352 results
Search Results
2. Enterprise Security : Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papers
3. Cloud Computing and Security : Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I
4. Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology : Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers
5. Arithmetic of Finite Fields : 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers
6. Cloud Computing and Security : Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II
7. Foundations and Practice of Security : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers
8. Constructive Side-Channel Analysis and Secure Design : 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers
9. Innovative Security Solutions for Information Technology and Communications : 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers
10. Lightweight Cryptography for Security and Privacy : 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers
11. Information Security and Cryptology : 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers
12. Digital-Forensics and Watermarking : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers
13. Selected Areas in Cryptography - SAC 2015 : 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers
14. Information Security and Cryptology - ICISC 2015 : 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers
15. Information and Communications Security : 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers
16. Cloud Computing and Security : Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II
17. Cloud Computing and Security : Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I
18. Information and Communications Security : 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
19. Technology and Practice of Passwords : International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers
20. Information Security and Cryptology : 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers
21. Lightweight Cryptography for Security and Privacy : Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers
22. Information Security and Cryptology : 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers
23. Digital Forensics and Watermarking : 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers
24. Smart Card Research and Advanced Applications : 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papers
25. Ad Hoc Networks : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers
26. Pairing-Based Cryptography -- Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers
27. Smart Card Research and Advanced Applications : 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers
28. Information Hiding : 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers
29. Trustworthy Global Computing : 7th International Symposium, TGC 2012, Newcastle Upon Tyne, UK, September 7-8, 2012, Revised Selected Papers
30. Advanced Infocomm Technology : 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected Papers
31. Smart Card Research and Advanced Applications : 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers
32. Information Security and Cryptology - ICISC 2011 : 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
33. Security Protocols XX : 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers
34. Security Protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers
35. Theory of Security and Applications : Joint Workshop, TOSCA 2011, Saarbrücken, Germany,March 31-April 1, 2011, Revised Selected Papers
36. Information Security and Cryptology : 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers
37. Selected Areas in Cryptography : 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected Papers
38. Information Security Applications : 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers
39. Financial Cryptography and Data Security : 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers
40. Constructive Side-Channel Analysis and Secure Design : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers
41. Arithmetic of Finite Fields : 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers
42. Selected Areas in Cryptography : 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers
43. Fast Software Encryption : 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers
44. Smart Card Research and Advanced Applications : 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers
45. Information Hiding : 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers
46. Trusted Systems : Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers
47. Information Security Applications : 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
48. Information Security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
49. Public Key Infrastructures, Services and Applications : 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers
50. Selected Areas in Cryptography -- SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.