |
RUSSELL, BRIAN |
Practical Internet of Things Security |
3.N |
RUSSELL, DEBORAH |
Computer Security Basics |
3.N |
SAC |
SAC 1998: Selected Areas in Cryptography: 5th Annual International Workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998: proceedings |
3.N |
SAC |
SAC 1999: Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999: proceedings |
3.N |
SAC |
SAC 2000: Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000: proceedings |
3.N |
SAC |
SAC 2001: Selected Areas in Cryptography: 8th Annual International Workshop, SAC 2001, Toronto, Ontario, Canada, August 16-17, 2001: revised papers |
3.N |
SAC |
SAC 2002: Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002: revised papers |
3.N |
SAC |
SAC 2003: Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003: revised papers |
3.N |
SAC |
SAC 2004: Selected Areas in Cryptography: 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004: revised selected papers |
3.N |
SAC |
SAC 2005: Selected Areas in Cryptography: 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005: revised selected papers |
3.N |
SAC |
SAC 2006: Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers |
3.N |
SAC |
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 |
3.N |
SAC |
Selected Areas in Cryptography: 17th Annual International Workshop, SAC 2010 |
3.N |
SAC |
Selected Areas in Cryptography: 20th Annual International Workshop, SAC 2013 |
3.N |
SAC |
Selected Areas in Cryptography: 22nd Annual International Workshop, SAC 2015 |
3.N |
SACCO, LUIGI |
Manuel de Cryptographie |
3.N |
SACMAT |
SACMAT 2001: Sixth ACM Symposium on Access Control Models and Technologies. Proceedings. Litton-TASC, Westfields II Conference Facility. May 3-4, 2001, Chantilly, Virginia, USA |
3.N |
SACMAT |
SACMAT 2002: Seventh ACM Symposium on Access Control Models and Technologies. June 3-4, 2002, Naval Postgraduate School, Monterey, California, USA |
3.N |
SACMAT |
SACMAT 2003: Eighth ACM Symposium on Access Control Models and Technologies. June 2-3, 2003, Villa Gallia, Como, Italy |
3.N |
SACMAT |
SACMAT 2006: Eleventh ACM Symposium on Access Control Models and Technologies. June 7-9, 2006, Lake Tahoe, California, USA |
3.N |
SACMAT |
SACMAT 2007: 12th ACM Symposium on Access Control Models and Technologies: Sophia Antipolis, France, June 20-22, 2007 |
3.N |
SACMAT |
SACMAT 2008: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies: Estes Park, Colorado, USA, June 11-13, 2008 |
3.N |
SACMAT |
SACMAT 2009: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies: Stresa, Italy, June 3-5, 2009 |
3.N |
SACMAT |
SACMAT 2010: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies: June 9-11, 2010, Pittsburgh, Pennsylvania, USA |
3.N |
SAFECOMP |
SAFECOMP 1998: Computer Safety, Reliability and Security: 17th International Conference, SAFECOMP'98, Heidelberg, Germany, October 5-7, 1998, Proceedings |
3.N |
SAFECOMP |
SAFECOMP 1999: Computer Safety, Reliability and Security: 18th International Conference, SAFECOMP'99, Toulouse, France, September 27-29, 1999, Proceedings |
3.N |
SAFECOMP |
SAFECOMP 2000: Computer Safety, Reliability and Security: 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000, Proceedings |
3.N |
SAFEGUARDING |
Safeguarding the E-Business Network: The war against Hackers and Crackers |
3.N |
SALMINEN, MARKUS |
Tietosuoja Sähköisessä Liiketoiminnassa |
3.N |
SALOMAA, ARTO |
Public-Key Cryptography |
3.N |
SAMANI, RAJ |
CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security |
3.N |
SANDERS, CHRIS |
