250 results on '"Electronic data processing—Management"'
Search Results
2. Theory and Practice of Natural Computing : 8th International Conference, TPNC 2019, Kingston, ON, Canada, December 9–11, 2019, Proceedings
3. Smart Card Research and Advanced Applications : 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papers
4. Topics in Cryptology – CT-RSA 2017 : The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings
5. Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings
6. Cloud Computing and Security : Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II
7. Decision and Game Theory for Security : 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings
8. Cloud Computing and Security : Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I
9. Enterprise Security : Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papers
10. Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II
11. Computer Security – ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I
12. Computer Security – ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II
13. Computer Algebra in Scientific Computing : 19th International Workshop, CASC 2017, Beijing, China, September 18-22, 2017, Proceedings
14. Progress in Cryptology – INDOCRYPT 2017 : 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings
15. Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology : Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers
16. Simulation and Synthesis in Medical Imaging : Second International Workshop, SASHIMI 2017, Held in Conjunction with MICCAI 2017, Québec City, QC, Canada, September 10, 2017, Proceedings
17. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings
18. Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I
19. Wireless Algorithms, Systems, and Applications : 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings
20. Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II
21. Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I
22. Advances in Cryptology – CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I
23. Advances in Cryptology – CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III
24. Advances in Cryptology – CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II
25. Advances in Cryptology – EUROCRYPT 2016 : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II
26. Advances in Cryptology – EUROCRYPT 2016 : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I
27. Principles of Security and Trust : 5th International Conference, POST 2016, Held As Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings
28. Public-Key Cryptography – PKC 2016 : 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II
29. Public-Key Cryptography – PKC 2016 : 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
30. Energy Informatics : 4th D-A-CH Conference, EI 2015, Karlsruhe, Germany, November 12-13, 2015, Proceedings
31. Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings
32. Theory of Cryptography : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II
33. Theory of Cryptography : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I
34. The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday
35. Data Privacy Management and Security Assurance : 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
36. Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II
37. Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I
38. Provable Security : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings
39. Decision and Game Theory for Security : 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings
40. Multiple Access Communications : 9th International Workshop, MACOM 2016, Aalborg, Denmark, November 21-22, 2016, Proceedings
41. Progress in Cryptology – INDOCRYPT 2016 : 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings
42. Security, Privacy, and Applied Cryptography Engineering : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings
43. Stabilization, Safety, and Security of Distributed Systems : 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedings
44. Security Standardisation Research : Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedings
45. Future Data and Security Engineering : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings
46. Smart Card Research and Advanced Applications : 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers
47. Information Security and Cryptology - ICISC 2015 : 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers
48. Advances in Network Science : 12th International Conference and School, NetSci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedings
49. Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I
50. Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.