Search Results for Computer security -- Congresses SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$002b--$002bCongresses$0026ps$003d300?dt=list 2024-04-20T16:22:24Z Proceedings of a symposium on trends and applications ent://SD_ILS/0/SD_ILS:348912 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Symposium on Trends and Applications (1976-)<br/>Author&#160;Symposium on Trends and Applications (1976-),&#160;Institute of Electrical and Electronics Engineers. Computer Society<br/>Format:&#160;Books<br/>Call Number&#160;TK7885.A1 S98 1976 f<br/>Publisher&#160;IEEE,<br/>Publication Date&#160;2020&#160;2019&#160;2018&#160;2017&#160;2016<br/> Trust, privacy, and security in digital business : 10th International conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013 : proceedings ent://SD_ILS/0/SD_ILS:819648 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;TrustBus (Conference) (10th : 2013 : Prague, Czech Republic)<br/>Author&#160;TrustBus (Conference) (10th : 2013 : Prague, Czech Republic),&#160;Furnell, Steven, 1970-,&#160;Lambrinoudakis, Costas,&#160;L&oacute;pez, Javier<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 T78 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2013<br/>ISBN&#160;9783642403422<br/> Data management and security : applications in medicine, science and engineering ent://SD_ILS/0/SD_ILS:820084 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Rabasa, A. (Alejandro), editor of compilation<br/>Author&#160;Rabasa, A. (Alejandro), editor of compilation,&#160;Brebbia, C. A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 .D314 D377 2013<br/>Publisher&#160;WIT Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781845647087<br/> Engineering dependable software systems ent://SD_ILS/0/SD_ILS:841380 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 : Marktoberdorf, Germany)<br/>Author&#160;NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 : Marktoberdorf, Germany),&#160;Broy, M., 1949- editor,&#160;Peled, Doron A., 1962- editor,&#160;Kalus, Georg editor,&#160;NATO Emerging Security Challenges Division<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.V47 N38 2013<br/>Publisher&#160;IOS Press : published in cooperation with NATO Emerging Security Challenges Division,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781614992066<br/> Software safety and security : tools for analysis and verification ent://SD_ILS/0/SD_ILS:796058 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Nipkow, Tobias<br/>Author&#160;Nipkow, Tobias,&#160;Grumberg, Orna,&#160;Hauptmann, Benedikt<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.V47 S64 2012<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781614990277<br/> Computing and communication ent://SD_ILS/0/SD_ILS:804133 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Vijayakumar, R.<br/>Author&#160;Vijayakumar, R.<br/>Format:&#160;Books<br/>Call Number&#160;QA75.5 C656 2012<br/>Publisher&#160;Narosa Publishing House,<br/>Publication Date&#160;2012<br/>ISBN&#160;9788184871784<br/> Software agents, agent systems and their applications ent://SD_ILS/0/SD_ILS:796188 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Software agents, agent systems and their applications / [edited by] Mohammad Essaidi, Maria Ganzha, Marcin Paprzycki<br/>Author&#160;Software agents, agent systems and their applications / [edited by] Mohammad Essaidi, Maria Ganzha, Marcin Paprzycki,&#160;Essaaidi, Mohamad,&#160;Ganzha, Maria,&#160;Paprzycki, Marcin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.I58 S64 2012<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781607508175<br/> Information security, coding theory and related combinatorics : information coding and combinatorics ent://SD_ILS/0/SD_ILS:772761 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Proceeding of the NATO Advanced Study Institute &quot;Information Security and Related Combinatorics&quot; (2010 : Opatija, Croatia)<br/>Author&#160;Proceeding of the NATO Advanced Study Institute &quot;Information Security and Related Combinatorics&quot; (2010 : Opatija, Croatia),&#160;Crnkovic, Dean,&#160;Tonchev, Vladimir<br/>Format:&#160;Books<br/>Call Number&#160;QA404.7 P76 2010<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781607506621&#160;9781607506638<br/> Databases and information systems VI : selected papers from the Ninth International Baltic Conference, DB&amp;IS 2010 ent://SD_ILS/0/SD_ILS:772743 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Barzdins, Janis<br/>Author&#160;Barzdins, Janis,&#160;Kirikova, Marite<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D3 D37 2010<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781607506874<br/> Computer security : protecting digital resources ent://SD_ILS/0/SD_ILS:374669 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Newman, Robert C.<br/>Author&#160;Newman, Robert C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 N48 2010<br/>Publisher&#160;Jones &amp; Bartlett Publishers,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780763759940<br/> Human systems integration to enhance maritime domain awareness for port/parbour security ent://SD_ILS/0/SD_ILS:812813 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Shahbazian, Elisa<br/>Author&#160;Shahbazian, Elisa,&#160;Rogova, Galina<br/>Format:&#160;Books<br/>Call Number&#160;HE551 H86 2010<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781607506201<br/> Biometric technology for human identification VII : 5-6 April 2010, Orlando, Florida, United States ent://SD_ILS/0/SD_ILS:787835 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Kumar, B. V. K. Vijaya, 1953-<br/>Author&#160;Kumar, B. V. K. Vijaya, 1953-,&#160;Prabhakar, Salil,&#160;Ross, Arun A. (Arun Abraham),&#160;SPIE (Society)<br/>Format:&#160;Books<br/>Call Number&#160;TK7882.B56 B566 2010 f<br/>Publisher&#160;SPIE,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780819481313<br/> Enhancing cryptographic primitives with techniques from error correcting codes ent://SD_ILS/0/SD_ILS:812808 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes (2008 : Veliko T&#365;rnovo, Bulgaria)<br/>Author&#160;NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes (2008 : Veliko T&#365;rnovo, Bulgaria),&#160;Preneel, Bart, 1963-,&#160;North Atlantic Treaty Organization. Public Diplomacy Division<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N384 2009<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781607500025<br/> Proceedings of the 3rd European conference on computer network defense ent://SD_ILS/0/SD_ILS:293023 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Siris, Vasilios<br/>Author&#160;Siris, Vasilios<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P68 2009<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780387855547<br/> Guide to strategic infrastructure security : becoming a security network professional ent://SD_ILS/0/SD_ILS:325499 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Weaver, Randy<br/>Author&#160;Weaver, Randy,&#160;Weaver, Dawn<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W47 2009<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781418836610<br/> Algorithms, architectures and information systems security ent://SD_ILS/0/SD_ILS:327048 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Bhattacharya, Bhargab B.