Applied Network Security Monitoring: Collection, Detection, and Analysis |
3.N |
SANTUKA, VIVEK |
AAA Identity Management Security |
3.N |
SCAMBRAY, JOEL |
Hacking Exposed Windows 2000: Network Security Secrets and Solutions |
3.N |
SCHEIDEL, JEFF |
Designing an IAM Framework with Oracle Identity and Access Management Suite |
3.N |
SCHNEIER, BRUCE |
Applied Cryptography: Protocols, Algorithms, and Source Code in C |
3.N |
SCHNEIER, BRUCE |
E-Mail Security: How to Keep Your Electronic Messages Private |
3.N |
SCHNEIER, BRUCE |
the Electronic Privacy Papers: Documents in the Age of Surveillance |
3.N |
SCHOENFIELD, BROOK S.E. |
Securing Systems: Applied Security Architecture and Threat Models |
3.N |
SCHÖLER, SABINE |
CobiT and the Sarbanes-Oxley Act: The SOX Guide for SAP Operations |
3.N |
SCHOU, COREY |
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies |
3.N |
SCN |
SCN 2008: Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings |
3.N |
SCOTT, CHARLIE |
Virtual Private Networks |
3.N |
SCOTT, CHARLIE |
Virtual Private Networks |
3.N |
SECURITY |
Security and Privacy |
3.N |
SECURITY PROTOCOLS |
Security Protocols 1996: Security Protocols: International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings |
3.N |
SECURITY PROTOCOLS |
Security Protocols 1997: Security Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings |
3.N |
SECURITY PROTOCOLS |
Security Protocols 1998: 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings |
3.N |
SECURITY PROTOCOLS |
Security Protocols 1999: Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings |
3.N |
SECURITY PROTOCOLS |
Security Protocols 2005: 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers |
3.N |
SENFT, SANDRA |
Information Technology Control and Audit |
3.N |
SERGIENKO, ALEXANDER V |
Quantum Communications and Cryptography |
3.N |
SETA |
SETA 2006: Sequences and Their Applications: 4th International Conference, Beijing, China, September 24-28, 2006: proceedings |
3.N |
SETA |
SETA 2008: Sequences and Their Applications - SETA 2008: 5th International Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings |
3.N |
SHACKLEFORD, DAVE |
Virtualization Security: Protecting Virtualized Environments |
3.N |
SHOSTACK, ADAM |
Threat Modeling: Designing for Security |
3.N |
SIBERIUS, JEFFREY |
Blockchain: The Complete Guide To Understanding The Technology Behind Cryptocurrency |
3.N |
SILVERMAN, JOSEPH H |
Advanced Topics in the Arithmetic of Elliptic Curves |
3.N |
SILVERMAN, JOSEPH H |
The Arithmetic of Elliptic Curves |
3.N |
SIMMONS, GUSTAVUS J |
Contemporary Cryptology: The Science of Information Integrity |
3.N |
SIMONDS, FRED |
Network Security: Data and Voice Communications |
3.N |
SINGH, SIMON |
Koodikirja: Salakirjoituksen historia muinaisesta Egyptistä kvanttikryptografiaan |
3.N |
SMALLWOOD, ROBERT F. |
Information Governance: Concepts, Strategies and Best Practices |
3.N |
SMITH, GEORGE C. |
The Virus Creation Labs: A Journey Into the Underground |
3.N |
SMITH, ROBERT |
SOX Compliance: The Definitive IT Policy and Procedure Development Gude |
3.N |
SNOOK, ANDY |
Netsuite Security and Audit Field Manual |
3.N |
SOBE, ANITA |
Single Sign-On in IMS-Based IPTV Systems: Towards the Interworking of the Generic Bootstrapping Architecture and Liberty Alliance Indentity Federation |
3.N |
SOOD, ADITYA K. |
Targeted Cyber Attacks: Multi-staged Attacks Driben by Exploits and Malware |
3.N |
SPASOVSKI, MARTIN |
OAuth 2.0 Identity and Access Management Patterns: A practical hands-on guide to implementing secure API authorization flow scenarios with OAuth 2.0 |
