Systems and Data Security
Resource Information
The concept Systems and Data Security represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
The Resource
Systems and Data Security
Resource Information
The concept Systems and Data Security represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
- Label
- Systems and Data Security
A sample of Items that share the Concept Systems and Data Security See All
Context
Context of Systems and Data SecuritySubject of
No resources found
No enriched resources found
- AI 2017: Advances in Artificial Intelligence : 30th Australasian Joint Conference, Melbourne, VIC, Australia, August 19?20, 2017, Proceedings
- Ad Hoc Networks : 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers
- Ad Hoc Networks : 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings
- Ad Hoc Networks : 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers
- Ad-hoc, Mobile, and Wireless Networks : 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedings
- Ad-hoc, Mobile, and Wireless Networks : 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings
- Advanced Computing and Systems for Security : Volume 1
- Advanced Computing and Systems for Security : Volume 2
- Advanced Computing and Systems for Security : Volume Five
- Advanced Computing and Systems for Security : Volume Four
- Advanced Computing and Systems for Security : Volume Six
- Advanced Computing and Systems for Security : Volume Three
- Advanced Concepts for Intelligent Vision Systems : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings
- Advanced Hybrid Information Processing : First International Conference, ADHIP 2017, Harbin, China, July 17?18, 2017, Proceedings
- Advanced Information Systems Engineering Workshops : CAiSE 2014 International Workshops, Thessaloniki, Greece, June 16-20, 2014. Proceedings
- Advanced Information Systems Engineering Workshops : CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings
- Advanced Monitoring in P2P Botnets : A Dual Perspective
- Advanced Research on Electronic Commerce, Web Application, and Communication : International Conference, ECWAC 2011, Guangzhou, China, April 16-17, 2011. Proceedings, Part I
- Advanced persistent training : take your security awareness program to the next level
- Advances in Computer Science - ASIAN 2007. Computer and Network Security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings
- Advances in Computer Science and Ubiquitous Computing : CSA & CUTE
- Advances in Cryptology - ASIACRYPT 2011 : 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
- Advances in Cryptology - ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
- Advances in Cryptology - ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
- Advances in Cryptology - CRYPTO 2013 : 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I
- Advances in Cryptology - CRYPTO 2013 : 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II
- Advances in Cryptology - CRYPTO 2014 : 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I
- Advances in Cryptology - CRYPTO 2014 : 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II
- Advances in Cryptology - EUROCRYPT 2013 : 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings
- Advances in Cryptology - EUROCRYPT 2014 : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings
- Advances in Cryptology - EUROCRYPT 2015 : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II
- Advances in Cryptology -- CRYPTO 2015 : 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I
- Advances in Cryptology -- CRYPTO 2015 : 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II
- Advances in Cryptology -- EUROCRYPT 2015 : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I
- Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II
- Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I
- Advances in Cryptology ? ASIACRYPT 2015 : 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 ? December 3, 2015, Proceedings, Part I
- Advances in Cryptology ? ASIACRYPT 2016 : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I
- Advances in Cryptology ? ASIACRYPT 2016 : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II
- Advances in Cryptology ? CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I
- Advances in Cryptology ? CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II
- Advances in Cryptology ? CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III
- Advances in Cryptology ? CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20?24, 2017, Proceedings, Part I
- Advances in Cryptology ? CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20?24, 2017, Proceedings, Part II
- Advances in Cryptology ? CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20?24, 2017, Proceedings, Part III
- Advances in Cryptology ? EUROCRYPT 2016 : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I
- Advances in Cryptology ? EUROCRYPT 2016 : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II
- Advances in Cryptology ? EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 ? May 4, 2017, Proceedings, Part I
- Advances in Cryptology ? EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 ? May 4, 2017, Proceedings, Part II
- Advances in Cryptology ? EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 ? May 4, 2017, Proceedings, Part III
- Advances in Digital Forensics IX : 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers
- Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers
- Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers
- Advances in Digital Forensics XII : 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers
- Advances in Digital Forensics XIII : 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers
- Advances in Human Factors in Cybersecurity : Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USA
- Advances in Human Factors in Cybersecurity : Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17?21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA
- Advances in Information and Computer Security : 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings
- Advances in Information and Computer Security : 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings
- Advances in Information and Computer Security : 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 ? September 1, 2017, Proceedings
- Advances in Information and Computer Security : 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings
- Advances in Information and Computer Security : 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
- Advances in Information and Computer Security : 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
