Search Results for Computer science - Narrowed by: Computer security -- CongressesSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bscience$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002b--$002bCongresses$002509Computer$002bsecurity$002b--$002bCongresses$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-06-30T19:21:42ZAdvances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175492024-06-30T19:21:42Z2024-06-30T19:21:42Zby Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar)<br/>Author Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar), Cervesato, Iliano, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000522<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540769293 9783540769279<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Intelligence and security informatics : first European Conference, EuroISI 2008 Esbjerg, Denmark, December 2008 proceedingsent://SD_ILS/0/SD_ILS:2925572024-06-30T19:21:42Z2024-06-30T19:21:42Zby EuroISI 2008 (2008 : Esbjerg, Denmark)<br/>Author EuroISI 2008 (2008 : Esbjerg, Denmark), Ortiz-Arroyo, Daniel<br/>Format: Books<br/>Call Number QA76.9.A25 E97 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9783540898993<br/>Visualization for computer security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedingsent://SD_ILS/0/SD_ILS:2929442024-06-30T19:21:42Z2024-06-30T19:21:42Zby VizSec 2008 2008 : Cambridge, Mass.)<br/>Author VizSec 2008 2008 : Cambridge, Mass.), Goodall, John R., Conti, Greg, Ma, Kwan-liu<br/>Format: Books<br/>Call Number QA76.9.A25 V59 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9783540859314<br/>Privacy in statistical databases : UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008, Proceedingsent://SD_ILS/0/SD_ILS:2929502024-06-30T19:21:42Z2024-06-30T19:21:42Zby PSD 2008 (2008 : Istanbul, Turkey)<br/>Author PSD 2008 (2008 : Istanbul, Turkey), Domingo-Ferrer, Josep, Saygin, Yucel<br/>Format: Books<br/>Call Number QA76.9.A25 P74 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9783540874706<br/>Information hiding : 10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, revised selected papersent://SD_ILS/0/SD_ILS:3287612024-06-30T19:21:42Z2024-06-30T19:21:42Zby IH 2008 (2008 : Santa Barbara, California)<br/>Author IH 2008 (2008 : Santa Barbara, California), Solanki, Kaushal, Sullivan, Kenneth, Madhow, Upamanyu<br/>Format: Books<br/>Call Number QA76.9.A25 I49 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9783540889601<br/>Computational intelligence and security : international conference, CIS 2006, Guangzhou, China, November 3-6, 2006, revised selected papersent://SD_ILS/0/SD_ILS:2259462024-06-30T19:21:42Z2024-06-30T19:21:42Zby CIS 2006 (2006 : Guangzhou Shi, China)<br/>Author CIS 2006 (2006 : Guangzhou Shi, China), Wang, Yuping, 1961-, Cheung, Yiu-ming, Liu, Hailin, 1963-<br/>Format: Books<br/>Call Number Q342 C57 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540743767<br/><a href="=856 40$uhttp://dx.doi.org/10.1007/978-3-540-74377-4">Fulltext</a><br/>Recent advances in intrusion detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, proceedingsent://SD_ILS/0/SD_ILS:2259972024-06-30T19:21:42Z2024-06-30T19:21:42Zby RAID 2007 (2007 : Gold Coast, Qld.)<br/>Author RAID 2007 (2007 : Gold Coast, Qld.), Kruegel, Christopher, 1976-, Lippmann, Richard, Clark, Andrew, 1971-<br/>Format: Books<br/>Call Number QA76.9.A25 R344 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540743194<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">Fulltext</a><br/>Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papersent://SD_ILS/0/SD_ILS:2545952024-06-30T19:21:42Z2024-06-30T19:21:42Zby Camenisch, Jan<br/>Author Camenisch, Jan<br/>Format: Books<br/>Call Number QA76.9.A25 I537 2007<br/>Publisher Springer-Verlag,<br/>Publication Date 2007<br/>ISBN 9783540741237<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">Fulltext</a><br/>Information Security 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007: Proceedingsent://SD_ILS/0/SD_ILS:5167062024-06-30T19:21:42Z2024-06-30T19:21:42Zby ISC 2007 (2007 : Valparaiso, Chile)<br/>Author ISC 2007 (2007 : Valparaiso, Chile), Garay, Juan A., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000183<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540754961<br/><a href="http://dx.doi.org/10.1007/978-3-540-75496-1">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5168172024-06-30T19:21:42Z2024-06-30T19:21:42Zby ISPEC 2007 (2007 : Hong Kong, China)<br/>Author ISPEC 2007 (2007 : Hong Kong, China), Dawson, Ed, Wong, Duncan S., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000195<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540721635<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5170522024-06-30T19:21:42Z2024-06-30T19:21:42Zby ACISP 2007 (2007 : Townsville, Qld.)