<br/>Author&#160;Bhattacharya, Bhargab B.,&#160;International Conference on Information Systems Security (2nd : 2006 : Calcutta, India)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A43 2009<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2009<br/>ISBN&#160;9789812836236<br/> Real-time crowd simulations for interactive virtual environments ent://SD_ILS/0/SD_ILS:251656 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Mohd. Shahrizal Sunar<br/>Author&#160;Mohd. Shahrizal Sunar,&#160;Mohamed 'Adi Mohamed Azahar,&#160;Daut Daman,&#160;Abdullah Bade,&#160;International Conference &amp; Industry Symposium on Computer Games : Animation, Multimedia, IPTV, Entertainment and Security (2008 : Singapore)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.C65 R424 2008<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008<br/> Principles, systems and applications of IP telecommunications : services and security for next generation networks : Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008 : revised selected papers ent://SD_ILS/0/SD_ILS:290563 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IPTComm 2008 (2008 : Heidelberg, Germany)<br/>Author&#160;IPTComm 2008 (2008 : Heidelberg, Germany),&#160;Schulzrinne, Henning,&#160;State, Radu, 1972-,&#160;Niccolini, Saverio<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 I674 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783540890539<br/> Intelligence and security informatics : first European Conference, EuroISI 2008 Esbjerg, Denmark, December 2008 proceedings ent://SD_ILS/0/SD_ILS:292557 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;EuroISI 2008 (2008 : Esbjerg, Denmark)<br/>Author&#160;EuroISI 2008 (2008 : Esbjerg, Denmark),&#160;Ortiz-Arroyo, Daniel<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E97 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783540898993<br/> Visualization for computer security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings ent://SD_ILS/0/SD_ILS:292944 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;VizSec 2008 2008 : Cambridge, Mass.)<br/>Author&#160;VizSec 2008 2008 : Cambridge, Mass.),&#160;Goodall, John R.,&#160;Conti, Greg,&#160;Ma, Kwan-liu<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V59 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783540859314<br/> Privacy in statistical databases : UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008, Proceedings ent://SD_ILS/0/SD_ILS:292950 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;PSD 2008 (2008 : Istanbul, Turkey)<br/>Author&#160;PSD 2008 (2008 : Istanbul, Turkey),&#160;Domingo-Ferrer, Josep,&#160;Saygin, Yucel<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P74 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783540874706<br/> Information hiding : 10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, revised selected papers ent://SD_ILS/0/SD_ILS:328761 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IH 2008 (2008 : Santa Barbara, California)<br/>Author&#160;IH 2008 (2008 : Santa Barbara, California),&#160;Solanki, Kaushal,&#160;Sullivan, Kenneth,&#160;Madhow, Upamanyu<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I49 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783540889601<br/> Computational intelligence and security : international conference, CIS 2006, Guangzhou, China, November 3-6, 2006, revised selected papers ent://SD_ILS/0/SD_ILS:225946 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;CIS 2006 (2006 : Guangzhou Shi, China)<br/>Author&#160;CIS 2006 (2006 : Guangzhou Shi, China),&#160;Wang, Yuping, 1961-,&#160;Cheung, Yiu-ming,&#160;Liu, Hailin, 1963-<br/>Format:&#160;Books<br/>Call Number&#160;Q342 C57 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540743767<br/><a href="=856 40$uhttp://dx.doi.org/10.1007/978-3-540-74377-4">Fulltext</a><br/> Recent advances in intrusion detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, proceedings ent://SD_ILS/0/SD_ILS:225997 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;RAID 2007 (2007 : Gold Coast, Qld.)<br/>Author&#160;RAID 2007 (2007 : Gold Coast, Qld.),&#160;Kruegel, Christopher, 1976-,&#160;Lippmann, Richard,&#160;Clark, Andrew, 1971-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R344 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540743194<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">Fulltext</a><br/> Networks, security and soft computing : trends and future directions ent://SD_ILS/0/SD_ILS:245341 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;National Conference on Trends in Advanced Computing (2007: Tezpur University)<br/>Author&#160;National Conference on Trends in Advanced Computing (2007: Tezpur University),&#160;Bhattacharyya, Dhruba K.,&#160;Hazarika, Shyamanta M.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 N376 2007<br/>Publisher&#160;Alpha Science Intl Ltd<br/>Publication Date&#160;2007<br/>ISBN&#160;9788173198687<br/> Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papers ent://SD_ILS/0/SD_ILS:254595 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Camenisch, Jan<br/>Author&#160;Camenisch, Jan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I537 2007<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540741237<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">Fulltext</a><br/> Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007: Proceedings ent://SD_ILS/0/SD_ILS:628201 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;SAFECOMP 2007 (2007 : Nuremberg, Germany)<br/>Author&#160;SAFECOMP 2007 (2007 : Nuremberg, Germany),&#160;Saglietti, Francesca,&#160;Oster, Norbert,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001370<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540751014<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:628264 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;WISA 2006 (2006 : Cheju-do, Korea)<br/>Author&#160;WISA 2006 (2006 : Cheju-do, Korea),&#160;Lee, Jae Kwang,&#160;Yi, Okyeon,&#160;Yung, Moti.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001386<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540710936<br/><a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007: Proceedings ent://SD_ILS/0/SD_ILS:625596 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;European Workshop on Security in Ad-Hoc and Sensor Networks (4th : 2007 : Cambridge, England)<br/>Author&#160;European Workshop on Security in Ad-Hoc and Sensor Networks (4th : 2007 : Cambridge, England),&#160;Stajano, Frank.