- Advances in Multimedia Information Processing ? PCM 2017 : 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part I
- Advances in Multimedia Information Processing ? PCM 2017 : 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part II
- Advances in Neural Networks - ISNN 2017 : 14th International Symposium, ISNN 2017, Sapporo, Hakodate, and Muroran, Hokkaido, Japan, June 21?26, 2017, Proceedings, Part I
- Advances in Neural Networks - ISNN 2017 : 14th International Symposium, ISNN 2017, Sapporo, Hakodate, and Muroran, Hokkaido, Japan, June 21?26, 2017, Proceedings, Part II
- Advances in Neural Networks ? ISNN 2016 : 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedings
- Advances in Neural Networks ? ISNN 2018 : 15th International Symposium on Neural Networks, ISNN 2018, Minsk, Belarus, June 25?28, 2018, Proceedings
- Advances in Parallel and Distributed Computing and Ubiquitous Services : UCAWSN & PDCAT 2015
- Advances in Security of Information and Communication Networks : First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings
- Advances in User Authentication
- Advances in Visual Computing : 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part I
- Advances in Visual Computing : 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part II
- Algorithms and Applications : ALAP 2018
- Ambient Intelligence : 13th European Conference, AmI 2017, Malaga, Spain, April 26?28, 2017, Proceedings
- Android Application Security : A Semantics and Context-Aware Approach
- Applications and Techniques in Information Security : 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedings
- Applications and Techniques in Information Security : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings
- Applications and Techniques in Information Security : 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings
- Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6?7, 2017, Proceedings
- Applied Cryptography and Network Security : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
- Applied Cryptography and Network Security : 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
- Applied Cryptography and Network Security : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
- Applied Cryptography and Network Security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers
- Applied Cryptography and Network Security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings
- Applied Cryptography and Network Security : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings
- Applied Cryptography and Network Security : 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
- Architecting User-Centric Privacy-as-a-Set-of-Services : Digital Identity-Related Privacy Framework
- Aspect-Oriented Security Hardening of UML Design Models
- Automated Technology for Verification and Analysis : 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings
- Autonomic and Trusted Computing : 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011. Proceedings
- Autonomous Agents and Multiagent Systems : AAMAS 2016 Workshops, Visionary Papers, Singapore, Singapore, May 9-10, 2016, Revised Selected Papers
- Availability, Reliability, and Security in Information Systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings
- BNAIC 2016: Artificial Intelligence : 28th Benelux Conference on Artificial Intelligence, Amsterdam, The Netherlands, November 10-11, 2016, Revised Selected Papers
- Beginning ethical hacking with Python
- Big Data Concepts, Theories, and Applications
- Big Digital Forensic Data : Volume 1: Data Reduction Framework and Selective Imaging
- Big Digital Forensic Data : Volume 2: Quick Analysis for Evidence and Intelligence
- Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
- Biometric Security and Privacy : Opportunities & Challenges in The Big Data Era
- Blockchain ? ICBC 2018 : First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
- Building Secure Defenses Against Code-Reuse Attacks
- Building an Effective IoT Ecosystem for Your Business
- Cloud Computing ? CLOUD 2018 : 11th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25?30, 2018, Proceedings
- Cloud Computing and Services Science : 6th International Conference, CLOSER 2016, Rome, Italy, April 23-25, 2016, Revised Selected Papers
- Cloud Infrastructures, Services, and IoT Systems for Smart Cities : Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, April 20?21, 2017, Proceedings
- Codes, Cryptology, and Information Security : First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger
- Combinatorial Algorithms : 28th International Workshop, IWOCA 2017, Newcastle, NSW, Australia, July 17-21, 2017, Revised Selected Papers
- Combinatorial Algorithms : 29th International Workshop, IWOCA 2018, Singapore, July 16?19, 2018, Proceedings
- Communication Systems and Networks : 9th International Conference, COMSNETS 2017, Bengaluru, India, January 4?8, 2017, Revised Selected Papers and Invited Papers
- Communications and Multimedia Security : 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings
- Communications and Multimedia Security : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings
- Communications and Multimedia Security : 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings
- Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 ? 25, 2017, Revised Selected Papers, Part I
- Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 ? 25, 2017, Revised Selected Papers, Part II
- Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications : 5th International Symposium, CompIMAGE 2016, Niagara Falls, NY, USA, September 21-23, 2016, Revised Selected Papers
- Computational Science ? ICCS 2018 : 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part II
- Computational Science ? ICCS 2018 : 18th International Conference, Wuxi, China, June 11?13, 2018 Proceedings, Part III
- Computational Science ? ICCS 2018 : 18th International Conference, Wuxi, China, June 11?13, 2018, Proceedings, Part I
- Computer Communication, Networking and Internet Security : Proceedings of IC3T 2016
- Computer Network Security : 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings
- Computer Networks : 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012. Proceedings
- Computer Networks and Distributed Systems : International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers
- Computer Safety, Reliability, and Security : 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings
- Computer Safety, Reliability, and Security : 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014. Proceedings