3.N |
SSC |
SSC 2007: Sequences, Subsequences, and Consequences: International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers |
3.N |
STAHNKE, MICHAEL |
Pro OpenSSH |
3.N |
STALLINGS, WILLIAM |
Cryptography and Network Security: Principles and Practice |
3.N |
STC |
STC '07: Scalable Trusted Computing: Proceedings of the 2007 ACM Workshop |
3.N |
STEIN, THOMAS |
Intrusion Detection System Evasion durch Angriffsverschleierung in Exploiting Frameworks |
3.N |
STEWART, IAN |
Galois Theory |
3.N |
STEWART, JAMES MICHAEL |
CISSP: Certified Information Systems Security Professional Study Guide |
3.N |
STIENNON, RICHARD |
Surviving Cyberwar |
3.N |
STIENNON, RICHARD |
There Will Be Cyberwar: How the Move to Network-Centric Warfighting Set The Stage For Cyberwar |
3.N |
STINSON, DOUGLAS R |
Cryptography: Theory and Practice |
3.N |
STORAGESS |
StorageSS '05: Proceedings of the 2005 ACM Workshop on Storage Security and Survivability: Fairfax, Virginia, USA , November 11, 2005, (co-located with CSS 2005) |
3.N |
STORAGESS |
StorageSS '07: Proceedings of the 2007 ACM Workshop on Storage Security and Survivability: Alexandria, Virginia, USA, October 29, 2007 |
3.N |
SUOMEN AUTOMAATIOSEURA |
Automaation tietoturva: Kriittisen tuotannon turvaaminen |
3.N |
SZOR, PETER |
The Art of Computer Virus Research and Defense |
3.N |
TALABIS, MARK RYAN M. |
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis |
3.N |
TALBOT, JULIAN |
Security Risk Management: Body of Knowledge |
3.N |
TAPSCOTT, DON |
Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World |
3.N |
TARAKANOV, A. O. |
Immunocomputing: Principles and Applications |
3.N |
TCC |
TCC 2004: Theory of Cryptography: 1st Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 2004: proceedings |
3.N |
TCC |
TCC 2005: Theory of Cryptography: 2nd Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005: proceedings |
3.N |
TCC |
TCC 2006: Theory of Cryptography: 3rd Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006: proceedings |
3.N |
TCC |
TCC 2007: Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007: proceedings |
3.N |
TECUCI, GHEORGHE |
Intelligence Analysis as Discovery of Evidence, Hypotheses, and Arguments |
3.N |
THERMOS, PETER |
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures |
3.N |
THURAISINGHAM, BHAVANI M |
Database Security, VI: Status and Prospects: Results of the IFIP WG 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August, 1992 |
3.N |
TODOROV, DOBROMIR |
Mechanics of User Identification and Authentication: Fundamentals of Identity Management |
3.N |
TRANSACTIONS |
Transactions on Data Hiding and Multimedia Security II |
3.N |
TRAPPE, WADE |
Introduction to Cryptography: With Coding Theory |
3.N |
TREC |
TREC 1998: Trends in Distributed Systems for Electronic Commerce: International IFIP/GI Working Conference, TREC'98, Hamburg, Germany, June 3-5, 1998, Proceedings |
3.N |
TRIM, PETER |
Cyber Security Management: A Governance, Risk and Compliance Framework |
3.N |
TRUST |
TRUST 2008: Trusted Computing - Challenges and Applications: First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, Villach, Austria, March 11-12, 2008, Proceedings |
3.N |
TRUSTBUS |
TrustBus 2007: Trust, Privacy and Security in Digital Business: 4th International Conference, Trustbus 2007, Regensburg, Germany, September 3-7, 2007, proceedings |
3.N |
TRUSTBUS |
TrustBus 2008: Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings |
3.N |
UMAÑA, VALÉRIE GAUTHIER |
Post-Quantum Cryptography: Code-based Cryptography and Hash Based Signatures Schemes |
