1. Cryptography and coding : 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings. ([2015]) Other Names: Groth, Jens; IMA International Conference, 15th Record Type: Book Extent: 1 online resource (x, 328 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Cyber smart : five habits to protect your family, money, and identity from cyber criminals /: five habits to protect your family, money, and identity from cyber criminals. ([2019]) Authors: McDonough, Bart R Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Availability, reliability, and security in information systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings /: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings. (2016) Editors: Buccafurri, Francesco; Holzinger, Andreas; Kieseberg, Peter; Tjoa, A Min; Weippl, Edgar R Other Names: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference; Workshop on Privacy Aware Machine Learning for Health Data Science Record Type: Book Extent: 1 online resource (xii, 267 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Applied cryptography and network security : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings /: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. (2017) Editors: Gollmann, Dieter; Professor, Miyaji, Atsuko; Kikuchi, Hiroaki, 1965- Other Names: ACNS (Conference), 15th Record Type: Book Extent: 1 online resource (xvi, 710 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Steganography Techniques for Digital Images. ([2019]) Authors: Yahya, Abid Record Type: Book Extent: 1 online resource (xvi, 122 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Security, privacy, and applied cryptography engineering : 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings /: 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings. (2018) Editors: Chattopadhyay, Anupam; Rebeiro, Chester; Yarom, Yuval Other Names: SPACE (Conference : Applied cryptography engineering), 9th Record Type: Book Extent: 1 online resource (xxx, 219 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Cryptography and information security in the Balkans : first international conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised selected papers /: first international conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised selected papers. (2015) Editors: Yalcin, Siddika Berna Ors; Preneel, Bart, 1963- Other Names: BalkanCryptSec (Conference), 1st Record Type: Book Extent: 1 online resource (x, 251 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Progress in cryptology -- LATINCRYPT 2015 : 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings /: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings. (2015) Editors: Lauter, Kristin E (Kristin Estella), 1969-; Rodríguez-Henríquez, Francisco Other Names: International Conference on Cryptology and Information Security in Latin America, 4th Record Type: Book Extent: 1 online resource (xii, 385 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Constructive side-channel analysis and secure design : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised selected papers /: 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised selected papers. (2015) Editors: Mangard, Stefan; Poschmann, Axel Y Other Names: COSADE (Workshop), 6th Record Type: Book Extent: 1 online resource (x, 271 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Applied cryptography and network security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings /: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. (2016) Editors: Manulis, Mark; Sadeghi, Ahmad-Reza; Schneider, Steve Other Names: ACNS (Conference), 14th Record Type: Book Extent: 1 online resource (xiv, 668 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