Computer networks - Congresses. - Security measures
Overview
Works: | 175 works in 147 publications in 147 languages |
---|
Titles
Principles of security and trust = first international conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012 : proceedings /
by:
(Electronic resources)
Information security technology for applications = 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010 : revised selected papers /
by:
(Electronic resources)
Recent trends in computer networks and distributed systems security = International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2012 = 14th International Workshop, Leuven, Belgium, September 9-12, 2012 : proceedings /
by:
(Electronic resources)
Computer information systems and industrial management = 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012 : proceedings /
by:
(Electronic resources)
Research in Attacks, Intrusions, and Defenses = 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012 : proceedings /
by:
(Electronic resources)
Information and communications security = 14th international conference, ICICS 2012, Hong Kong, China, October 29-31, 2012 : proceedings /
by:
(Electronic resources)
Secure IT systems = 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 : proceedings /
by:
(Electronic resources)
Financial cryptography and data security = FC 2012 workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012 : revised selected papers /
by:
(Electronic resources)
Information and communication technology = second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014 : proceedings /
by:
(Electronic resources)
Best practices in computer network defense = incident detection and response /
by:
(Electronic resources)
Security and trust management = 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014 : proceedings /
by:
(Electronic resources)
Cryptographic hardware and embedded systems - CHES 2014 = 16th International Workshop, Busan, South Korea, September 23-26, 2014 : proceedings /
by:
(Electronic resources)
Information systems security = 10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings /
by:
(Electronic resources)
Trustworthy global computing = 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014 : revised selected papers /
by:
(Electronic resources)
Security protocols XVIII = 18th International Workshop, Cambridge, UK, March 24-26, 2010 : revised selected papers /
by:
(Electronic resources)
Trust management IX = 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /
by:
(Electronic resources)
International Conference on Security and Privacy in Communication Networks = 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers.. Part II /
by:
(Electronic resources)
Practical deployment of Cisco Identity Services Engine (ISE) = real-world examples of AAA deployments /
by:
(Electronic resources)
Trustworthly global computing = 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, revised selected papers /
by:
(Language materials, printed)
Trust, privacy and security in digital business = 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, proceedings /
by:
(Language materials, printed)
Security and cryptography for networks = 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, proceedings /
by:
(Language materials, printed)
Global security, safety, and sustainability = 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, proceedings /
by:
(Language materials, printed)
Security-enriched urban computing and smart grid = First International Conference, SUComS 2010, Daejeon, Korea, September 15-17, 2010, proceedings /
by:
(Language materials, printed)
Computer network security = 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, proceedings/
by:
(Language materials, printed)
Recent trends in network security and applications = third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010, proceedings /
by:
(Language materials, printed)
Autonomic and trusted computing = 7th international conference, ATC 2010, Xi'an, China, October 26-29, 2010 : proceedings /
by:
(Language materials, printed)
Public key infrastructures, services and applications = 6th European workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009 : revised selected papers /
by:
(Language materials, printed)
Decision and game theory for security = First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010, proceedings /
by:
(Language materials, printed)
Advances in Information and computer security = 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, proceedings /
by:
(Language materials, printed)
Cryptology and network security = 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, proceedings /
by:
(Language materials, printed)
Critical infrastructure protection IV = Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, revised selected papers/
by:
(Language materials, printed)
Policies and research in identity management = Second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010, proceedings /
by:
(Language materials, printed)
Security technology, disaster recovery and business continuity = International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010, proceedings /
by:
(Language materials, printed)
Security and privacy in communication networks = 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, proceedings /
by:
(Language materials, printed)
Advances in networks and communications = first International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011 : proceedings.. Part II /
by:
(Electronic resources)
Advances in computer science and information technology = first International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011 : proceedings.. Part I /
by:
(Electronic resources)
Open research problems in network security = IFIP WG 11.4 international workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010 : revised selected papers /
by:
(Electronic resources)
RFID: Security and privacy = 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Theory of security and applications = Joint Workshop, TOSCA 2011, Saarbrucken, Germany, March 31 - April 1, 2011 : revised selected papers /
by:
(Electronic resources)
Achieving systems safety = proceedings of the twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012 /
by:
(Electronic resources)
Data privacy management and autonomous spontaneus security = 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011 : revised selected papers /
by:
(Electronic resources)
Information security practice and experience = 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012 : proceedings /
by:
(Electronic resources)
Information security technology for applications = 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011 : revised selected papers /
by:
(Electronic resources)
Security and trust management = 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011 : revised selected papers /
by:
(Electronic resources)
Communications and multimedia security = 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom /
by:
(Electronic resources)
Trust management VI = 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings /
by:
(Electronic resources)
Intelligence and security informatics = Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012 : proceedings /
by:
(Electronic resources)
Security and cryptography for networks = 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012 : proceedings /
by:
(Electronic resources)
Theoretical aspects of computing - ICTAC 2012 = 9th International Colloquium, Bangalore, India, September 24-27, 2012 : proceedings /
by:
(Electronic resources)
omputer security - ESORICS 2012 = 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 : proceedings /
