Limit Search Results
Author
Language
Format
Subject
Switch to list view
Switch to thumbnail view
54 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000MAIN
Print
3. 
Cover image for Computer security and information integrity
5. 
Cover image for Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007. Proceedings.
7. 
Cover image for Visualization for computer security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings
8. 
Cover image for Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: Proceedings
9. 
Cover image for Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedings
10. 
Cover image for Certification and security in e-services : from e-government to e-business : IFIP 17th World Computer Congress, TC11 stream on security in e-services, August 26-29, 2002, Montr�eal, Qu�ebec, Canada
12. 
Cover image for Engineering dependable software systems
13. 
Cover image for Software safety and security : tools for analysis and verification
14. 
Cover image for Computing and communication
15. 
Cover image for Databases and information systems VI : selected papers from the Ninth International Baltic Conference, DB&IS 2010
16. 
Cover image for Enhancing cryptographic primitives with techniques from error correcting codes
17. 
Cover image for Algorithms, architectures and information systems security
18. 
Cover image for Intelligence and security informatics : first European Conference, EuroISI 2008 Esbjerg, Denmark, December 2008 proceedings
19. 
Cover image for Privacy in statistical databases : UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008, Proceedings
20. 
Cover image for Information hiding : 10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, revised selected papers
21. 
Cover image for Computational intelligence and security : international conference, CIS 2006, Guangzhou, China, November 3-6, 2006, revised selected papers
22. 
Cover image for Recent advances in intrusion detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, proceedings
23. 
Cover image for Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papers
24. 
Cover image for Information Security 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007: Proceedings
25. 
Cover image for Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings
26. 
Cover image for Inter-domain management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007 : proceedings
27. 
Cover image for Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings
28. 
Cover image for Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings
29. 
Cover image for Stabilization, safety, and security of distributed systems 9th international symposium, SSS 2007, Paris, France, November 14-16, 2007 : proceedings
30. 
Cover image for New approaches for security, privacy and trust in complex environments proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
31. 
Cover image for Information security and cryptology - ICISC 2007 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings
32. 
Cover image for Information systems security third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings
33. 
Cover image for Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers
35. 
Cover image for Advances in cryptology-- ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedings
36. 
Cover image for Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings
37. 
Cover image for Verification of infinite-state systems with applications to security
39. 
Cover image for Security and embedded systems
40. 
Cover image for Security and cryptography for networks : 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedings
41. 
Cover image for Security and privacy in ad-hoc and sensor networks : second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005 : revised selected papers
42. 
Cover image for Information hiding : 7th international workshop, IH 2005, Barcelona, Spain, June 6-8, 2005 : revised selected papers
43. 
Cover image for Information systems security :  first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings
44. 
Cover image for Trustworthy global computing : international symposium, TGC 2005, Edinburgh, UK, April 7-9, 2005 : revised selected papers
46. 
Cover image for Research directions in data and applications security : IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK
47. 
Cover image for Integrity and internal control in Information Systems V : IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany
48. 
Cover image for Check point VPN-1/firewall-1 NG : administration
49. 
Cover image for Information and communications security : 4th international conference, ICICS 2002, Singapore, December 9-12, 2002 : proceedings
50. 
Cover image for Recent advances in intrusion detection : third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 : proceedings
52. 
Cover image for Information security and privacy : Second Australian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997 : proceedings
Go to:Search Results
|
Top of Page
|
Search Facets