- Computer Safety, Reliability, and Security : 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015, Proceedings
- Computer Safety, Reliability, and Security : 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings
- Computer Safety, Reliability, and Security : 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings
- Computer Safety, Reliability, and Security : SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014. Proceedings
- Computer Safety, Reliability, and Security : SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings
- Computer Safety, Reliability, and Security : SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings
- Computer Security - ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings
- Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
- Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
- Computer Security -- ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
- Computer Security : ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers
- Computer Security ? ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I
- Computer Security ? ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II
- Computer Security ? ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I
- Computer Security ? ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II
- Computer Vision ? ACCV 2016 Workshops : ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part I
- Computer Vision ? ACCV 2016 Workshops : ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part II
- Computer Vision ? ACCV 2016 Workshops : ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part III
- Connected Environments for the Internet of Things : Challenges and Solutions
- Constructive Side-Channel Analysis and Secure Design : 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers
- Constructive Side-Channel Analysis and Secure Design : 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers
- Constructive Side-Channel Analysis and Secure Design : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers
- Constructive Side-Channel Analysis and Secure Design : 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers
- Constructive Side-Channel Analysis and Secure Design : 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers
- Constructive Side-Channel Analysis and Secure Design : 9th International Workshop, COSADE 2018, Singapore, April 23?24, 2018, Proceedings
- Continued Rise of the Cloud : Advances and Trends in Cloud Computing
- Convergence and Hybrid Information Technology : 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings
- Convergence and Hybrid Information Technology : 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings
- Counterterrorism and Cybersecurity : Total Information Awareness
- Critical Information Infrastructure Security : 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers
- Critical Information Infrastructures Security : 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers
- Critical Information Infrastructures Security : 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers
- Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers
- Critical Infrastructure Protection IX : 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers
- Critical Infrastructure Protection VII : 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers
- Critical Infrastructure Protection VIII : 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers
- Critical Infrastructure Protection X : 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers
- Cryptanalytic Attacks on RSA
- Cryptographic Hardware and Embedded Systems ? CHES 2014 : 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings
- Cryptographic Hardware and Embedded Systems ? CHES 2016 : 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings
- Cryptography and Coding : 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings
- Cryptography and Coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings
- Cryptography and Coding : 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
- Cryptography and Coding : 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings
- Cryptography and Coding : 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings
- Cryptography and Information Security in the Balkans : First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers
- Cryptography and Information Security in the Balkans : Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers
- Cryptography and Security Systems : Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings
- Cryptology and Network Security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings
- Cryptology and Network Security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings
- Cryptology and Network Security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings
- Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings
- Cryptology and Network Security : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings
- Current Trends in Web Engineering : ICWE 2016 International Workshops, DUI, TELERISE, SoWeMine, and Liquid Web, Lugano, Switzerland, June 6-9, 2016. Revised Selected Papers
- Cyber Deception : Building the Scientific Foundation
- Cyber Denial, Deception and Counter Deception : A Framework for Supporting Active Cyber Defense
- Cyber Security : Proceedings of CSI 2015
- Cyber Security : Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers
- Cyber Security Cryptography and Machine Learning : First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings
- Cyber Security Cryptography and Machine Learning : Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21?22, 2018, Proceedings
- Cyber Security and Privacy : 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers
- Cyber Security and Privacy : Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers
- Cyber Security and Privacy : Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers
- Cyber Security: Analytics, Technology and Automation
- Cyber Security: Power and Technology
- Cyber Warfare : Building the Scientific Foundation
- Cyber-Risk Management
- Cyber-security of SCADA and Other Industrial Control Systems
- Cyberpatterns : Unifying Design Patterns with Security and Attack Patterns
- Cybersecurity Systems for Human Cognition Augmentation
- Cybersecurity for Industry 4.0 : Analysis for Design and Manufacturing
- Cybersecurity in Germany
- Cybersecurity in Israel
- Cybersecurity in Switzerland
- Cyberspace Safety and Security : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings
- Cyberspace Safety and Security : 9th International Symposium, CSS 2017, Xi?an China, October 23?25, 2017, Proceedings
- Cyberterrorism : Understanding, Assessment, and Response
- Data Management Technologies and Applications : 6th International Conference, DATA 2017, Madrid, Spain, July 24?26, 2017, Revised Selected Papers
- Data Privacy Management and Autonomous Spontaneous Security : 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers
- Data Privacy Management and Security Assurance : 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
- Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance : 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers
- Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings
- Data Privacy Management, and Security Assurance : 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers
- Data and Applications Security and Privacy XXIX : 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings
- Data and Applications Security and Privacy XXVII : 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings
- Data and Applications Security and Privacy XXVIII : 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings
- Data and Applications Security and Privacy XXXI : 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings
- Data and Applications Security and Privacy XXXII : 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16?18, 2018, Proceedings
- Database and Expert Systems Applications : 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017, Proceedings, Part I
- Database and Expert Systems Applications : 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017, Proceedings, Part II
- Decision and Game Theory for Security : 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings
- Decision and Game Theory for Security : 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings
- Decision and Game Theory for Security : 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings
- Decision and Game Theory for Security : 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings
- Decision and Game Theory for Security : 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings
- Decision and Game Theory for Security : Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings
- Designing Usable and Secure Software with IRIS and CAIRIS
- Designing for a Digital and Globalized World : 13th International Conference, DESRIST 2018, Chennai, India, June 3?6, 2018, Proceedings
- Detecting Peripheral-based Attacks on the Host Memory
- Detection of Intrusions and Malware, and Vulnerability Assessment : 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings
- Detection of Intrusions and Malware, and Vulnerability Assessment : 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings
- Detection of Intrusions and Malware, and Vulnerability Assessment : 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings
- Detection of Intrusions and Malware, and Vulnerability Assessment : 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings
- Detection of Intrusions and Malware, and Vulnerability Assessment : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings
- Detection of Intrusions and Malware, and Vulnerability Assessment : 15th International Conference, DIMVA 2018, Saclay, France, June 28?29, 2018, Proceedings
- Detection of Intrusions and Malware, and Vulnerability Assessment : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers
- Differential Privacy and Applications
- Digital Defense : A Cybersecurity Primer
- Digital Fingerprinting
- Digital Forensics and Cyber Crime : 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers
- Digital Forensics and Cyber Crime : 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6?8, 2015, Revised Selected Papers
- Digital Forensics and Cyber Crime : 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings
- Digital Forensics and Cyber Crime : Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers
- Digital Forensics and Cyber Crime : Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers
- Digital Forensics and Watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers
- Digital Forensics and Watermarking : 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers
- Digital Forensics and Watermarking : 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings
- Digital Watermarking : Techniques and Trends
- Digital-Forensics and Watermarking : 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers
- Digital-Forensics and Watermarking : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers
- Digital-Forensics and Watermarking : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers
- Distributed Computing and Internet Technology : 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11?13, 2018, Proceedings
- Distributed Computing and Networking : 13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012. Proceedings
- Distributed Computing and Networking : 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014. Proceedings
- Dynamic Logic. New Trends and Applications : First International Workshop, DALI 2017, Brasilia, Brazil, September 23-24, 2017, Proceedings
- E-Business and Telecommunications : 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papers
- E-Democracy ? Citizen Rights in the World of the New Computing Paradigms : 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings
- E-Democracy, Security, Privacy and Trust in a Digital World : 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers
- E-Voting and Identify : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings
- E-Voting and Identity : 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings
- Economics of Grids, Clouds, Systems, and Services : 13th International Conference, GECON 2016, Athens, Greece, September 20-22, 2016, Revised Selected Papers
- Edge Computing ? EDGE 2018 : Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
- Electronic Government : 16th IFIP WG 8.5 International Conference, EGOV 2017, St. Petersburg, Russia, September 4-7, 2017, Proceedings
- Electronic Identity
- Electronic Voting : First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings
- Electronic Voting : Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings
- Elements of Cloud Computing Security : A Survey of Key Practicalities
- Elements of Cloud Storage Security : Concepts, Designs and Optimized Practices
- Emerging Technologies in Computing : First International Conference, iCETiC 2018, London, UK, August 23?24, 2018, Proceedings
- Encrypted Email : The History and Technology of Message Privacy