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB001267<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540732754<br/><a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007: Proceedings ent://SD_ILS/0/SD_ILS:625951 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;TrustBus 2007 (2007 : Regensburg, Germany)<br/>Author&#160;TrustBus 2007 (2007 : Regensburg, Germany),&#160;Lambrinoudakis, Costas,&#160;Pernul, Gunther,&#160;Tjoa, A. Min,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001313<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540744092<br/><a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Computer Security - ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007: Proceedings ent://SD_ILS/0/SD_ILS:626829 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;European Symposium on Research in Computer Security (12th : 2007 : Dresden, Germany)<br/>Author&#160;European Symposium on Research in Computer Security (12th : 2007 : Dresden, Germany),&#160;Biskup, Joachim,&#160;Lopez, Javier.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001353<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540748359<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:628236 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Theory of Cryptography Conference (4th : 2007 : Amsterdam, Netherlands)<br/>Author&#160;Theory of Cryptography Conference (4th : 2007 : Amsterdam, Netherlands),&#160;Vadhan, Salil P.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001382<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540709367<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information Security 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007: Proceedings ent://SD_ILS/0/SD_ILS:516706 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;ISC 2007 (2007 : Valparaiso, Chile)<br/>Author&#160;ISC 2007 (2007 : Valparaiso, Chile),&#160;Garay, Juan A.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000183<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540754961<br/><a href="http://dx.doi.org/10.1007/978-3-540-75496-1">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: Proceedings ent://SD_ILS/0/SD_ILS:516712 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Workshop on Security (2nd : 2007 : Nara-shi, Japan)<br/>Author&#160;International Workshop on Security (2nd : 2007 : Nara-shi, Japan),&#160;Miyaji, Atsuko,&#160;Kikuchi, Hiroaki,&#160;Rannenberg, Kai,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000582<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540756514<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:516817 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;ISPEC 2007 (2007 : Hong Kong, China)<br/>Author&#160;ISPEC 2007 (2007 : Hong Kong, China),&#160;Dawson, Ed,&#160;Wong, Duncan S.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000195<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540721635<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Inter-domain management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517035 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Conference on Autonomous Infrastructure, Management and Security (1st : 2007 : Oslo, Norway)<br/>Author&#160;International Conference on Autonomous Infrastructure, Management and Security (1st : 2007 : Oslo, Norway),&#160;Bandara, Arosha K.,&#160;Burgess, Mark, 1966-,&#160;Association for Computing Machinery,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000326<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540729860<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517026 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;WISTP 2007 (2007 : Herakleion, Greece)<br/>Author&#160;WISTP 2007 (2007 : Herakleion, Greece),&#160;Sauveron, Damien,&#160;International Federation for Information Processing. Technical Committee 6,&#160;IFIP WG 8.8 (Smart Cards),&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000196<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540723547<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517052 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;ACISP 2007 (2007 : Townsville, Qld.)<br/>Author&#160;ACISP 2007 (2007 : Townsville, Qld.),&#160;Pieprzyk, Josef, 1949-,&#160;Ghodosi, Hossein,&#160;Dawson, Ed (Edward),&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000185<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540734581<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517060 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;ProvSec 2007 (2007 : Wollongong, N.S.W.)<br/>Author&#160;ProvSec 2007 (2007 : Wollongong, N.S.W.),&#160;Susilo, Willy,&#160;Liu, Joseph K.,&#160;Mu, Yi, 1955-,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000343<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540756705<br/><a href="http://dx.doi.org/10.1007/978-3-540-75670-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Stabilization, safety, and security of distributed systems 9th international symposium, SSS 2007, Paris, France, November 14-16, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517080 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;SSS 2007 (2007 : Paris, France)<br/>Author&#160;SSS 2007 (2007 : Paris, France),&#160;Masuzawa, Toshimitsu,&#160;Tixeuil, Sebastien,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000187<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540766278&#160;9783540766261<br/><a href="http://dx.doi.org/10.1007/978-3-540-76627-8">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> New approaches for security, privacy and trust in complex environments proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa ent://SD_ILS/0/SD_ILS:517096 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP TC11 International Information Security Conference (22nd : 2007 : Sandton, South Africa)<br/>Author&#160;IFIP TC11 International Information Security Conference (22nd : 2007 : Sandton, South Africa),&#160;Venter, Hein,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000245<br/>Publisher&#160;International Federation for Information Processing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387723679&#160;9780387723662<br/><a href="http://dx.doi.org/10.1007/978-0-387-72367-9">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Intelligence and security informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517389 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;PAISI 2007 (2007 : Chengdu, China)<br/>Author&#160;PAISI 2007 (2007 : Chengdu, China),&#160;Yang, Christopher C.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000317<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540715498<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information security and cryptology - ICISC 2007 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517542 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;ICISC 2007 (2007 : Seoul, Korea)<br/>Author&#160;ICISC 2007 (2007 : Seoul, Korea),&#160;Nam, Kil-Hyun,&#160;Rhee, Gwangsoo,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000184<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540767886&#160;9783540767879<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Cryptology and network security 6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517551 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Conference on Cryptology and Network Security (6th : 2007 : Singapore)<br/>Author&#160;International Conference on Cryptology and Network Security (6th : 2007 : Singapore),&#160;Bao, Feng, Dr.