LNCS sublibrary, SL 4, Security and cryptology
Resource Information
The series LNCS sublibrary, SL 4, Security and cryptology represents a set of related resources, especially of a specified kind, found in Boston University Libraries.
The Resource
LNCS sublibrary, SL 4, Security and cryptology
Resource Information
The series LNCS sublibrary, SL 4, Security and cryptology represents a set of related resources, especially of a specified kind, found in Boston University Libraries.
- Label
- LNCS sublibrary, SL 4, Security and cryptology
- Authority link
-
- uri http://id.loc.gov/authorities/names/no2007042442
- uri http://viaf.org/viaf/sourceID/LC|no2007042442
- Title number
- SL 4
- Title part
- Security and cryptology
59 Items in the Series LNCS sublibrary, SL 4, Security and cryptology
Context
Context of LNCS sublibrary, SL 4, Security and cryptologyMembers
No resources found
No enriched resources found
- Trusted computing, challenges and applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008 : Proceedings
- Advances in cryptology-- ASIACRYPT 2007 : 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedings
- Advances in cryptology--ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings
- Advances in information and computer security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008, proceedings
- Computer security -- ESORICS 2009 : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009 : proceedings
- Critical information infrastructures security : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers
- Critical information infrastructures security : third international workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 : revised papers
- Cryptographic ahrdware and embedded systems : CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008 : proceedings
- Cryptographic hardware and embedded systems - CHES 2009 : 11th international workshop, Lausanne, Switzerland, September 6-9, 2009 ; proceedings
- Cryptography and coding : 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 : proceedings
- Cryptology and network security : 6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedings
- Cryptology and network security : 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings
- Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings
- Digital watermarking : 7th international workshop, IWDW 2008, Busan, Korea, November 10-12, 2008 : selected papers
- Digital watermarking : 8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings
- E-voting and identity : first international conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007 : revised selected papers
- E-voting and identity : second international conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009 proceedings
- Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
- Financial cryptography and data security : 12th international conference, FC 2008, Cozumel, Mexico, January 28-31, 2008 ; revised selected papers
- Formal aspects in security and trust : 5th international workshop, FAST 2008, Malaga, Spain, October 9-10, 2008 : revised selected papers
- Formal to practical security : papers issued from the 2005-2008 French-Japanese collaboration
- Foundations and applications of security analysis : Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009 : revised selected papers
- Foundations of security analysis and design V : FOSAD 2007/2008/2009 tutorial lectures
- Identity and privacy in the Internet age : 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009 : proceedings
- Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings
- Information hiding : 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers
- Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings
- Information security and cryptology - ICISC 2007 : 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings
- Information security and cryptology : 4th international conference, Inscrypt 2008, Beijing, China, December 14-17, 2008 : revised selected papers
- Information security applications : 8th international workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007 : revised selected papers
- Information security practice and experience : 4th international conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008 : proceedings
- Information security practice and experience : 5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 : proceedings
- Information security theory and practice : smart devices, pervasive systems, and ubiquitous networks ; third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 ; proceedings
- Information systems security : third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings
- Information theoretic security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008 : proceedings
- Intelligence and security informatics : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 : proceedings
- Intelligence and security informatics : first European conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008, proceedings
- New stream cipher designs : the eSTREAM finalists
- Privacy enhancing technologies : 7th international symposium, PET 2007, Ottawa, Canada, June 20-22, 2007 : revised selected papers
- Privacy enhancing technologies : 8th international symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008 : proceedings
- Privacy, security, and trust in KDD : first ACM SIGKDD international workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007 : revised selected papers
- Privacy, security, and trust in KDD : second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, NV, USA, August 24-27, 2008 : revised selected papers
- Progress in cryptology : AFRICACRYPT 2009 : second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 : proceedings
- Progress in cryptology : INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007 : proceedings
- Progress in cryptology : INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008 : proceedings
- Public key cryptography : PKC 2008 : 11th International Workshop on Practice and Theory in Public Key Cryptography, Barcelona, Spain, March 9-12, 2008 : proceedings
- Recent advances in intrusion detection : 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 : proceedings
- Security protocols : 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
- Security protocols : 14th international workshop, Cambridge, UK, March 27-29 2006, revised selected papers
- Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
- Selected areas in cryptography : 15th annual international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, 2008 : revised selected papers
- Sequences, subsequences, and consequences : international workshop, SSC 2007, Los Angeles, CA, USA, May 31-June 2, 2007 : revised invited papers
- The Internet of things : first international conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008 : proceedings
- Theory of cryptography : 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March, 15-17, 2009 : proceedings / Omer Reingold (ed.)
- Theory of cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008 : proceedings
- Topics in cryptology : CT-RSA 2008, the Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008 : proceedings
- Topics in cryptology, CT-RSA 2009 : the cryptographers' track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009 : proceedings
- Trust, privacy and security in digital business : 6th international conference, Trustbus 2009, Linz, Austria, September 3-4, 2009 : proceedings
- Trusted computing : Second International Conference on Trusted Computing, Trust 2009, Oxford, UK, April 6-8, 2009 : proceedings
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/Z56Lm3DjRyY/" typeof="Series http://bibfra.me/vocab/lite/Series"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/Z56Lm3DjRyY/">LNCS sublibrary, SL 4, Security and cryptology</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Series LNCS sublibrary, SL 4, Security and cryptology
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/Z56Lm3DjRyY/" typeof="Series http://bibfra.me/vocab/lite/Series"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/Z56Lm3DjRyY/">LNCS sublibrary, SL 4, Security and cryptology</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>