by:
(Electronic resources)
Security and privacy in communication networks = 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011 : revised selected papers /
by:
(Electronic resources)
Future security = 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012 : proceedings /
by:
(Electronic resources)
ICT critical infrastructures and society = 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012 : proceedings /
by:
(Electronic resources)
Stabilization, safety, and security of distributed systems = 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012 : proceedings /
by:
(Electronic resources)
Computer network security = 6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012 : proceedings /
by:
(Electronic resources)
Computer applications for security, control and system engineering = International Conferences, SecTech, CA, CES3 2012, held in conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012 : proceedings /
by:
(Electronic resources)
Advances in information and computer security = 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012 : proceedings /
by:
(Electronic resources)
Decision and game theory for security = third international conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012 : proceedings /
by:
(Electronic resources)
Network and system security = 6th international conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings /
by:
(Electronic resources)
Information security applications = 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012 : revised selected papers /
by:
(Electronic resources)
Network computing and information security = second international conference, NCIS 2012, Shanghai, China, December 7-9, 2012 : proceedings /
by:
(Electronic resources)
ISSE 2012 securing electronic business processes = highlights of the Information Security Solutions Europe 2012 Conference /
by:
(Electronic resources)
Critical infrastructure protection VI = 6th IFIP WG 11.10 international conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012 : revised selected papers /
by:
(Electronic resources)
Cyber warfare = techniques, tactics and tools for security practitioners /
by:
(Electronic resources)
ICT and critical infrastructure = proceedings of the 48th Annual Convention of Computer Society of India.. Volume II /
by:
(Electronic resources)
ICT and critical infrastructure = proceedings of the 48th Annual Convention of Computer Society of India.. Volume I /
by:
(Electronic resources)
Computational intelligence, cyber security and computational models = proceedings of ICC3, 2013 /
by:
(Electronic resources)
Recent trends in computer networks and distributed systems security = second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014 : proceedings /
by:
(Electronic resources)
Trustworthy global computing = 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013 : revised selected papers /
by:
(Electronic resources)
Data privacy management and autonomous spontaneous security = 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013 : revised selected papers /
by:
(Electronic resources)
Information security practice and experience = 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014 : proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2014 = 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014 : proceedings /
by:
(Electronic resources)
Recent advances in information and communication technology = proceedings of the 10th International Conference on Computing and Information Technology (IC2IT2014) /
by:
(Electronic resources)
Trust Management VIII = 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014 : proceedings /
by:
(Electronic resources)
Trustworthy computing and services = International Conference, ISCTCS 2013, Beijing, China, November 2013 : revised selected papers /
by:
(Electronic resources)
Applied cryptography and network security = 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing = 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 - July 2, 2014 : proceedings /
by:
(Electronic resources)
Monitoring and securing virtualized networks and services = 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 - July 3, 2014 : proceedings /
by:
(Electronic resources)
Cyber warfare = techniques, tactics and tools for security practitioners /
by:
(Electronic resources)
Cyber security and privacy = third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers /
by:
(Electronic resources)
Applications and techniques in information security = 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014 : proceedings /
by:
(Electronic resources)
Emerging ICT for bridging the future = proceedings of the 49th Annual Convention of the Computer Society of India (CSI).. Volume 1 /
by:
(Electronic resources)
Emerging ICT for bridging the future = proceedings of the 49th Annual Convention of the Computer Society of India CSI.. Volume 2 /
by:
(Electronic resources)
Risks and security of internet and systems = 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014 : revised selected papers /
by:
(Electronic resources)
Information security practice and experience = 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015 : proceedings /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2015 = 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015 : proceedings.. Part I /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2015 = 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015 : proceedings.. Part II /
by:
(Electronic resources)
ICT systems security and privacy protection = 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /
by:
(Electronic resources)
Future network systems and security = First International Conference, FNSS 2015, Paris, France, June 11-13, 2015 : proceedings /
by:
(Electronic resources)
Trustworthy computing and services = International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 : revised selected papers /
by:
(Language materials, printed)
Information security and privacy = 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015 : proceedings /
by:
(Language materials, printed)
Intelligent mechanisms for network configuration and security = 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015 : proceedings /
by:
(Language materials, printed)
Data and applications security and privacy XXIX = 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015 : proceedings /
by:
(Language materials, printed)
Human aspects of information security, privacy, and trust = third International Conference, HAS 2015, held as part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015 : proceedings /
by:
(Electronic resources)
Critical infrastructure protection IX = 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015 : revised selected papers /
by:
(Electronic resources)
Applications and techniques in information security = 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
by:
(Electronic resources)
Information and communication technology = third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, held as part of WCC 2015, Daejeon, Korea, October 4-7, 2015 : proceedings /
by:
(Electronic resources)
Computer information systems and industrial management = 14th IFIP TC 8 International Conference, CISIM 2015, Warsaw, Poland, September 24-26, 2015 : proceedings /
by:
(Electronic resources)
Security and trust management = 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015 : proceedings /
by:
(Electronic resources)
Information systems security and privacy = first International Conference, ICISSP 2015, Angers, France, February 9-11, 2015 : revised selected papers /
