Catalog
Home
(current)
About
Tutorials
Electronic Resources
New Titles
Institutional Repository
My Account
Basic Search
Browse the Catalog
Advanced Search
0
Records In Basket
View Basket
Place Holds
Print Title Details
Email Title Details
Add Basket to Saved List
Clear Basket
Search Results
Catalog Search
Search:
Type:
Keyword
Title
Journal Title
Author
Subject
Series
Format:
All Formats
All Books
All Music
All Videos
Audiocassette music recording
Blu-ray
Braille
Cassette audiobook
CD Audiobook
CD Music recording
DVD
E-audio
E-book
E-video
Equipment, games, toys
Kit
Large Print Book
Map
Microform
Music Score
Phonograph music recording
Phonograph spoken recording
Picture
Preloaded Audio
Serials and magazines
Software and video games
VHS
Library:
IPICYT
Biblioteca
Biblioteca Ipicyt
Search
[
2 filters applied
]
Additional search filters and navigation
Refine these results
Back to results
Sort Results
Sort by Relevance
Title: A to Z
Title: Z to A
Author: A to Z
Author: Z to A
Date: Newest to Oldest
Date: Oldest to Newest
Most Popular
Popularity Adjusted Relevance
Show More Details
Disable Highlighting
Limit to Available Items
Group By Formats and Editions
Show Results from All Libraries
Exclude Electronic Resources
◄
Previous
5
6
7
8
9
Next
►
Results
81
-
90
of
608
(page
9
of
61
)
Personal Author
Meersman, Robert
(9)
Shi, Yun Q.
(8)
Chen, Liqun
(7)
Bao, Feng
(5)
More
Topic Subject
Data protection
(608)
Systems and Data Security
(608)
Computer science
(590)
Computer Science
(587)
More
Series Title
SpringerBriefs in Computer Science
(19)
SpringerBriefs in Electrical and Computer Engineering
(3)
Advanced Information and Knowledge Processing
(2)
Information Security and Cryptography, Texts and Monographs
(2)
More
Select 81 - 90
0
selected
Reached limit!
Clear basket
81
Cryptographic Protocol Security Analysis Based on Trusted Freshness
E-book (2012.)
Dong, Ling.
Add to basket
Remove from basket
82
Quantitative Security Risk Assessment of Enterprise Networks
E-book (2011.)
Ou, Xinming.
Add to basket
Remove from basket
83
IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings
E-book (2008.)
Akar, Nail.
Add to basket
Remove from basket
84
Model-Driven Risk Analysis The CORAS Approach
E-book (2011.)
Lund, Mass Soldal.
Add to basket
Remove from basket
85
Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings
E-book (2013.)
Gierlichs, Benedikt.
Add to basket
Remove from basket
86
Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research
E-book (2011.)
Keromytis, Angelos D.
Add to basket
Remove from basket
87
Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers
E-book (2013.)
Adams, Andrew A.
Add to basket
Remove from basket
88
Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings
E-book (2009.)
Gritzalis, Dimitris.
Add to basket
Remove from basket
89
Evaluation of Electronic Voting Requirements and Evaluation Procedures to Support Responsible Election Authorities
E-book (2009.)
Volkamer, Melanie.
Add to basket
Remove from basket
90
Introduction to Public Key Infrastructures
E-book (2013.)
Buchmann, Johannes A.
Add to basket
Remove from basket
Search Results Facets
Search Results List
Personal Author
Meersman, Robert
(9)
Shi, Yun Q.
(8)
Chen, Liqun
(7)
Bao, Feng
(5)
More
Topic Subject
Data protection
(608)
Systems and Data Security
(608)
Computer science
(590)
Computer Science
(587)
More
Series Title
SpringerBriefs in Computer Science
(19)
SpringerBriefs in Electrical and Computer Engineering
(3)
Advanced Information and Knowledge Processing
(2)
Information Security and Cryptography, Texts and Monographs
(2)
More
Login To Evergreen
Library Card Number
PIN
Forgot Your Password?
Additional Resources