3.N |
USS 1992 |
USENIX Security Symposium 1992: Baltimore, Maryland, September 14-16, 1992: proceedings |
3.N |
USS 1993 |
USENIX Security Symposium 1993: October 4-5, 1993, Santa Clara, California: proceedings |
3.N |
USS 1995 |
USENIX Security Symposium 1995: June 5-7, 1995, Salt Lake City, Utah, USA |
3.N |
USS 1996 |
USENIX Security Symposium 1996: July 22-25, 1996, San Jose, California |
3.N |
USS 1998 |
USENIX Security Symposium 1998: January 26-29, 1998, San Antonio, Texas |
3.N |
USS 1999 |
USENIX Security Symposium 1999: August 23-26, 1999, Washington, D.C., USA |
3.N |
USS 2000 |
USENIX Security Symposium 2000: August 14-17, 2000, Denver, Colorado, USA |
3.N |
USS 2002 |
USENIX Security Symposium 2002: August 5-9, 2002, San Francisco, CA, USA |
3.N |
USS 2003 |
USENIX Security Symposium 2003: August 4-8, 2003, Washington, D.C., USA |
3.N |
USS 2004 |
USENIX Security Symposium 2004: August 9-13, 2004, San Diego, CA, USA |
3.N |
USS 2005 |
USENIX Security Symposium 2005: July 31-August 5, 2005, Baltimore, MD, USA |
3.N |
USS 2006 |
USENIX Security Symposium 2006: July 31 - August 4, 2006, Vancouver, B.C., Canada |
3.N |
VAN ASSCHE, GILLES |
Quantum Cryptography and Secret-Key Distillation |
3.N |
VIETCYRPT |
VIETCRYPT 2006: Progress in Cryptology: 1st International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006: revised selected papers |
3.N |
VIGNA, GIOVANNI |
Mobile Agents and Security |
3.N |
VITEK, JAN |
Secure Internet Programming: Security Issues for Mobile and Distributed Objects |
3.N |
VIZSEC |
VizSec 2008: Visualization for Computer Security: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings |
3.N |
VIZSEC/DMSEC |
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, October 29, 2004, co-located with CCS 2004 |
3.N |
VOTE-ID |
VOTE-ID 2007: E-Voting and Identity: 1st International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007: revised selected papers |
3.N |
WAGSTAFF, SAMUEL S |
Cryptanalysis of Number Theoretic Ciphers |
3.N |
WAIFI |
WAIFI 2007: Arithmetic of Finite Fields: First International Workshop, WAIFI 2007, Madrid, Spain, June 2007: proceedings |
3.N |
WAIFI |
WAIFI 2008: Arithmetic of Finite Fields: 2nd International Workshop, WAIFI 2008, Siena, Italy, July 6-9, 2008, Proceedings |
3.N |
WALKER, BRUCE JAMES |
Computer Security and Protection Structures |
3.N |
WALKER, JOHN |
The Digital Imprimatur: How Big Brother and Big Media can put the Internet Genie Back in the Bottle |
3.N |
WASHINGTON, LAWRENCE C |
Elliptic Curves: Number Theory and Cryptography |
3.N |
WEISS, MARTIN M. |
Auditing IT Infrastructure for Compliance |
3.N |
WESTERMAN, GEORGE |
IT Risk: Turning Business Threats into Competitive Advantage |
3.N |
WHEELER, EVAN |
Security Risk Management: Building and Information Security Risk Management Program from the Groung Up |
3.N |
WHITMAN, MICHEAL |
Management of Information Security |
3.N |
WILLIAMS, BARRY L. |
Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 |
3.N |
WILLIAMS, BRANDEN R. |
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance |
3.N |
WILLIAMS, BRANDEN R. |
PCI DSS 3.1: The Standard That Killed SSL |
3.N |
WILLIAMSON, GRAHAM |
Identity Management: A Primer |
3.N |
WILSON, S.H |
Quick Look Report |
3.N |
WINDLEY, PHILLIP J. |
Digital Identity |
3.N |
WINKLER, VIC (J.R.) |
Securing the Cloud: Cloud Computer Security Techniques and Tactics |
3.N |
WISA |
WISA 2006: Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006: revised selected papers |
3.N |
WISA |