<br/>Author ACISP 2007 (2007 : Townsville, Qld.), Pieprzyk, Josef, 1949-, Ghodosi, Hossein, Dawson, Ed (Edward), SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000185<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540734581<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information security and cryptology - ICISC 2007 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175422024-06-30T19:21:42Z2024-06-30T19:21:42Zby ICISC 2007 (2007 : Seoul, Korea)<br/>Author ICISC 2007 (2007 : Seoul, Korea), Nam, Kil-Hyun, Rhee, Gwangsoo, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000184<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540767886 9783540767879<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Formal aspects in security and trust : Fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papersent://SD_ILS/0/SD_ILS:2544052024-06-30T19:21:42Z2024-06-30T19:21:42Zby FAST 2006 (2006 : Hamilton, Ont.)<br/>Author FAST 2006 (2006 : Hamilton, Ont.), Dimitrakos, Theo<br/>Format: Books<br/>Call Number QA76.9.A25 F374 2007<br/>Publisher Springer-Verlag,<br/>Publication Date 2007<br/>ISBN 9783540752264<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007. Proceedings.ent://SD_ILS/0/SD_ILS:5174982024-06-30T19:21:42Z2024-06-30T19:21:42Zby International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security $n(4th :$d2007 :$cSaint Petersburg, Russia)<br/>Author International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security $n(4th :$d2007 :$cSaint Petersburg, Russia), Gorodetsky, Vladimir, Kotenko, Igor, Skormin, Victor A., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001125<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540739869 9783540739852<br/><a href="http://dx.doi.org/10.1007/978-3-540-73986-9">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Security and cryptography for networks : 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedingsent://SD_ILS/0/SD_ILS:1422302024-06-30T19:21:42Z2024-06-30T19:21:42Zby SCN 2006 (2006 : Maiori, Italy)<br/>Author SCN 2006 (2006 : Maiori, Italy), De Prisco, Roberto, 1968-, Yung, Moti<br/>Format: Books<br/>Call Number TK5105.59 S42 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540380801<br/>Information hiding : 7th international workshop, IH 2005, Barcelona, Spain, June 6-8, 2005 : revised selected papersent://SD_ILS/0/SD_ILS:1433312024-06-30T19:21:42Z2024-06-30T19:21:42Zby IH 2005 ( 2005 : Barcelona, Spain)<br/>Author IH 2005 ( 2005 : Barcelona, Spain), Barni, Mauro<br/>Format: Books<br/>Call Number QA76.9.A25 I534 2005<br/>Publisher Springer,<br/>Publication Date 2005<br/>ISBN 9783540290391<br/>Recent advances in intrusion detection : third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 : proceedingsent://SD_ILS/0/SD_ILS:1594592024-06-30T19:21:42Z2024-06-30T19:21:42Zby Debar, Herve, 1961-<br/>Author Debar, Herve, 1961-, Me, Ludovic, 1963-, Wu, S. Felix, 1963-<br/>Format: Books<br/>Call Number QA76.9.A25 R44 2000<br/>Publisher Springer-Verlag,<br/>Publication Date 2000<br/>ISBN 9783540410850<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: Proceedingsent://SD_ILS/0/SD_ILS:5167122024-06-30T19:21:42Z2024-06-30T19:21:42Zby International Workshop on Security (2nd : 2007 : Nara-shi, Japan)<br/>Author International Workshop on Security (2nd : 2007 : Nara-shi, Japan), Miyaji, Atsuko, Kikuchi, Hiroaki, Rannenberg, Kai, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000582<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540756514<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Inter-domain management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5170352024-06-30T19:21:42Z2024-06-30T19:21:42Zby International Conference on Autonomous Infrastructure, Management and Security (1st : 2007 : Oslo, Norway)<br/>Author International Conference on Autonomous Infrastructure, Management and Security (1st : 2007 : Oslo, Norway), Bandara, Arosha