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001165<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540769699&#160;9783540769682<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information systems security third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517560 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Conference on Information Systems Security (3rd : 2007 : Delhi, India)<br/>Author&#160;International Conference on Information Systems Security (3rd : 2007 : Delhi, India),&#160;McDaniel, Patrick (Patrick Drew),&#160;Gupta, Shyam K.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000198<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540770862&#160;9783540770855<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Fifth World Conference on Information Security Education proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA ent://SD_ILS/0/SD_ILS:517568 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;World Conference on Information Security Education (5th : 2007 : West Point, N.Y.)<br/>Author&#160;World Conference on Information Security Education (5th : 2007 : West Point, N.Y.),&#160;Futcher, Lynn,&#160;Dodge, Ronald,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001038<br/>Publisher&#160;International Federation for Information Processing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387732695&#160;9780387732688<br/><a href="http://dx.doi.org/10.1007/978-0-387-73269-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:517881 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;EUROCRYPT (2007 : Barcelona, Spain)<br/>Author&#160;EUROCRYPT (2007 : Barcelona, Spain),&#160;Naor, Moni,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000525<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540725404&#160;9783540725398<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings ent://SD_ILS/0/SD_ILS:517885 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;ACNS 2007 (2007 : Zhuhai, China)<br/>Author&#160;ACNS 2007 (2007 : Zhuhai, China),&#160;Katz, Jonathan,&#160;Yung, Moti,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001015<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540727385&#160;9783540727378<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007: Proceedings ent://SD_ILS/0/SD_ILS:625630 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;European PKI Workshop (4th : 2007 : Palma de Mallorca, Spain)<br/>Author&#160;European PKI Workshop (4th : 2007 : Palma de Mallorca, Spain),&#160;Lopez, Javier,&#160;Ferrer, Josep L.,&#160;Samarati, Pierangela,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001274<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540734086<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Pairing-Based Cryptography : Pairing 2007: First International Conference, Tokyo, Japan, July 2-4, 2007: Proceedings ent://SD_ILS/0/SD_ILS:625676 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Conference on Pairing-Based Cryptography (1st : 2007 : Tokyo, Japan)<br/>Author&#160;International Conference on Pairing-Based Cryptography (1st : 2007 : Tokyo, Japan),&#160;Takagi, Tsuyoshi,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001281<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540734895<br/><a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007: Proceedings ent://SD_ILS/0/SD_ILS:625709 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;ATC 2007 (2007 : Hong Kong, China)<br/>Author&#160;ATC 2007 (2007 : Hong Kong, China),&#160;Xiao, Bin.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001286<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540735472<br/><a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:626065 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;SAC 2006 (2006 : Montreal, Quebec)<br/>Author&#160;SAC 2006 (2006 : Montreal, Quebec),&#160;Biham, Eli,&#160;Youssef, Amr M.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001320<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540744627<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Foundations of Security Analysis and Design. IV, FOSAD 2006/2007 Tutorial Lectures ent://SD_ILS/0/SD_ILS:626800 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International School on Foundations of Security Analysis and Design (2006-2007 : Bertinoro, Italy)<br/>Author&#160;International School on Foundations of Security Analysis and Design (2006-2007 : Bertinoro, Italy),&#160;Aldini, Alessandro,&#160;Gorrieri, Roberto,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001347<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540748106<br/><a href="http://dx.doi.org/10.1007/978-3-540-74810-6">http://dx.doi.org/10.1007/978-3-540-74810-6</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Intelligence and security informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517021 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;PAISI 2007 (2007 : Chengdu, China)<br/>Author&#160;PAISI 2007 (2007 : Chengdu, China),&#160;Yang, Christopher C.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000316<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540715498<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers ent://SD_ILS/0/SD_ILS:282943 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Adams, Carlisle 1961-<br/>Author&#160;Adams, Carlisle 1961-,&#160;Miri, Ali,&#160;Wiener, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S45 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540773597<br/> Formal aspects in security and trust : Fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papers ent://SD_ILS/0/SD_ILS:254405 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;FAST 2006 (2006 : Hamilton, Ont.)<br/>Author&#160;FAST 2006 (2006 : Hamilton, Ont.),&#160;Dimitrakos, Theo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F374 2007<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540752264<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517394 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;WISTP 2007 (2007 : Herakleion, Greece)<br/>Author&#160;WISTP 2007 (2007 : Herakleion, Greece),&#160;Sauveron, Damien,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000197<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540723547<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007. Proceedings. ent://SD_ILS/0/SD_ILS:517498 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security $n(4th :$d2007 :$cSaint Petersburg, Russia)<br/>Author&#160;International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security $n(4th :$d2007 :$cSaint Petersburg, Russia),&#160;Gorodetsky, Vladimir,&#160;Kotenko, Igor,&#160;Skormin, Victor A.