WISA 2007: Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers |
3.N |
WISE |
WISe 2002: Wireless Security: Proceedings of the 2002 ACM Workshop on Wireless Security. Co-located with MobiCom 2002 conference: September 28, 2002, Atlanta, Georgia, USA. |
3.N |
WISE |
WISe 2003: Wireless Security: Proceedings of the 2003 ACM Workshop on Wireless Security. Co-located with MobiCom 2003 Conference. September 19, 2003, California, USA |
3.N |
WISE |
WISe 2004: Wireless Security: Proceedings of the 2004 ACM Workshop on Wireless Security: Co-Located with MobiCom 2004 Conference, October 1, 2004, Philadelphia, Pennsylvania, USA |
3.N |
WISE |
WISe 2005: Wireless Security: Proceedings of the 2005 ACM Workshop on Wireless Security. Co-Located with MobiCom 2005 Conference. September 2, 2005, Cologne, Germany |
3.N |
WISEC |
WiSec 2008: Proceedings of the First ACM Conference on Wireless Network Security: Alexandria, Virginia, USA, March 31 - April 2, 2008 |
3.N |
WISEC |
WiSec 2009: Proceedings of the Second ACM Conference on Wireless Network Security: Zurich, Switzerland, March 16-18, 2009 |
3.N |
WISEC |
WiSec 2010: Proceedings of the Third ACM Conference on Wireless Network Security: WiSec'10: March 22-24, 2010, Hoboken, New Jersey, USA |
3.N |
WISTP |
WISTP 2007: Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007: proceedings |
3.N |
WISTP |
WISTP 2008: Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008, Proceedings |
3.N |
WITHINGTON, P TUCKER |
The Trusted Function in Secure Decentralized Processing |
3.N |
WOBST, REINHARD |
Cryptology Unlocked |
3.N |
WOFSEY, MARVIN M |
Advances in Computer Security Management: Volume 2 |
3.N |
WOOD, MICHAEL B |
Introducing Computer Security |
3.N |
WORM |
WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode: Washington, DC, USA, October 27, 2003 |
3.N |
WORM |
WORM '04: Proceedings of the 2004 ACM Workshop on Rapid Malcode, Washington, DC, USA, October 29, 2004, co-located with CSS 2004 |
3.N |
WORM |
WORM '05: Proceedings of the 2005 ACM Workshop on Rapid Malcode, November 11, 2005, Fairfax, Virginia, USA, co-located with CCS 2005 |
3.N |
WPES |
WPES '02: Privacy in the Electronic Society: Washington, DC, USA, November 21, 2002,: (in association with 9th ACM Conference on Computer and Communications Security) |
3.N |
WPES |
WPES '03: Privacy in the Electronic Society: Washington, DC, USA, October 30, 2003: co-located with CCS '03 |
3.N |
WPES |
WPES '04: Privacy in the Electronic Society: Washington, DC, USA, October 28, 2004: co-located with CCS 2004 |
3.N |
WPES |
WPES '05: Privacy in the Electronic Society: Alexandria, Virginia, USA, November 7, 2005 (co-located with CCS 2005) |
3.N |
WPES |
WPES '07: Privacy in the Electronic Society: Alexandria, Virginia, USA, October 29, 2007, |
3.N |
WRIGHT, STEVE |
PCI DSS: A Practical Guide to Implementing and Maintaining Compliance |
3.N |
XML SECURITY |
XML SECURITY: Proceedings of the ACM Workshop on XML Security 2003: In Association with 10th ACM Conference on Computer and Communications Security: Fairfax, VA, USA, October 31, 2003. |
3.N |
YAN, SONG Y |
Primality Testing and Integer Factorization in Public-Key Cryptography |
3.N |
YAN, SONG Y. |
Quantum Attacks on Public-Key Cryptosystems |
3.N |
YELURI, RAGHU |
Building the Infrastructure for Cloud Security |
3.N |
YOUNG, ADAM L |
Malicious Cryptography: Exposing Cryptovirology |
3.N |
ZHU, SHAO YING |
Guide to Security Assurance for Cloud Computing |
3.N |
ZIEGLER, ROBERT L. |
Linux Firewalls |
3.N |
ZWICKY, ELIZABETH D. |
Building Internet Firewalls |