|
1.
|
Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003 : Proceedings
by Boyd, Colin | Mao, Wenbo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 BOY] (1).
|
|
2.
|
Security Protocols : 10th International Workshop, Cambridge, UK, April, 2002 : Revised Papers
by Christianson, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2004Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
3.
|
Recent Advances in Intrusion Detection : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003 : Proceedings
by Vigna, Giovanni | Jonsson, Erland | Kruegel, Christopher. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 VIG] (1).
|
|
4.
|
Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers
by Christianson, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
5.
|
Composition of Secure Multi-Party Protocols : Comprehensive Study
by Lindell, Yehuda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).
|
|
6.
|
Trust Management IV
by Nishigaki, Masakatsu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005 NIS] (1).
|
|
7.
|
Information systems security : 6th international conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. proceedings
by Mathuria, Anish | Jha, Somesh. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 004 MAT] (2).
|
|
8.
|
Information flow based security control beyond RBAC how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
by Fischer-Hellmann, Klaus-Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Wiesbaden: Springer-Verlag, 2012Availability: Items available for loan: [Call number: 005.8 FIS] (1).
|
|
9.
|
Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings
by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
|