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001125<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540739869&#160;9783540739852<br/><a href="http://dx.doi.org/10.1007/978-3-540-73986-9">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Advances in cryptology-- ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517548 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Conference on the Theory and Application of Cryptology and Information Security (13th : 2007 : Kuching, Sarawak)<br/>Author&#160;International Conference on the Theory and Application of Cryptology and Information Security (13th : 2007 : Kuching, Sarawak),&#160;Kurosawa, Kaoru,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000526<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540769002&#160;9783540768999<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517549 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar)<br/>Author&#160;Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar),&#160;Cervesato, Iliano,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000522<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540769293&#160;9783540769279<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> New technologies, mobility and security ent://SD_ILS/0/SD_ILS:517582 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Labiod, Houda<br/>Author&#160;Labiod, Houda,&#160;Badra, Mohamad,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000285<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781402062704&#160;9781402062698<br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:517882 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;BioSurveillance 2007 (2007 : New Brunswick, N.J.)<br/>Author&#160;BioSurveillance 2007 (2007 : New Brunswick, N.J.),&#160;Zeng, Daniel,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000318<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540726081&#160;9783540726074<br/><a href="http://dx.doi.org/10.1007/978-3-540-72608-1">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings ent://SD_ILS/0/SD_ILS:170904 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Conference on Information Systems Security (2nd : 2006 : Calcutta, India)<br/>Author&#160;International Conference on Information Systems Security (2nd : 2006 : Calcutta, India),&#160;Bagchi, Aditya,&#160;Atluri, Vijayalaksmi<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I576 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540689621<br/> Information assurance and computer security ent://SD_ILS/0/SD_ILS:174888 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco)<br/>Author&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco),&#160;Thomas, Johnson P.,&#160;Essaaidi, Mohamed<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N37 2005<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781586036782<br/> Verification of infinite-state systems with applications to security ent://SD_ILS/0/SD_ILS:164111 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z Format:&#160;Books<br/>Call Number&#160;Q295 V47 2005<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781586035709<br/> Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden ent://SD_ILS/0/SD_ILS:158206 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden)<br/>Author&#160;IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden),&#160;Fischer-Hubner, Simone<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S429 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387334059<br/> Cyberwar-Netwar : security in the information age ent://SD_ILS/0/SD_ILS:163942 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;NATO Advanced Research Workshop on Cyberwar-Netwar: Security in the Information Age ( 2003 : Lisbon, Portugal)<br/>Author&#160;NATO Advanced Research Workshop on Cyberwar-Netwar: Security in the Information Age ( 2003 : Lisbon, Portugal),&#160;Carvalho, Fernando Duarte,&#160;Silva, Eduardo Mateus da<br/>Format:&#160;Books<br/>Call Number&#160;UA929.95.E43 N37 2006<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781586036126<br/> Security and embedded systems ent://SD_ILS/0/SD_ILS:187244 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Giladi, Ran<br/>Author&#160;Giladi, Ran,&#160;Serpanos, Dimitrios Nikolaou,&#160;NATO Advanced Research Workshop on Security and Embedded Systems (2005 August 22-26 : Patras, Greece)<br/>Format:&#160;Books<br/>Call Number&#160;TK7895.E42 S42 2005<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781586035808<br/> Advances in information and computer security : first International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedings ent://SD_ILS/0/SD_ILS:142220 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Workshop on Security (1st : 2006 : Kyoto, Japan)<br/>Author&#160;International Workshop on Security (1st : 2006 : Kyoto, Japan),&#160;Yoshiura, Hiroshi<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I575 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540476993<br/> Security and cryptography for networks : 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedings ent://SD_ILS/0/SD_ILS:142230 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;SCN 2006 (2006 : Maiori, Italy)<br/>Author&#160;SCN 2006 (2006 : Maiori, Italy),&#160;De Prisco, Roberto, 1968-,&#160;Yung, Moti<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S42 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540380801<br/> Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile ent://SD_ILS/0/SD_ILS:116386 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile)<br/>Author&#160;IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile),&#160;Gaiti, Dominique,&#160;IFIP World Computer Congress (19th : 2006 : Santiago, Chile)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 I34 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387348254<br/> Applied public key infrastructure : 4th International Workshop : IWAP 2005 ent://SD_ILS/0/SD_ILS:174830 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Workshop for Applied PKI (4th : 2005 : Singapore)<br/>Author&#160;International Workshop for Applied PKI (4th : 2005 : Singapore),&#160;Zhou, Jianying<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I577 2005<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781586035501<br/> Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 &amp; WG 11.5 Joint Working Conference ent://SD_ILS/0/SD_ILS:116433 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP TC-11 WG 11.1 &amp; WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems (1st : 2005 : Fairfax, Va.)