by:
(Electronic resources)
Innovative security solutions for information technology and communications = 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : revised selected papers /
by:
(Electronic resources)
Trusted systems = 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers /
by:
(Electronic resources)
Applied cryptography and network security = 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : revised selected papers /
by:
(Electronic resources)
Security and privacy in communication networks = 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015 : revised selected papers /
by:
(Electronic resources)
Transactions on large-scale data- and knowledge-centered systems XXIII = selected papers from FDSE 2014 /
by:
(Electronic resources)
Trustworthy global computing = 10th International Symposium, TGC 2015 Madrid, Spain, August 31 - September 1, 2015 : revised selected papers /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2016 = the Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016 : proceedings /
by:
(Electronic resources)
Graphical models for security = second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015 : revised selected papers /
by:
(Electronic resources)
Trusted systems = 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015 : revised selected papers /
by:
(Electronic resources)
Critical information infrastructures security = 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers /
by:
(Electronic resources)
Risks and security of internet and systems = 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015 : revised selected papers /
by:
(Electronic resources)
Open problems in network security = IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015 : revised selected papers /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2016 = 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.. Part I /
by:
(Electronic resources)
Advances in cryptology - EUROCRYPT 2016 = 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016 : proceedings.. Part II /
by:
(Electronic resources)
ICT systems security and privacy protection = 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings /
by:
(Electronic resources)
Human aspects of information security, privacy, and trust = 4th international conference, HAS 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings /
by:
(Electronic resources)
Applied cryptography and network security = 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings /
by:
(Electronic resources)
Management and security in the age of hyperconnectivity = 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016 : proceedings /
by:
(Electronic resources)
Information security and privacy = 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.. Part I /
by:
(Electronic resources)
Security of industrial control systems and cyber physical systems = first Workshop, CyberICS 2015 and first Workshop, WOS-CPS 2015 Vienna, Austria, September 21-22, 2015 : revised selected papers /
by:
(Electronic resources)
Trust management X = 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 : proceedings /
by:
(Electronic resources)
Information security and privacy = 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016 : proceedings.. Part II /
by:
(Electronic resources)
Foundations of security analysis and design VIII = FOSAD 2014/2015/2016 tutorial lectures /
by:
(Electronic resources)
Security and cryptography for networks = 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016 : proceedings /
by:
(Electronic resources)
Trust and trustworthy computing = 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016 : proceedings /
by:
(Electronic resources)
Progress in cryptology - INDOCRYPT 2012 = 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012 : proceedings /
by:
(Electronic resources)
Information systems security = 8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
by:
(Electronic resources)
Trusted systems = 4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings /
by:
(Electronic resources)
Cryptology and network security = 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
(Electronic resources)
Foundations of security analysis and design VII = FOSAD 2012/2013 tutorial lectures /
by:
(Electronic resources)
Communication technologies, information security and sustainable development = Third International Multi-topic Conference, IMTIC 2013, Jamshoro, Pakistan, December 18-20, 2013 : revised selected papers /
by:
(Electronic resources)
Trust and trustworthy computing = 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015 : proceedings /
by:
(Electronic resources)
Vulnerability analysis on the computer network security : = implementation and practices /
by:
(Language materials, printed)
Vulnerability scanner : = computer program, computer, computer network /
by:
(Language materials, printed)
Security and intelligent information systems = International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011 : revised selected papers /
by:
(Electronic resources)
Open problems in network security = IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011 : revised selected papers /
by:
(Electronic resources)
Information security applications = 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011 : revised selected papers /
by:
(Electronic resources)
Trusted systems = third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011 : revised selected papers /
by:
(Electronic resources)
Global security, safety, and sustainability & e-Democracy = 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011 : revised selected papers /
by:
(Electronic resources)
Information theoretic security = 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings /
by:
(Electronic resources)
Trust, privacy and security in digital business = 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012 : proceedings /
by:
(Electronic resources)
Handbook on securing cyber-physical critical infrastructure = foundation and challenges /
by:
(Electronic resources)
Real-time security extensions for EPCglobal networks = case study for the pharmaceutical industry /
by:
(Electronic resources)
ICT systems security and privacy protection = 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014 : proceedings /
by:
(Electronic resources)
Security in computing and communications = Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : proceedings /
by:
(Electronic resources)
Security and cryptography for networks = 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014 : proceedings /
by:
(Electronic resources)
ISSE 2014 securing electronic business processes = highlights of the Information Security Solutions Europe 2014 Conference /
by:
(Electronic resources)
Secure IT systems = 19th Nordic Conference, NordSec 2014, Tromso, Norway, October 15-17, 2014 : proceedings /
by:
(Electronic resources)
Network and system security = 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014 : proceedings /
by:
(Electronic resources)
Cryptology and network security = 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014 : proceedings /
by:
(Electronic resources)
Decision and game theory for security = 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014 : proceedings /
by:
(Electronic resources)
Computer information systems and industrial management = 13th IFIP TC8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014 : proceedings /
by:
(Electronic resources)
Security in computing and communications = third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015 : proceedings /
by:
(Electronic resources)
Show more
Fewer
Subjects