|
741.
|
Construction and analysis of safe, secure, and interoperable smart devices : international workshop,CASSIS 2004, Marseille, France, March 10-14, 2004 ; revised selected papers
by Burdy, Lilian | Barthe, Gilles | Huisman, Marieke | Huisman, Marieke. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004 BAR] (1).
|
|
742.
|
Applied Cryptography and Network Security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
by Ioannidis, John | Keromytis, Angelos D | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 004 IOA] (1).
|
|
743.
|
Grid computing security
by Chakrabarti, Anirban. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHA] (1).
|
|
744.
|
Introduction to cryptography : principles and applications
by Delfs, Hans | Knebl, Helmut. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
|
|
745.
|
Formal correctness of security protocols
by Bella, Giampaolo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
|
|
746.
|
Security, privacy and trust in modern data management
by Petkovic, Milan | Jonker, Willem. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 PET] (1).
|
|
747.
|
Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting.
by Cole, Peter H | Ranasinghe, Damith C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 621.384 COL] (1).
|
|
748.
|
Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings
by Kotenko, Igor | Gorodetsky, Vladimir | Skormin, Victor A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 GOR] (1).
|
|
749.
|
Principles of protocol design
by Sharp, Robin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2008Availability: Items available for loan: [Call number: 004.62 SHA] (1).
|
|
750.
|
Security in computing systems : challenges, approaches and solutions
by Biskup, Joachim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 BIS] (1).
|
|
751.
|
Security engineering for service-oriented architectures
by Hafner, Michael | Breu, Ruth. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 004.22 HAF] (1).
|
|
752.
|
Computer network security : theory and practice
by Wang, Jie. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 WAN] (1).
|
|
753.
|
Security for web services and service-oriented architectures
by Bertino, Elisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.8 BER] (1).
|
|
754.
|
Security access in wireless local area networks: from architecture and protocols to realization
by Ma, Jianfeng. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 MAJ] (1).
|
|
755.
|
E-Technologies : innovation in an open world
by Babin, Gilbert | Kropf, Peter | Weiss, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Heidelberg: Springer, 2009Availability: Items available for loan: [Call number: 658.4038 BAB] (1).
|
|
756.
|
Emerging challenges for security, privacy and trust
by Gritzalis, Dimitris | Lopez, Javier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
|
|
757.
|
Trust Management III
by Ferrari, Elena. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005 FER] (1).
|
|
758.
|
Quantum private communication
by Zeng, Guihua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
|
|
759.
|
Handbook of information and communication security
by Stavroulakis, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
760.
|
Critical infrastructure protection III : Third IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, revised selected papers
by Palmer, Charles | Shenoi, Sujeet. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 621.38 PAL] (1).
|