<br/>Author&#160;IFIP TC-11 WG 11.1 &amp; WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems (1st : 2005 : Fairfax, Va.),&#160;Dowland, Paul<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S427 2005<br/>Publisher&#160;Springer Verlag,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780387298269<br/> Proceedings of first international conference on cryptology in Malaysia : progress in cryptology :Mycrypt 2005, September 28-30, 2005, Kuala Lumpur, Malaysia ent://SD_ILS/0/SD_ILS:845847 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Conference on Cryptology in Malaysia (1st : 2005 : Kuala Lumpur, Malaysia)<br/>Author&#160;International Conference on Cryptology in Malaysia (1st : 2005 : Kuala Lumpur, Malaysia),&#160;Dawson, Ed (Edward) editor,&#160;Vaudenay, Serge, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I554 2005<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2005<br/>ISBN&#160;9783540289388<br/>Restricted to SpringerLink subscribers <a href=" http://www.loc.gov/catdir/enhancements/fy0663/2005932807-d.html"> http://www.loc.gov/catdir/enhancements/fy0663/2005932807-d.html</a> <a href=" http://www.loc.gov/catdir/enhancements/fy1401/2005932807-t.html"> http://www.loc.gov/catdir/enhancements/fy1401/2005932807-t.html</a><br/> Proceedings of the 1st international symposium on bio-inspired computing BIC'05, 5-7 September 2005, The Puteri Pan Pacific Hotel Johor Bahru, Malaysia ent://SD_ILS/0/SD_ILS:449872 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Symposium on Bio-Inspired Computing (1st : 2005 : Johor Bahru, Malaysia)<br/>Author&#160;International Symposium on Bio-Inspired Computing (1st : 2005 : Johor Bahru, Malaysia),&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat,&#160;Soft Computing Research Group,&#160;Group on Artificial Immune System and Security<br/>Format:&#160;Books<br/>Call Number&#160;QA76.618 I89 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/>ISBN&#160;9789834279400<br/> Security and privacy in ad-hoc and sensor networks : second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005 : revised selected papers ent://SD_ILS/0/SD_ILS:271750 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (2nd : 2005 : Visegrad, Hungary)<br/>Author&#160;European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (2nd : 2005 : Visegrad, Hungary),&#160;Molva, Refik,&#160;Tsudik, G. (Gene),&#160;Westhoff, Dirk<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 E97 2005<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2005<br/>ISBN&#160;9783540309123<br/> Information hiding : 7th international workshop, IH 2005, Barcelona, Spain, June 6-8, 2005 : revised selected papers ent://SD_ILS/0/SD_ILS:143331 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IH 2005 ( 2005 : Barcelona, Spain)<br/>Author&#160;IH 2005 ( 2005 : Barcelona, Spain),&#160;Barni, Mauro<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I534 2005<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2005<br/>ISBN&#160;9783540290391<br/> Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings ent://SD_ILS/0/SD_ILS:143340 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Conference on Information Systems Security( 1st : 2005 : Calcutta, India)<br/>Author&#160;International Conference on Information Systems Security( 1st : 2005 : Calcutta, India),&#160;Jajodia, Sushil,&#160;Mazumdar, Chandan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I576 2005<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2005<br/>ISBN&#160;9783540307068<br/> Trustworthy global computing : international symposium, TGC 2005, Edinburgh, UK, April 7-9, 2005 : revised selected papers ent://SD_ILS/0/SD_ILS:94621 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Symposium, TGC 2005 ( 2005 : Edinburgh, UK)<br/>Author&#160;International Symposium, TGC 2005 ( 2005 : Edinburgh, UK),&#160;De Nicola, Rocco,&#160;Sangiorgi, Davide<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T784 2005<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2005<br/>ISBN&#160;9783540300076<br/> A data reduction for intrusion detection using principal component analysis ent://SD_ILS/0/SD_ILS:377289 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Abdul Hanan Abdullah<br/>Author&#160;Abdul Hanan Abdullah,&#160;Dahliyusmanto,&#160;ECTI Annual Conference (1st : 2004 : Pattaya, Thailand)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A23 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Network control and engineering for QoS, security and mobility : IFIP TC6/WG6.2 &amp; WG6.7 Conference on Network Control and Engineering for QoS, Security, and Mobility (Net-Con 2002), October 23-25, 2002, Paris, France ent://SD_ILS/0/SD_ILS:410136 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP TC6/WG6.2 &amp; WG6.7 Conference on Network Control and Engineering for QoS, Security, and Mobility (2002 : Paris, France)<br/>Author&#160;IFIP TC6/WG6.2 &amp; WG6.7 Conference on Network Control and Engineering for QoS, Security, and Mobility (2002 : Paris, France),&#160;Gaiti, Dominique,&#160;Boukhatem, Nadia<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 I344 2003<br/>Publisher&#160;Kluwer Academic Publishers,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781402072680<br/> Financial cryptography : 6th International Conference, FC 2002 Southampton, Bermuda, March 11-14, 2002 : revised papers ent://SD_ILS/0/SD_ILS:397182 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands)<br/>Author&#160;International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands),&#160;Blaze, Matt<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 F56 2003<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2003<br/>ISBN&#160;9783540006466<br/> Certification and security in e-services : from e-government to e-business : IFIP 17th World Computer Congress, TC11 stream on security in e-services, August 26-29, 2002, Montr&#65533;eal, Qu&#65533;ebec, Canada ent://SD_ILS/0/SD_ILS:348679 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP World Computer Congress (17th : 2002 : Montreal, Quebec)<br/>Author&#160;IFIP World Computer Congress (17th : 2002 : Montreal, Quebec),&#160;Nardelli, Enrico,&#160;Posadziejewski, Sabina,&#160;Talamo, Maurizio<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I36 2003<br/>Publisher&#160;Kluwer Academic Pubs,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781402074936<br/> Research directions in data and applications security : IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK ent://SD_ILS/0/SD_ILS:363541 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP TC11/WG11.3 Working Conference on Database and Application Security (16th : 2002 : King's College, University of Cambridge)<br/>Author&#160;IFIP TC11/WG11.3 Working Conference on Database and Application Security (16th : 2002 : King's College, University of Cambridge),&#160;Gudes, Ehud,&#160;Shenoi, Sujeet<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 I34 2003<br/>Publisher&#160;Kluwer Academic Publishers,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781402075414<br/> Integrity and internal control in Information Systems V : IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany ent://SD_ILS/0/SD_ILS:364210 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP TC11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems (5th : 2002 : Bonn, Germany)<br/>Author&#160;IFIP TC11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems (5th : 2002 : Bonn, Germany),&#160;Gertz, Michael<br/>Format:&#160;Books<br/>Call Number&#160;T58.64 I34 2003<br/>Publisher&#160;Kluwer Academic Pubs,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781402074738<br/> Check point VPN-1/firewall-1 NG : administration ent://SD_ILS/0/SD_ILS:347414 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Shah, Inti<br/>Author&#160;Shah, Inti,&#160;Ratcliffe, Andrew<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S52 