1
Adaptive Cryptographic Access Control [E-Book] /
2
Advances in Cryptology — EUROCRYPT ’90 [E-Book] : Workshop on the Theory and Application of Cryptographic Techniques Aarhus, Denmark, May 21–24, 1990 Proceedings /
3
Biometric System and Data Analysis [E-Book] : Design, Evaluation, and Data Mining /
4
Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government [E-Book] : 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E’2005), October 28–30, 2005, Poznan, Poland /
5
Computer Security — ESORICS 2002 [E-Book] : 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14–16, 2002 Proceedings /
6
Computer Security - ESORICS 2003 [E-Book] : 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings /
7
Computer Security - ESORICS 2004 [E-Book] : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings /
8
Computer Security - ESORICS 2005 [E-Book] / 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings
9
Computer Security - ESORICS 2006 [E-Book] / 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings
10
Computer Security – ESORICS 2007 [E-Book] : 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings /
11
Data Warehousing and Data Mining Techniques for Cyber Security [E-Book] /
12
Handbook of Database Security [E-Book] : Applications and Trends /
13
Infrastructure Security [E-Book] : International Conference, InfraSec 2002 Bristol, UK, October 1–3, 2002 Proceedings /
14
Intelligence and Security Informatics [E-Book] : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings /
15
Preserving Privacy in Data Outsourcing [E-Book] /
16
Preserving Privacy in On-Line Analytical Processing (OLAP) [E-Book] /
17
Privacy Preserving Data Mining [E-Book] /
18
Privacy-Preserving Data Mining [E-Book] : Models and Algorithms /
19
Quality of Protection [E-Book] : Security Measurements and Metrics /
20
Replication [E-Book] : Theory and Practice /