91. Advances in cryptology -- EUROCRYPT 2018. 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings /: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings. Part I : (2018) Editors: Nielsen, Jesper Buus, 1973-; Rijmen, Vincent, 1970- Other Names: EUROCRYPT (Conference), 37th Record Type: Book Extent: 1 online resource (xxvii, 625 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
92. Intelligent computing methodologies. 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings /: 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings. Part III : (2018) Editors: Huang, De-Shuang; Gromiha, M. Michael; Han, Kyungsook; Hussain, Abir Other Names: International Conference on Intelligent Computing, 14th Record Type: Book Extent: 1 online resource (XXII, 874 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
93. Advances in cryptology -- EUROCRYPT 2018. 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings /: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings. Part III : (2018) Editors: Nielsen, Jesper Buus, 1973-; Rijmen, Vincent, 1970- Other Names: EUROCRYPT (Conference), 37th Record Type: Book Extent: 1 online resource (xix, 719 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
94. Advances in cryptology -- EUROCRYPT 2018. 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings /: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings. Part II : (2018) Editors: Nielsen, Jesper Buus, 1973-; Rijmen, Vincent, 1970- Other Names: EUROCRYPT (Conference), 37th Record Type: Book Extent: 1 online resource (xix, 805 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
95. Advances in information and computer security : 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings /: 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings. ([2018]) Editors: Inomata, Atsuo; Yasuda, Kan Other Names: International Workshop on Security, 13th Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
96. IT security risk control management : an audit preparation plan /: an audit preparation plan. (©2016) Other Names: Pompon, Raymond Record Type: Book Extent: 1 online resource (328 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
97. Computer and cyber security : principles, algorithm, applications, and perspectives /: principles, algorithm, applications, and perspectives. (2018) Editors: Gupta, Brij, 1982- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
98. Privacy-enhancing fog computing and its applications. ([2018]) Authors: (Computer scientist), Lin, Xiaodong; Ni, Jianbing; Shen, X (Xuemin), 1958- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
99. Practical Internet of things security : design a security framework for an Internet connected ecosystem /: design a security framework for an Internet connected ecosystem. (2018) Other Names: Russell, Brian; Duren, Drew Van Record Type: Book Extent: 1 online resource (382 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
100. Trusted computing for embedded systems. ([2015]) Editors: Candaele, Bernard; Soudris, Dimitrios; Anagnostopoulos, Iraklis Other Names: Candaele, Bernard Record Type: Book Extent: 1 online resource (315 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