2003<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780072223422<br/> Information and communications security : 4th international conference, ICICS 2002, Singapore, December 9-12, 2002 : proceedings ent://SD_ILS/0/SD_ILS:394371 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Conference on Information and Communications Security (4th : 2002 : Singapore)<br/>Author&#160;International Conference on Information and Communications Security (4th : 2002 : Singapore),&#160;Deng, Robert<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I57 2002<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2002<br/>ISBN&#160;9783540001645<br/> Advances in cryptology-EUROCRYT 2002 : international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28-May 2, 2002 : proceedings ent://SD_ILS/0/SD_ILS:396477 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;EUROCRYPT (2002 : Amsterdam, Netherlands)<br/>Author&#160;EUROCRYPT (2002 : Amsterdam, Netherlands),&#160;Knudsen, Lars<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E87 2002<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2002<br/>ISBN&#160;9783540435532<br/> A novel key recovery scheme implemented in public key infrastructure ent://SD_ILS/0/SD_ILS:316205 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Teoh, Su Chi<br/>Author&#160;Teoh, Su Chi,&#160;Norbik Bashah Idris,&#160;World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T48 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Detection &amp; prevention of DoS attacks using intrusion detection system : design &amp; development ent://SD_ILS/0/SD_ILS:322481 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P376 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Digital certificate service using LDAP directory ent://SD_ILS/0/SD_ILS:322498 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Son, Yeo Yiin,&#160;Mazleena Salleh,&#160;Lui, Yeok Peng,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D53 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Security issues of mobile agents ent://SD_ILS/0/SD_ILS:322071 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Afzan Zaidi<br/>Author&#160;Afzan Zaidi,&#160;Mazleena Salleh,&#160;Abdul Hanan Abdullah,&#160;Malaysia Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.I58 A39 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Security guidelines of electronic academic assets ent://SD_ILS/0/SD_ILS:322088 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Mazleena Salleh,&#160;Shah Rizan Abdul Aziz,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S92 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Implementing advance encryption standard (AES) in virtual private network environment ent://SD_ILS/0/SD_ILS:316193 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Nik Shahidah Afifi Md. Taujuddin<br/>Author&#160;Nik Shahidah Afifi Md. Taujuddin,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N73 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Virtual private network tunneling protocol ent://SD_ILS/0/SD_ILS:322134 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Nik Shahidah Afifi Md. Taujuddin<br/>Author&#160;Nik Shahidah Afifi Md. Taujuddin,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;Malaysian Science and Technology Congress (2001 : Universiti Sains Malaysia, Pulau Pinang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N74 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/> Agent technology approach for proxy server ent://SD_ILS/0/SD_ILS:331108 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Fazidah Othman<br/>Author&#160;Fazidah Othman,&#160;Abdul Hanan Abdullah,&#160;Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F39 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001&#160;2000<br/> Recent advances in intrusion detection : third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 : proceedings ent://SD_ILS/0/SD_ILS:159459 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Debar, Herve, 1961-<br/>Author&#160;Debar, Herve, 1961-,&#160;Me, Ludovic, 1963-,&#160;Wu, S. Felix, 1963-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R44 2000<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2000<br/>ISBN&#160;9783540410850<br/> iPRO agent ent://SD_ILS/0/SD_ILS:146591 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Fazidah Othman<br/>Author&#160;Fazidah Othman,&#160;Abdul Hanan Abdullah,&#160;Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F38 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> Multimedia systems and applications II ent://SD_ILS/0/SD_ILS:143020 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Tescher, Andrew G.<br/>Author&#160;Tescher, Andrew G.,&#160;The International Society for Optical Engineering,&#160;Society of Photo-Optical Instrumentation Engineers<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 M856 1999 f<br/>Publisher&#160;SPIE,<br/>Publication Date&#160;1999<br/>ISBN&#160;9780819434388<br/> Multimedia systems and applications ent://SD_ILS/0/SD_ILS:143026 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Tescher, Andrew G.<br/>Author&#160;Tescher, Andrew G.,&#160;The International Society for Optical Engineering,&#160;Society of Photo-Optical Instrumentation Engineers<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 M855 1998 f<br/>Publisher&#160;SPIE,<br/>Publication Date&#160;1999&#160;1998<br/>ISBN&#160;9780819429896<br/> Optimal Construction of unconditionally secure id-based key sharing scheme for large-scale networks ent://SD_ILS/0/SD_ILS:396539 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Goichiro, Hanaoka<br/>Author&#160;Goichiro, Hanaoka<br/>Format:&#160;Books<br/>Call Number&#160;MAK 15912<br/>Publication Date&#160;1999<br/> ACOMEN '98 International Conference on Advanced Computational Methods in Engineering, Ghent, 2-4 September 1998 ent://SD_ILS/0/SD_ILS:490757 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;International Conference on Advanced Computational Methods in Engineering (1998 : Ghent, Belgium)<br/>Author&#160;International Conference on Advanced Computational Methods in Engineering (1998 : Ghent, Belgium),&#160;Van Keer, R,&#160;Vemuri, V. Rao<br/>Format:&#160;Books<br/>Call Number&#160;TA329 I32 1998<br/>Publisher&#160;Shaker Publishing B V,<br/>Publication Date&#160;1998<br/>ISBN&#160;9789042300552<br/> Information security and privacy : Second Australian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997 : proceedings ent://SD_ILS/0/SD_ILS:474100 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Varadharajan, Vijay<br/>Author&#160;Varadharajan, Vijay,&#160;Pieprzyk, Josef,&#160;Mu, Yi,&#160;Australian Conference on Information Security and Privacy (2nd : 1997 : Sydney, New South Wales)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I56 1997<br/>Publisher&#160;Springer,<br/>Publication Date&#160;1997<br/>ISBN&#160;9783540632320<br/> Practical UNIX and Internet security ent://SD_ILS/0/SD_ILS:416984 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Garfinkel, Simson<br/>Author&#160;Garfinkel, Simson,&#160;Spafford, Gene<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 G37 1996<br/>Edition&#160;2nd ed., expanded &amp; updated<br/>Publisher&#160;O'Reilly &amp; Associates,<br/>Publication Date&#160;1996<br/>ISBN&#160;9781565921481<br/> Security and control of information technology in society ent://SD_ILS/0/SD_ILS:307369 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society (1993 : Saint-Petersburg, Russia)<br/>Author&#160;IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society (1993 : Saint-Petersburg, Russia),&#160;Sizer, Richard<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I73 1993<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1994<br/>ISBN&#160;9780444818317<br/> Computer security : proceedings ent://SD_ILS/0/SD_ILS:334585 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.)