|
1.
|
Information Security and Privacy
by Pieprzyk, Josef | Seberry, Jennifer. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 PIE] (1).
|
|
2.
|
Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings
by Anderson, Ross. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
|
|
3.
|
Trust Management II : proceedings of IFIPTM 2008 : Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway
by Karabulut, Yucel | Herrmann, Peter | Jensen, Christian Damsgaard | Mitchell, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005 KAR] (1).
|
|
4.
|
Advances in information processing and protection
by Pejas, Jerzy | Saeed, Khalid. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
|
|
5.
|
Preserving privacy in data outsourcing
by Foresti, Sara. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
6.
|
Attribute-based credentials for trust : identity in the information society
by Rannenberg, Kai | Camenisch, Jan | Sabouri, Ahmad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.8223 RAN] (1).
|
|
7.
|
Information hiding and applications
by Pan, Jeng-Shyang | Huang, Hsiang-Cheh | Jain, Lakhmi C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.82 PAN] (1).
|
|
8.
|
Fraud prevention in online digital advertising
by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
|
|
9.
|
Understanding high-dimensional spaces
by Skillicorn, David B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer, 2012Availability: Items available for loan: [Call number: 006.312 SKI] (1).
|
|
10.
|
Primer on client-side web security
by De Ryck, Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).
|
|
11.
|
Anomaly detection principles and algorithms
by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: No items available Checked out (1).
|
|
12.
|
Cryptology transmitted message protection : from deterministic chaos up to optical vortices
by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey. Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
|