- Encyclopedia of Biometrics
- Engineering Psychology and Cognitive Ergonomics : 15th International Conference, EPCE 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings
- Engineering Secure Future Internet Services and Systems : Current Research
- Engineering Secure Software and Systems : 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings
- Enhanced Quality of Life and Smart Living : 15th International Conference, ICOST 2017, Paris, France, August 29-31, 2017, Proceedings
- Evolution of Cyber Technologies and Operations to 2035
- Fast Software Encryption : 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers
- Fast Software Encryption : 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers
- Fast Software Encryption : 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers
- Fast Software Encryption : 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers
- Financial Cryptography and Data Security : 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers
- Financial Cryptography and Data Security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers
- Financial Cryptography and Data Security : 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
- Financial Cryptography and Data Security : 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers
- Financial Cryptography and Data Security : 20th International Conference, FC 2016, Christ Church, Barbados, February 22?26, 2016, Revised Selected Papers
- Financial Cryptography and Data Security : FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers
- Financial Cryptography and Data Security : FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers
- Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers
- Financial Cryptography and Data Security : FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers
- Formal Techniques for Distributed Objects, Components, and Systems : 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings
- Foundations and Practice of Security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers
- Foundations and Practice of Security : 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers
- Foundations and Practice of Security : 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers
- Foundations and Practice of Security : 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers
- Foundations of Security Analysis and Design VII : FOSAD 2012/2013 Tutorial Lectures
- Foundations of Security Analysis and Design VIII : FOSAD 2014/2015/2016 Tutorial Lectures
- Fraud Prevention in Online Digital Advertising
- Frontiers in Internet Technologies : Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers
- Frontiers in Internet Technologies : Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers
- Fundamental Computing Forensics for Africa : A Case Study of the Science in Nigeria
- Fundamentals of Digital Forensics : Theory, Methods, and Real-Life Applications
- Fundamentals of Network Forensics : A Research Perspective
- Fundamentals of Secure System Modelling
- Fundamentals of Sketch-Based Passwords : A General Framework
- Future Access Enablers for Ubiquitous and Intelligent Infrastructures : Third International Conference, FABULOUS 2017, Bucharest, Romania, October 12-14, 2017, Proceedings
- Future Business Software : Current Trends in Business Software Development
- Future Network Systems and Security : 4th International Conference, FNSS 2018, Paris, France, July 9?11, 2018, Proceedings
- Future Network Systems and Security : First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings
- Future Network Systems and Security : Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings
- Game Theoretic Analysis of Congestion, Safety and Security : Networks, Air Traffic and Emergency Departments
- Game Theoretic Analysis of Congestion, Safety and Security : Traffic and Transportation Theory
- Geometric Science of Information : Third International Conference, GSI 2017, Paris, France, November 7-9, 2017, Proceedings
- Global Security, Safety and Sustainability & e-Democracy : 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers
- Global Security, Safety and Sustainability - The Security Challenges of the Connected World : 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings
- Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security : 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings
- Graphical Models for Security : 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers
- Graphical Models for Security : Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers
- Graphical Models for Security : Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers
- Group-target Tracking
- Guide to Security Assurance for Cloud Computing
- Handbook on Data Centers
- Hardware IP Security and Trust
- Honeypot Frameworks and Their Applications: A New Framework
- Human Aspects of IT for the Aged Population. Acceptance, Communication and Participation : 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15?20, 2018, Proceedings, Part I
- Human Aspects of IT for the Aged Population. Aging, Design and User Experience : Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part I
- Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment : 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15?20, 2018, Proceedings, Part II
- Human Aspects of IT for the Aged Population. Applications, Services and Contexts : Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part II
- Human Interface and the Management of Information. Information in Applications and Services : 20th International Conference, HIMI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II
- Human-Computer Interaction. Interaction Technologies : 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15?20, 2018, Proceedings, Part III
- Human-Computer Interaction. Interaction in Context : 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15?20, 2018, Proceedings, Part II
- Human-Computer Interaction. Theories, Methods, and Human Issues : 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15?20, 2018, Proceedings, Part I
- ICT Systems Security and Privacy Protection : 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings
- ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
- ICT Systems Security and Privacy Protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings
- ICT and Society : 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014. Proceedings
- ISSE 2009 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2009 Conference
- ISSE 2015 : Highlights of the Information Security Solutions Europe 2015 Conference