K., Burgess, Mark, 1966-, Association for Computing Machinery, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000326<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540729860<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information systems security third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175602024-06-30T19:21:42Z2024-06-30T19:21:42Zby International Conference on Information Systems Security (3rd : 2007 : Delhi, India)<br/>Author International Conference on Information Systems Security (3rd : 2007 : Delhi, India), McDaniel, Patrick (Patrick Drew), Gupta, Shyam K., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000198<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540770862 9783540770855<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Advances in cryptology-- ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175482024-06-30T19:21:42Z2024-06-30T19:21:42Zby International Conference on the Theory and Application of Cryptology and Information Security (13th : 2007 : Kuching, Sarawak)<br/>Author International Conference on the Theory and Application of Cryptology and Information Security (13th : 2007 : Kuching, Sarawak), Kurosawa, Kaoru, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000526<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540769002 9783540768999<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedingsent://SD_ILS/0/SD_ILS:1709042024-06-30T19:21:42Z2024-06-30T19:21:42Zby International Conference on Information Systems Security (2nd : 2006 : Calcutta, India)<br/>Author International Conference on Information Systems Security (2nd : 2006 : Calcutta, India), Bagchi, Aditya, Atluri, Vijayalaksmi<br/>Format: Books<br/>Call Number QA76.9.A25 I576 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540689621<br/>Security and privacy in ad-hoc and sensor networks : second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005 : revised selected papersent://SD_ILS/0/SD_ILS:2717502024-06-30T19:21:42Z2024-06-30T19:21:42Zby European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (2nd : 2005 : Visegrad, Hungary)<br/>Author European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (2nd : 2005 : Visegrad, Hungary), Molva, Refik, Tsudik, G. (Gene), Westhoff, Dirk<br/>Format: Books<br/>Call Number TK5102.85 E97 2005<br/>Publisher Springer-Verlag,<br/>Publication Date 2005<br/>ISBN 9783540309123<br/>Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedingsent://SD_ILS/0/SD_ILS:1433402024-06-30T19:21:42Z2024-06-30T19:21:42Zby International Conference on Information Systems Security( 1st : 2005 : Calcutta, India)<br/>Author International Conference on Information Systems Security( 1st : 2005 : Calcutta, India), Jajodia, Sushil, Mazumdar, Chandan<br/>Format: Books<br/>Call Number QA76.9.A25 I576 2005<br/>Publisher Springer,<br/>Publication Date 2005<br/>ISBN 9783540307068<br/>Information and communications security : 4th international conference, ICICS 2002, Singapore, December 9-12, 2002 : proceedingsent://SD_ILS/0/SD_ILS:3943712024-06-30T19:21:42Z2024-06-30T19:21:42Zby International Conference on Information and Communications Security (4th : 2002 : Singapore)<br/>Author International Conference on Information and Communications Security (4th : 2002 : Singapore), Deng, Robert<br/>Format: Books<br/>Call Number QA76.9.A25 I57 2002<br/>Publisher Springer,<br/>Publication Date 2002<br/>ISBN 9783540001645<br/>Information security and privacy : Second Australian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997 : proceedingsent://SD_ILS/0/SD_ILS:4741002024-06-30T19:21:42Z2024-06-30T19:21:42Zby Varadharajan, Vijay<br/>Author Varadharajan, Vijay, Pieprzyk, Josef, Mu, Yi, Australian Conference on Information Security and Privacy (2nd : 1997 : Sydney, New South Wales)<br/>Format: Books<br/>Call Number QA76.9.A25 I56 1997<br/>Publisher Springer,<br/>Publication Date 1997<br/>ISBN 9783540632320<br/>Security and control of information technology in societyent://SD_ILS/0/SD_ILS:3073692024-06-30T19:21:42Z2024-06-30T19:21:42Zby IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society (1993 : Saint-Petersburg, Russia)<br/>Author IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society (1993 : Saint-Petersburg, Russia), Sizer, Richard<br/>Format: Books<br/>Call Number QA76.9.A25 I73 1993<br/>Publisher North-Holland,<br/>Publication