1
Information Theoretic Security [E-Book] : Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers /
2
Foundations of Security Analysis and Design V [E-Book] : FOSAD 2007/2008/2009 Tutorial Lectures /
3
E-business and Telecommunications [E-Book] : 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers /
4
Critical Information Infrastructures Security [E-Book] : Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers /
5
Power Analysis Attacks [E-Book] : Revealing the Secrets of Smart Cards /
6
Fifth World Conference on Information Security Education [E-Book] : Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA /
7
Critical Information Infrastructures [E-Book] : Resilience and Protection /
8
Ubiquitous Intelligence and Computing [E-Book] : 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007. Proceedings /
9
Information Hiding [E-Book] : 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers /
10
Advances in Cryptology - CRYPTO 2007 [E-Book] : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings /
11
Detection of Intrusions and Malware, and Vulnerability Assessment [E-Book] : 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings /
12
Wired/Wireless Internet Communications [E-Book] : 5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007. Proceedings /
13
Applied Cryptography and Network Security [E-Book] : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings /
14
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems [E-Book] : First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings.
15
Transactions on Data Hiding and Multimedia Security II [E-Book] /
16
Intrusion Detection effektiv! [E-Book] : Modellierung und Analyse von Angriffsmustern /
17
Computer Network Security [E-Book] : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings /
18
Online Business Security Systems [E-Book] /
19
New Approaches for Security, Privacy and Trust in Complex Environments [E-Book] : Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa /
20
Introduction to Cryptography [E-Book] : Principles and Applications /