<br/>Author&#160;IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.),&#160;Dougall, E. Graham<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I45 1993<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1993<br/>ISBN&#160;9780444817488<br/> Database security, V1 : status and prospects ent://SD_ILS/0/SD_ILS:334561 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP WG 11.3 Workshop on Database Security (6th : 1992 : Vancouver, Canada)<br/>Author&#160;IFIP WG 11.3 Workshop on Database Security (6th : 1992 : Vancouver, Canada),&#160;Thuraisingham, Bhavani M.,&#160;Landwehr, Carl E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 I45 1992<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1992<br/>ISBN&#160;9780444898890<br/> Computer security and information integrity ent://SD_ILS/0/SD_ILS:250462 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP International Conference on Computer Security and Information Integrity in Our Changing World (6th : 1990 : Espoo, Finland)<br/>Author&#160;IFIP International Conference on Computer Security and Information Integrity in Our Changing World (6th : 1990 : Espoo, Finland),&#160;Dittrich, Klaus R.,&#160;Rautakivi, Seppo,&#160;Saari, Juhani<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I44 1991<br/>Publisher&#160;Elseview Science Pub.,<br/>Publication Date&#160;1991<br/>ISBN&#160;9780444888594<br/> Database security, III : status and prospects ent://SD_ILS/0/SD_ILS:169479 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIG WG 11.3 Workshop on Database Security (3rd : 1989 : Monterey, Calif.)<br/>Author&#160;IFIG WG 11.3 Workshop on Database Security (3rd : 1989 : Monterey, Calif.),&#160;Spooner, David L.,&#160;Landwehr, Carl E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 I45 1989<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1990<br/>ISBN&#160;9780444887016<br/> Kertas kerja Seminar Keselamatan Komputer ent://SD_ILS/0/SD_ILS:258245 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Seminar Keselamatan Komputer (1990 : UTM, Sekudai)<br/>Author&#160;Seminar Keselamatan Komputer (1990 : UTM, Sekudai),&#160;Universiti Teknologi Malaysia. Institut Sains Komputer<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S45 1990 af<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1990<br/> Security and protection in information system ent://SD_ILS/0/SD_ILS:454623 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco)<br/>Author&#160;IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco),&#160;Grissonnanche, Andre<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I34 1986<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780444873453<br/> Computer security in the age of information ent://SD_ILS/0/SD_ILS:266219 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland)<br/>Author&#160;IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland),&#160;Caelli, William,&#160;International Federation for Information Processing<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I35 1988<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780444883247<br/> Fourth Aerospace Computer Security Applications Conference : Orlando, Florida, December 12-16, 1988 ent://SD_ILS/0/SD_ILS:236627 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Aerospace Computer Security Applications Conference (4th : 1988 : Orlando, Fla.)<br/>Author&#160;Aerospace Computer Security Applications Conference (4th : 1988 : Orlando, Fla.)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A39 1988<br/>Publisher&#160;Computer Society Press,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780818608957<br/> Database security : status and prospects ent://SD_ILS/0/SD_ILS:295553 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Landwehr, Carl E.<br/>Author&#160;Landwehr, Carl E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D32 D37 1988<br/>Publisher&#160;North Holland,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780444704795<br/> Proceedings of the Symposium on Security and Privacy, 1985, Oakland, California ent://SD_ILS/0/SD_ILS:189395 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Symposium on Security and Privacy (1985 : Oakland, California)<br/>Author&#160;Symposium on Security and Privacy (1985 : Oakland, California)<br/>Format:&#160;Books<br/>Call Number&#160;TK7885.S42 1985f<br/>Publisher&#160;IEEE Computer Soc,<br/>Publication Date&#160;1985<br/>ISBN&#160;9780818606298<br/> Computer security : a global challenge ent://SD_ILS/0/SD_ILS:296085 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada)<br/>Author&#160;IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada),&#160;Finch, James H.,&#160;Dougall, E. Graham<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I35 1984<br/>Publisher&#160;North Holland,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780444876188<br/> Computer security and integrity : proceedings ent://SD_ILS/0/SD_ILS:356767 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Symposium on Trends and Applications (1977 : Maryland)<br/>Author&#160;Symposium on Trends and Applications (1977 : Maryland),&#160;Institute of Electrical and Electronics Engineers. Computer Society<br/>Format:&#160;Books<br/>Call Number&#160;TK7885.A1 S98 1977 f<br/>Publisher&#160;IEEE,<br/>Publication Date&#160;1977<br/> Client/server image protection system using hybrid security approach : steganography &amp; cryptography ent://SD_ILS/0/SD_ILS:168918 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;belum proses<br/> Computer security : computer crime is a threat to be recognized by everyone ent://SD_ILS/0/SD_ILS:390593 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;Mohd. Daud Kasmuni<br/>Author&#160;Mohd. Daud Kasmuni,&#160;Seminar on EDP Audit and Controls a Better Realization of EDP Audit and Controls in Malaysia (1992 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;MAK 11739 a<br/> The need for security ent://SD_ILS/0/SD_ILS:104114 2024-04-20T16:22:24Z 2024-04-20T16:22:24Z by&#160;The Housley Computer Network Security Seminar (1987 : Melbourne)<br/>Author&#160;The Housley Computer Network Security Seminar (1987 : Melbourne),&#160;Davies, D. W.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H68 1987 f<br/>