- IT Convergence and Security 2017 : Volume 1
- IT Convergence and Security 2017 : Volume 2
- Image and Signal Processing : 8th International Conference, ICISP 2018, Cherbourg, France, July 2-4, 2018, Proceedings
- Image and Video Technology : PSIVT 2017 International Workshops, Wuhan, China, November 20-24, 2017, Revised Selected Papers
- Industrial IoT Technologies and Applications : International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26, 2016, Revised Selected Papers
- Industrial IoT Technologies and Applications : Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25?26, 2017, Proceedings
- Information Assurance and Security Education and Training : 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers
- Information Fusion for Cyber-Security Analytics
- Information Science and Applications (ICISA) 2016
- Information Science and Applications 2017 : ICISA 2017
- Information Security : 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings
- Information Security : 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings
- Information Security : 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings
- Information Security : 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings
- Information Security Applications : 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers
- Information Security Applications : 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers
- Information Security Applications : 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers
- Information Security Applications : 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers
- Information Security Applications : 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers
- Information Security Education Across the Curriculum : 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings
- Information Security Education for a Global Digital Society : 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings
- Information Security Practice and Experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
- Information Security Practice and Experience : 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings
- Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings
- Information Security Practice and Experience : 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13?15, 2017, Proceedings
- Information Security Practice and Experience : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings
- Information Security Practices : Emerging Threats and Perspectives
- Information Security Technology for Applications : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers
- Information Security Technology for Applications : 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
- Information Security Theory and Practice : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26?27, 2016, Proceedings
- Information Security Theory and Practice : 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28?29, 2017, Proceedings
- Information Security Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24?25, 2015 Proceedings
- Information Security Theory and Practice. Securing the Internet of Things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings
- Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems : 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
- Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
- Information Security and Cryptology - ICISC 2012 : 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers
- Information Security and Cryptology - ICISC 2014 : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers
- Information Security and Cryptology - ICISC 2015 : 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers
- Information Security and Cryptology -- ICISC 2013 : 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers
- Information Security and Cryptology : 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers
- Information Security and Cryptology : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3?5, 2017, Revised Selected Papers
- Information Security and Cryptology ? ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30 ? December 2, 2016, Revised Selected Papers
- Information Security and Cryptology ? ICISC 2017 : 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers
- Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
- Information Security and Privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
- Information Security and Privacy : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
- Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings
- Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I
- Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II
- Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3?5, 2017, Proceedings, Part I
- Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3?5, 2017, Proceedings, Part II
- Information Security and Privacy : 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings
- Information Security of Highly Critical Wireless Networks
- Information Systems Security : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings
- Information Systems Security : 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings
- Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings
- Information Systems Security : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
- Information Systems Security and Privacy : First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers
- Information Systems Security and Privacy : Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers
- Information Systems Security and Privacy : Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers
- Information Technolog: New Generations : 13th International Conference on Information Technology
- Information Theoretic Security : 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings
- Information Theoretic Security : 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
- Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers
- Information and Communication Technology : Proceedings of ICICT 2016
- Information and Communication Technology : Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings
- Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
- Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
- Information and Communications Security : 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
- Information and Communications Security : 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers
- Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
