1. Information hiding

by Petitcolas, Fabien A. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 PET] (1).
2. Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 2003 : revised papers

by Chae, Kijoon | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 CHA] (1).
3. Information Security Applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 ; revised selected papers

by Lim, Chae Hoon | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004 LIM] (1).
4. Digital Rights Management : Technological, Economic, Legal and Political Aspects

by Becker, Eberhard | Buhse, Willms | Gunnewig, Dirk | Rump, Niels.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BEC] (1).
5. Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
6. Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings

by Moskowitz, I. S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 MOS] (1).
7. Infrastructure Security : International Conference, Infrasec 2002 Bristol, UK, October 1-3, 2002 : Proceedings

by Davida, George | Frankel, Yair | Rees, Owen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 DAV] (1).
8. Information Security and Privacy

by Pieprzyk, Josef | Seberry, Jennifer.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 PIE] (1).
9. Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings

by Anderson, Ross.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
10. Privacy-preserving data mining : models and algorithms

by Aggarwal, Charu C | Yu, Philip S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.74 AGG] (1).
11. Advances in information processing and protection

by Pejas, Jerzy | Saeed, Khalid.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
12. Insider threats in cyber security

by Probst, Christian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
13. Information Assurance

by Blyth, Andrew.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 005.8 BLY] (1).
14. Foundations of security analysis and design VI : FOSAD tutorial lectures

by Aldini, Alessandro | Gorrieri, Roberto.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 004 ALD] (1).
15. Digital Watermarking : Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, revised papers

by Kalker, Ton | Cox, Ingemar J | Ro, Yong Man.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 KAL] (1).
16. Group privacy: new challenges of data technologies

by Taylor, Linnet | Floridi, Luciano [ed.] | Van der Sloot, Bart [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 TAY] (1).
17. Fraud prevention in online digital advertising

by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
18. Anomaly detection principles and algorithms

by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: No items available Checked out (1).
19. Compressed sensing for privacy-preserving data processing

by Testa, Matteo | Valsesia, Diego [aut] | Bianchi, Tiziano [aut] | Magli, Enrico [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2019Availability: Items available for loan: [Call number: 621.3822 TES] (1).
20. Secure networked inference with unreliable data sources

by Vempaty, Aditya | Kailkhura, Bhavya [aut] | Varshney, Pramod K [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 004.36 VEM] (1).

Powered by Koha