Date 1994<br/>ISBN 9780444818317<br/>Stabilization, safety, and security of distributed systems 9th international symposium, SSS 2007, Paris, France, November 14-16, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5170802024-06-30T19:21:42Z2024-06-30T19:21:42Zby SSS 2007 (2007 : Paris, France)<br/>Author SSS 2007 (2007 : Paris, France), Masuzawa, Toshimitsu, Tixeuil, Sebastien, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000187<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540766278 9783540766261<br/><a href="http://dx.doi.org/10.1007/978-3-540-76627-8">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5170602024-06-30T19:21:42Z2024-06-30T19:21:42Zby ProvSec 2007 (2007 : Wollongong, N.S.W.)<br/>Author ProvSec 2007 (2007 : Wollongong, N.S.W.), Susilo, Willy, Liu, Joseph K., Mu, Yi, 1955-, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000343<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540756705<br/><a href="http://dx.doi.org/10.1007/978-3-540-75670-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Computer security : proceedingsent://SD_ILS/0/SD_ILS:3345852024-06-30T19:21:42Z2024-06-30T19:21:42Zby IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.)<br/>Author IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.), Dougall, E. Graham<br/>Format: Books<br/>Call Number QA76.9.A25 I45 1993<br/>Publisher North-Holland,<br/>Publication Date 1993<br/>ISBN 9780444817488<br/>Engineering dependable software systemsent://SD_ILS/0/SD_ILS:8413802024-06-30T19:21:42Z2024-06-30T19:21:42Zby NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 : Marktoberdorf, Germany)<br/>Author NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 : Marktoberdorf, Germany), Broy, M., 1949- editor, Peled, Doron A., 1962- editor, Kalus, Georg editor, NATO Emerging Security Challenges Division<br/>Format: Books<br/>Call Number QA76.76.V47 N38 2013<br/>Publisher IOS Press : published in cooperation with NATO Emerging Security Challenges Division,<br/>Publication Date 2013<br/>ISBN 9781614992066<br/>Software safety and security : tools for analysis and verificationent://SD_ILS/0/SD_ILS:7960582024-06-30T19:21:42Z2024-06-30T19:21:42Zby Nipkow, Tobias<br/>Author Nipkow, Tobias, Grumberg, Orna, Hauptmann, Benedikt<br/>Format: Books<br/>Call Number QA76.76.V47 S64 2012<br/>Publisher IOS Press,<br/>Publication Date 2012<br/>ISBN 9781614990277<br/>Enhancing cryptographic primitives with techniques from error correcting codesent://SD_ILS/0/SD_ILS:8128082024-06-30T19:21:42Z2024-06-30T19:21:42Zby NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes (2008 : Veliko Tŭrnovo, Bulgaria)<br/>Author NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes (2008 : Veliko Tŭrnovo, Bulgaria), Preneel, Bart, 1963-, North Atlantic Treaty Organization. Public Diplomacy Division<br/>Format: Books<br/>Call Number QA76.9.A25 N384 2009<br/>Publisher IOS Press,<br/>Publication Date 2009<br/>ISBN 9781607500025<br/>Algorithms, architectures and information systems securityent://SD_ILS/0/SD_ILS:3270482024-06-30T19:21:42Z2024-06-30T19:21:42Zby Bhattacharya, Bhargab B.<br/>Author Bhattacharya, Bhargab B., International Conference on Information Systems Security (2nd : 2006 : Calcutta, India)<br/>Format: Books<br/>Call Number QA76.9.A25 A43 2009<br/>Publisher World Scientific,<br/>Publication Date 2009<br/>ISBN 9789812836236<br/>Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papersent://SD_ILS/0/SD_ILS:2829432024-06-30T19:21:42Z2024-06-30T19:21:42Zby Adams, Carlisle 1961-<br/>Author Adams, Carlisle 1961-, Miri, Ali, Wiener, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 S45 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540773597<br/>Information assurance and computer securityent://SD_ILS/0/SD_ILS:1748882024-06-30T19:21:42Z2024-06-30T19:21:42Zby NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco)<br/>Author NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco), Thomas, Johnson P., Essaaidi, Mohamed<br/>Format: Books<br/>Call Number QA76.9.A25 N37 2005<br/>Publisher IOS Press,<br/>Publication Date 2006<br/>ISBN 9781586036782<br/>Verification of infinite-state systems with applications to securityent://SD_ILS/0/SD_ILS:1641112024-06-30T19:21:42Z2024-06-30T19:21:42ZFormat: Books<br/>Call Number Q295 V47 2005<br/>Publisher IOS Press,<br/>Publication Date 2006<br/>ISBN 9781586035709<br/>