- Innovative Security Solutions for Information Technology and Communications : 10th International Conference, SecITC 2017, Bucharest, Romania, June 8?9, 2017, Revised Selected Papers
- Integration, Interconnection, and Interoperability of IoT Systems
- Intelligence and Security Informatics : 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings
- Intelligent Mechanisms for Network Configuration and Security : 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings
- Interactive Theorem Proving : 4th International Conference, ITP 2013, Rennes, France, July 22-26, 2013. Proceedings
- Interactive Theorem Proving : 5th International Conference, ITP 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014. Proceedings
- Interactive Theorem Proving : 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings
- International Conference on Security and Privacy in Communication Networks : 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I
- International Conference on Security and Privacy in Communication Networks : 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II
- Internet of Things, Smart Spaces, and Next Generation Networks and Systems : 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedings
- Internet of Things, Smart Spaces, and Next Generation Networks and Systems : 17th International Conference, NEW2AN 2017, 10th Conference, ruSMART 2017, Third Workshop NsCC 2017, St. Petersburg, Russia, August 28?30, 2017, Proceedings
- Internet of Vehicles - Safe and Intelligent Mobility : Second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015, Proceedings
- Interoperability, Safety and Security in IoT : Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers
- Interoperability, Safety and Security in IoT : Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings
- Introduction to Cryptography : Principles and Applications
- Introduction to Cyberdeception
- Introduction to Security Reduction
- Lightweight Cryptography for Security and Privacy : 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers
- Lightweight Cryptography for Security and Privacy : Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers
- Lightweight Cryptography for Security and Privacy : Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers
- Machine Learning and Knowledge Discovery in Databases : European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18?22, 2017, Proceedings, Part I
- Machine Learning and Knowledge Discovery in Databases : European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18?22, 2017, Proceedings, Part II
- Machine Learning and Knowledge Extraction : First IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio, Italy, August 29 ? September 1, 2017, Proceedings
- Machine Learning in Cyber Trust : Security, Privacy, and Reliability
- Management and Security in the Age of Hyperconnectivity : 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings
- Mathematical Aspects of Computer and Information Sciences : 7th International Conference, MACIS 2017, Vienna, Austria, November 15-17, 2017, Proceedings
- Mathematical Modelling for Next-Generation Cryptography : CREST Crypto-Math Project
- Mobile Ad-hoc and Sensor Networks : 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers
- Mobile Device Management : Mobility Evaluation in Small and Medium-Sized Enterprises
- Mobile Internet Security : First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers
- Mobile Networks and Management : 8th International Conference, MONAMI 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Proceedings
- Mobile Networks and Management : 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings
- Mobile Phone Security and Forensics : A Practical Approach
- Mobile Web and Intelligent Information Systems : 14th International Conference, MobiWIS 2017, Prague, Czech Republic, August 21-23, 2017, Proceedings
- Mobile, Secure, and Programmable Networking : Second International Conference, MSPN 2016, Paris, France, June 1-3, 2016, Revised Selected Papers
- Mobile, Secure, and Programmable Networking : Third International Conference, MSPN 2017, Paris, France, June 29-30, 2017, Revised Selected Papers
- Mobility Data Management and Exploration
- Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
- Modern Data Strategy
- Monitoring and Securing Virtualized Networks and Services : 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 - July 3, 2014. Proceedings
- Moving Target Defense for Distributed Systems
- Multimedia Communications, Services and Security : 8th International Conference, MCSS 2015, Kraków, Poland, November 24, 2015. Proceedings
- Multimedia Forensics and Security : Foundations, Innovations, and Applications
- Network Computing and Information Security : Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings
- Network Hardening : An Automated Approach to Improving Network Security
- Network Traffic Anomaly Detection and Prevention : Concepts, Techniques, and Tools
- Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings
- Network and System Security : 11th International Conference, NSS 2017, Helsinki, Finland, August 21?23, 2017, Proceedings
- Network and System Security : 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings
- Network and System Security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
- Network and System Security : 8th International Conference, NSS 2014, Xi?an, China, October 15-17, 2014, Proceedings
- Network and System Security : 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings
- On Privacy-Preserving Protocols for Smart Metering Systems : Security and Privacy in Smart Grids
- On the Move to Meaningful Internet Systems. OTM 2017 Conferences : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part I
- On the Move to Meaningful Internet Systems: OTM 2009 : Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I
- Open Problems in Network Security : IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers
- Open Source Intelligence Investigation : From Strategy to Implementation
- Pairing-Based Cryptography - Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers
- Pairing-Based Cryptography - Pairing 2013 : 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers
- Passive and Active Measurement : 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013. Proceedings
- Passive and Active Measurement : 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings
- Passive and Active Measurement : 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings
- Passive and Active Measurement : 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings