A number of volumes related to cryptography have been published by Springer in the series Lecture Notes in Computer Science (LNCS). Using the links below you can browse the table of contents for these volumes. However, to view a paper contained in a particular volume requires a subscription to SpringerLINK content. Many academic institutions have subscriptions.
The links on this webpage are generated automatically from the volume information for LNCS which appears on the SpringerLINK website. This means, for example, that whenever the latest CRYPTO proceedings appear on the SpringerLINK website a link to it will appear here soon after.
If you have any suggestions on how to improve this page I would be glad to hear them.
-James
http://www.ccsl.carleton.ca/~jamuir
a note about linking to SpringerLINK content
change-log
(30-May-2018: This list is no longer being maintained.)
If you already know the LNCS volume number you are interested in, you can get to it using the following form:
Hitting the "submit" button should take you to the relevant SpringerLINK webpage. Note that some LNCS volumes are not available online.
Volume | Pub. Year | Title |
---|---|---|
8300 | 2013 | Cyberspace Safety and Security :: 5th International Symposium, CSS 2013, Zhangjiajie, China, Novembe |
8263 | 2013 | Security Protocols XXI :: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Sel |
8262 | 2013 | Radio Frequency Identification :: Security and Privacy Issues 9th International Workshop, RFIDsec 2 |
8257 | 2013 | Cryptology and Network Security :: 12th International Conference, CANS 2013, Paraty, Brazil, Novembe |
8255 | 2013 | Stabilization, Safety, and Security of Distributed Systems :: 15th International Symposium, SSS 2013 |
8252 | 2013 | Decision and Game Theory for Security :: 4th International Conference, GameSec 2013, Fort Worth, TX, |
8233 | 2013 | Information and Communications Security :: 15th International Conference, ICICS 2013, Beijing, China |
8209 | 2013 | Provable Security :: 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 20 |
8208 | 2013 | Secure IT Systems :: 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013 |
8204 | 2013 | Security, Privacy, and Applied Cryptography Engineering :: Third International Conference, SPACE 201 |
8203 | 2013 | Security and Trust Management :: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2 |
8162 | 2013 | Lightweight Cryptography for Security and Privacy :: Second International Workshop, LightSec 2013, G |
8153 | 2013 | Computer Safety, Reliability, and Security :: 32nd International Conference, SAFECOMP 2013, Toulouse |
8134 | 2013 | Computer Security – ESORICS 2013 :: 18th European Symposium on Research in Computer Security, Egham, |
8128 | 2013 | Security Engineering and Intelligence Informatics :: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Re |
8127 | 2013 | Availability, Reliability, and Security in Information Systems and HCI :: IFIP WG 8.4, 8.9, TC 5 Int |
8099 | 2013 | Communications and Multimedia Security :: 14th IFIP TC 6/TC 11 International Conference, CMS 2013, M |
8086 | 2013 | Cryptographic Hardware and Embedded Systems - CHES 2013 :: 15th International Workshop, Santa Barbar |
8058 | 2013 | Trust, Privacy, and Security in Digital Business :: 10th International Conference, TrustBus 2013, Pr |
8043 | 2013 | Advances in Cryptology – CRYPTO 2013 :: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, A |
8042 | 2013 | Advances in Cryptology – CRYPTO 2013 :: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, A |
8039 | 2013 | Intelligence and Security Informatics :: Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3 |
8030 | 2013 | Human Aspects of Information Security, Privacy, and Trust :: First International Conference, HAS 201 |
7981 | 2013 | Privacy Enhancing Technologies :: 13th International Symposium, PETS 2013, Bloomington, IN, USA, Jul |
7964 | 2013 | Data and Applications Security and Privacy XXVII :: 27th Annual IFIP WG 11.3 Conference, DBSec 2013, |
7959 | 2013 | Information Security and Privacy :: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, J |
7954 | 2013 | Applied Cryptography and Network Security :: 11th International Conference, ACNS 2013, Banff, AB, Ca |
7943 | 2013 | Emerging Management Mechanisms for the Future Internet :: 7th IFIP WG 6.6 International Conference o |
7932 | 2013 | Post-Quantum Cryptography :: 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2 |
7925 | 2013 | Safe and Secure Software Reuse :: 13th International Conference on Software Reuse, ICSR 2013, Pisa, |
7918 | 2013 | Progress in Cryptology – AFRICACRYPT 2013 :: 6th International Conference on Cryptology in Africa, C |
7886 | 2013 | Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems :: 7th IFIP |
7881 | 2013 | Advances in Cryptology – EUROCRYPT 2013 :: 32nd Annual International Conference on the Theory and Ap |
7873 | 2013 | Network and System Security :: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013 |
7868 | 2013 | Public Key Infrastructures, Services and Applications :: 9th European Workshop, EuroPKI 2012, Pisa, |
7864 | 2013 | Constructive Side-Channel Analysis and Secure Design :: 4th International Workshop, COSADE 2013, Par |
7863 | 2013 | Information Security Practice and Experience :: 9th International Conference, ISPEC 2013, Lanzhou, C |
7862 | 2013 | Financial Cryptography and Data Security :: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, A |
7859 | 2013 | Financial Cryptography and Data Security :: 17th International Conference, FC 2013, Okinawa, Japan, |
7839 | 2013 | Information Security and Cryptology – ICISC 2012 :: 15th International Conference, Seoul, Korea, Nov |
7823 | 2013 | Smart Grid Security :: First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, |
7796 | 2013 | Principles of Security and Trust :: Second International Conference, POST 2013, Held as Part of the |
7785 | 2013 | Theory of Cryptography :: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, |
7783 | 2013 | Security and Trust Management :: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, |
7781 | 2013 | Engineering Secure Software and Systems :: 5th International Symposium, ESSoS 2013, Paris, France, F |
7779 | 2013 | Topics in Cryptology – CT-RSA 2013 :: The Cryptographers’ Track at the RSA Conference 2013, San Fran |
7778 | 2013 | Public-Key Cryptography – PKC 2013 :: 16th International Conference on Practice and Theory in Public |
7763 | 2013 | Information Security and Cryptology :: 8th International Conference, Inscrypt 2012, Beijing, China, |
7743 | 2013 | Foundations and Practice of Security :: 5th International Symposium, FPS 2012, Montreal, QC, Canada, |
7739 | 2013 | Radio Frequency Identification. Security and Privacy Issues :: 8th International Workshop, RFIDSec 2 |
7731 | 2013 | Data Privacy Management and Autonomous Spontaneous Security :: 7th International Workshop, DPM 2012, |
7722 | 2013 | Critical Information Infrastructures Security :: 7th International Workshop, CRITIS 2012, Lillehamme |
7712 | 2012 | Cryptology and Network Security :: 11th International Conference, CANS 2012, Darmstadt, Germany, Dec |
7708 | 2013 | Pairing-Based Cryptography – Pairing 2012 :: 5th International Conference, Cologne, Germany, May 16- |
7707 | 2013 | Selected Areas in Cryptography :: 19th International Conference, SAC 2012, Windsor, ON, Canada, Augu |
7690 | 2012 | Information Security Applications :: 13th International Workshop, WISA 2012, Jeju Island, Korea, Aug |
7672 | 2012 | Cyberspace Safety and Security :: 4th International Symposium, CSS 2012, Melbourne, Australia, Decem |
7671 | 2012 | Information Systems Security :: 8th International Conference, ICISS 2012, Guwahati, India, December |
7668 | 2012 | Progress in Cryptology - INDOCRYPT 2012 :: 13th International Conference on Cryptology in India, Kol |
7658 | 2012 | Advances in Cryptology – ASIACRYPT 2012 :: 18th International Conference on the Theory and Applicati |
7645 | 2012 | Network and System Security :: 6th International Conference, NSS 2012, Wuyishan, Fujian, China, Nove |
7644 | 2012 | Security, Privacy, and Applied Cryptography Engineering :: Second International Conference, SPACE 20 |
7638 | 2012 | Decision and Game Theory for Security :: Third International Conference, GameSec 2012, Budapest, Hun |
7631 | 2012 | Advances in Information and Computer Security :: 7th International Workshop on Security, IWSEC 2012, |
7622 | 2012 | Security Protocols XX :: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Sele |
7618 | 2012 | Information and Communications Security :: 14th International Conference, ICICS 2012, Hong Kong, Chi |
7617 | 2012 | Secure IT Systems :: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 – November |
7613 | 2012 | Computer Safety, Reliability, and Security :: SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, E |
7612 | 2012 | Computer Safety, Reliability, and Security :: 31st International Conference, SAFECOMP 2012, Magdebur |
7596 | 2012 | Stabilization, Safety, and Security of Distributed Systems :: 14th International Symposium, SSS 2012 |
7582 | 2013 | Theory of Quantum Computation, Communication, and Cryptography :: 7th Conference, TQC 2012, Tokyo, J |
7556 | 2012 | Privacy in Statistical Databases :: UNESCO Chair in Data Privacy, International Conference, PSD 2012 |
7549 | 2012 | Fast Software Encryption :: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, |
7537 | 2012 | Information Security and Cryptology :: 7th International Conference, Inscrypt 2011, Beijing, China, |
7533 | 2012 | Progress in Cryptology – LATINCRYPT 2012 :: 2nd International Conference on Cryptology and Informati |
7531 | 2012 | Computer Network Security :: 6th International Conference on Mathematical Methods, Models and Archit |
7496 | 2012 | Provable Security :: 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 20 |
7485 | 2012 | Security and Cryptography for Networks :: 8th International Conference, SCN 2012, Amalfi, Italy, Sep |
7483 | 2012 | Information Security :: 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2 |
7482 | 2012 | Secure Data Management :: 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceeding |
7465 | 2012 | Multidisciplinary Research and Practice for Information Systems :: IFIP WG 8.4, 8.9/TC 5 Internation |
7459 | 2012 | Computer Security – ESORICS 2012 :: 17th European Symposium on Research in Computer Security, Pisa, |
7449 | 2012 | Trust, Privacy and Security in Digital Business :: 9th International Conference, TrustBus 2012, Vien |
7428 | 2012 | Cryptographic Hardware and Embedded Systems – CHES 2012 :: 14th International Workshop, Leuven, Belg |
7417 | 2012 | Advances in Cryptology – CRYPTO 2012 :: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, A |
7412 | 2012 | Information Theoretic Security :: 6th International Conference, ICITS 2012, Montreal, QC, Canada, Au |
7398 | 2012 | Financial Cryptography and Data Security :: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bona |
7397 | 2012 | Financial Cryptography and Data Security :: 16th International Conference, FC 2012, Kralendijk, Bona |
7394 | 2012 | Communications and Multimedia Security :: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, C |
7384 | 2012 | Privacy Enhancing Technologies :: 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, |
7374 | 2012 | Progress in Cryptology - AFRICACRYPT 2012 :: 5th International Conference on Cryptology in Africa, I |
7372 | 2012 | Information Security and Privacy :: 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Austr |
7371 | 2012 | Data and Applications Security and Privacy XXVI :: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, |
7341 | 2012 | Applied Cryptography and Network Security :: 10th International Conference, ACNS 2012, Singapore, Ju |
7322 | 2012 | Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambie |
7299 | 2012 | Intelligence and Security Informatics :: Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, |
7293 | 2012 | Public Key Cryptography – PKC 2012 :: 15th International Conference on Practice and Theory in Public |
7279 | 2012 | Dependable Networks and Services :: 6th IFIP WG 6.6 International Conference on Autonomous Infrastru |
7275 | 2012 | Constructive Side-Channel Analysis and Secure Design :: Third International Workshop, COSADE 2012, D |
7259 | 2012 | Information Security and Cryptology - ICISC 2011 :: 14th International Conference, Seoul, Korea, Nov |
7242 | 2012 | Research in Cryptology :: 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2 |
7237 | 2012 | Advances in Cryptology – EUROCRYPT 2012 :: 31st Annual International Conference on the Theory and Ap |
7232 | 2012 | Information Security Practice and Experience :: 8th International Conference, ISPEC 2012, Hangzhou, |
7228 | 2012 | Transactions on Data Hiding and Multimedia Security VIII :: Special Issue on Pattern Recognition for |
7215 | 2012 | Principles of Security and Trust :: First International Conference, POST 2012, Held as Part of the E |
7194 | 2012 | Theory of Cryptography :: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, |
7178 | 2012 | Topics in Cryptology – CT-RSA 2012 :: The Cryptographers’ Track at the RSA Conference 2012, San Fran |
7170 | 2012 | Security and Trust Management :: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27- |
7163 | 2012 | Public Key Infrastructures, Services and Applications :: 8th European Workshop, EuroPKI 2011, Leuven |
7161 | 2012 | Information Security Technology for Applications :: 16th Nordic Conference on Secure IT Systems, Nor |
7159 | 2012 | Engineering Secure Software and Systems :: 4th International Symposium, ESSoS 2012, Eindhoven, The N |
7140 | 2012 | Formal Aspects of Security and Trust :: 8th International Workshop, FAST 2011, Leuven, Belgium, Sept |
7135 | 2012 | Advanced Computing, Networking and Security :: International Conference, ADCONS 2011, Surathkal, Ind |
7127 | 2012 | Information Security Technology for Applications :: 15th Nordic Conference on Secure IT Systems, Nor |
7126 | 2012 | Financial Cryptography and Data Security :: FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. |
7122 | 2012 | Data Privacy Management and Autonomous Spontaneus Security :: 6th International Workshop, DPM 2011, |
7118 | 2012 | Selected Areas in Cryptography :: 18th International Workshop, SAC 2011, Toronto, ON, Canada, August |
7115 | 2012 | Information Security Applications :: 12th International Workshop, WISA 2011, Jeju Island, Korea, Aug |
7114 | 2011 | Security Protocols XIX :: 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Sel |
7110 | 2012 | Transactions on Data Hiding and Multimedia Security VII |
7107 | 2011 | Progress in Cryptology – INDOCRYPT 2011 :: 12th International Conference on Cryptology in India, Che |
7093 | 2011 | Information Systems Security :: 7th International Conference, ICISS 2011, Kolkata, India, December 1 |
7092 | 2011 | Cryptology and Network Security :: 10th International Conference, CANS 2011, Sanya, China, December |
7089 | 2011 | Cryptography and Coding :: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15 |
7073 | 2011 | Advances in Cryptology – ASIACRYPT 2011 :: 17th International Conference on the Theory and Applicati |
7071 | 2011 | Post-Quantum Cryptography :: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 |
7055 | 2012 | RFID. Security and Privacy :: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 20 |
7053 | 2012 | Security and Intelligent Information Systems :: International Joint Conferences, SIIS 2011, Warsaw, |
7043 | 2011 | Information and Communications Security :: 13th International Conference, ICICS 2011, Beijing, China |
7039 | 2012 | Open Problems in Network Security :: IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Swi |
7038 | 2011 | Advances in Information and Computer Security :: 6th International Workshop, IWSEC 2011, Tokyo, Japa |
7037 | 2011 | Decision and Game Theory for Security :: Second International Conference, GameSec 2011, College Park |
7035 | 2012 | Financial Cryptography and Data Security :: 15th International Conference, FC 2011, Gros Islet, St. |
7028 | 2013 | Security Protocols XVII :: 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Sele |
7025 | 2011 | Communications and Multimedia Security :: 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, |
7011 | 2011 | Security Aspects in Information Technology :: First International Conference, InfoSecHiComNet 2011, |
7001 | 2011 | Information Security :: 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. |
6993 | 2012 | Theory of Security and Applications :: Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - |
6983 | 2013 | Critical Information Infrastructure Security :: 6th International Workshop, CRITIS 2011, Lucerne, Sw |
6980 | 2011 | Provable Security :: 5th International Conference, ProvSec 2011, Xi’an, China, October 16-18, 2011. |
6976 | 2011 | Stabilization, Safety, and Security of Distributed Systems :: 13th International Symposium, SSS 2011 |
6933 | 2011 | Secure Data Management :: 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedi |
6917 | 2011 | Cryptographic Hardware and Embedded Systems – CHES 2011 :: 13th International Workshop, Nara, Japan, |
6908 | 2011 | Availability, Reliability and Security for Business, Enterprise and Health Information Systems :: IF |
6894 | 2011 | Computer Safety, Reliability, and Security :: 30th International Conference,SAFECOMP 2011, Naples, I |
6888 | 2012 | Foundations and Practice of Security :: 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, |
6879 | 2011 | Computer Security – ESORICS 2011 :: 16th European Symposium on Research in Computer Security, Leuven |
6863 | 2011 | Trust, Privacy and Security in Digital Business :: 8th International Conference, TrustBus 2011, Toul |
6858 | 2011 | Foundations of Security Analysis and Design VI :: FOSAD Tutorial Lectures |
6841 | 2011 | Advances in Cryptology – CRYPTO 2011 :: 31st Annual Cryptology Conference, Santa Barbara, CA, USA, A |
6829 | 2011 | Information Security and Cryptology - ICISC 2010 :: 13th International Conference, Seoul, Korea, Dec |
6818 | 2011 | Data and Applications Security and Privacy XXV :: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, R |
6812 | 2011 | Information Security and Privacy :: 16th Australasian Conference, ACISP 2011, Melbourne, Australia, |
6805 | 2012 | Cryptography and Security: From Theory to Applications :: Essays Dedicated to Jean-Jacques Quisquate |
6794 | 2011 | Privacy Enhancing Technologies :: 11th International Symposium, PETS 2011, Waterloo, ON, Canada, Jul |
6749 | 2011 | Intelligence and Security Informatics :: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, |
6737 | 2011 | Progress in Cryptology – AFRICACRYPT 2011 :: 4th International Conference on Cryptology in Africa, D |
6734 | 2011 | Managing the Dynamics of Networks and Services :: 5th International Conference on Autonomous Infrast |
6733 | 2011 | Fast Software Encryption :: 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, |
6730 | 2011 | Transactions on Data Hiding and Multimedia Security VI |
6715 | 2011 | Applied Cryptography and Network Security :: 9th International Conference, ACNS 2011, Nerja, Spain, |
6712 | 2011 | Critical Information Infrastructures Security :: 5th International Workshop, CRITIS 2010, Athens, Gr |
6711 | 2011 | Public Key Infrastructures, Services and Applications :: 7th European Workshop, EuroPKI 2010, Athens |
6710 | 2011 | Security and Trust Management :: 6th International Workshop, STM 2010, Athens, Greece, September 23- |
6694 | 2011 | Computational Intelligence in Security for Information Systems :: 4th International Conference, CISI |
6673 | 2011 | Information Theoretic Security :: 5th International Conference, ICITS 2011, Amsterdam, The Netherlan |
6672 | 2011 | Information Security Practice and Experience :: 7th International Conference, ISPEC 2011, Guangzhou, |
6650 | 2011 | Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computat |
6639 | 2011 | Coding and Cryptology :: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 201 |
6633 | 2011 | Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communi |
6632 | 2011 | Advances in Cryptology – EUROCRYPT 2011 :: 30th Annual International Conference on the Theory and Ap |
6615 | 2011 | Security Protocols XVI :: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Sel |
6597 | 2011 | Theory of Cryptography :: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, Marc |
6584 | 2011 | Information Security and Cryptology :: 6th International Conference, Inscrypt 2010, Shanghai, China, |
6571 | 2011 | Public Key Cryptography – PKC 2011 :: 14th International Conference on Practice and Theory in Public |
6561 | 2011 | Formal Aspects of Security and Trust :: 7th International Workshop, FAST 2010, Pisa, Italy, Septembe |
6558 | 2011 | Topics in Cryptology – CT-RSA 2011 :: The Cryptographers’ Track at the RSA Conference 2011, San Fran |
6555 | 2011 | Open Research Problems in Network Security :: IFIP WG 11.4 International Workshop, iNetSec 2010, Sof |
6549 | 2011 | Privacy and Security Issues in Data Mining and Machine Learning :: International ECML/PKDD Workshop, |
6545 | 2011 | Digital Privacy :: PRIME - Privacy and Identity Management for Europe |
6544 | 2011 | Selected Areas in Cryptography :: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, |
6542 | 2011 | Engineering Secure Software and Systems :: Third International Symposium, ESSoS 2011, Madrid, Spain, |
6531 | 2011 | Information Security :: 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, |
6519 | 2011 | Theory of Quantum Computation, Communication, and Cryptography :: 5th Conference, TQC 2010, Leeds, U |
6514 | 2011 | Data Privacy Management and Autonomous Spontaneous Security :: 5th International Workshop, DPM 2010 |
6513 | 2011 | Information Security Applications :: 11th International Workshop, WISA 2010, Jeju Island, Korea, Aug |
6503 | 2011 | Information Systems Security :: 6th International Conference, ICISS 2010, Gandhinagar, India, Decemb |
6498 | 2010 | Progress in Cryptology - INDOCRYPT 2010 :: 11th International Conference on Cryptology in India, Hyd |
6487 | 2010 | Pairing-Based Cryptography - Pairing 2010 :: 4th International Conference, Yamanaka Hot Spring, Japa |
6480 | 2010 | Transactions on Computational Science XI :: Special Issue on Security in Computing, Part II |
6477 | 2010 | Advances in Cryptology - ASIACRYPT 2010 :: 16th International Conference on the Theory and Applicati |
6476 | 2010 | Information and Communications Security :: 12th International Conference, ICICS 2010, Barcelona, Spa |
6467 | 2010 | Cryptology and Network Security :: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, |
6442 | 2010 | Decision and Game Theory for Security :: First International Conference, GameSec 2010, Berlin, Germa |
6434 | 2010 | Advances in Information and Computer Security :: 5th International Workshop on Security, IWSEC 2010, |
6402 | 2010 | Provable Security :: 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2 |
6391 | 2010 | Public Key Infrastructures, Services and Applications :: 6th European Workshop, EuroPKI 2009, Pisa, |
6370 | 2010 | Radio Frequency Identification: Security and Privacy Issues :: 6th International Workshop, RFIDSec 2 |
6366 | 2010 | Stabilization, Safety, and Security of Distributed Systems :: 12th International Symposium, SSS 2010 |
6358 | 2010 | Secure Data Management :: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings |
6351 | 2010 | Computer Safety, Reliability, and Security :: 29th International Conference, SAFECOMP 2010, Vienna, |
6345 | 2010 | Computer Security – ESORICS 2010 :: 15th European Symposium on Research in Computer Security, Athens |
6344 | 2011 | Privacy in Statistical Databases :: UNESCO Chair in Data Privacy, International Conference, PSD 2010 |
6340 | 2010 | Transactions on Computational Science X :: Special Issue on Security in Computing, Part I |
6280 | 2010 | Security and Cryptography for Networks :: 7th International Conference, SCN 2010, Amalfi, Italy, Sep |
6264 | 2010 | Trust, Privacy and Security in Digital Business :: 7th International Conference, TrustBus 2010, Bilb |
6258 | 2010 | Computer Network Security :: 5th International Conference on Mathematical Methods, Models and Archit |
6225 | 2010 | Cryptographic Hardware and Embedded Systems, CHES 2010 :: 12th International Workshop, Santa Barbara |
6223 | 2010 | Advances in Cryptology – CRYPTO 2010 :: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, A |
6212 | 2010 | Progress in Cryptology – LATINCRYPT 2010 :: First International Conference on Cryptology and Informa |
6205 | 2010 | Privacy Enhancing Technologies :: 10th International Symposium, PETS 2010, Berlin, Germany, July 21- |
6197 | 2010 | Algorithmic Number Theory :: 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010. |
6186 | 2011 | Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security :: Joint Wor |
6168 | 2010 | Information Security and Privacy :: 15th Australasian Conference, ACISP 2010, Sydney, Australia, Jul |
6166 | 2010 | Data and Applications Security and Privacy XXIV :: 24th Annual IFIP WG 11.3 Working Conference, Rome |
6155 | 2010 | Mechanisms for Autonomous Management of Networks and Services :: 4th International Conference on Aut |
6151 | 2011 | Information Security and Cryptology :: 5th International Conference, Inscrypt 2009, Beijing, China, |
6147 | 2010 | Fast Software Encryption :: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 |
6123 | 2010 | Applied Cryptography and Network Security :: 8th International Conference, ACNS 2010, Beijing, China |
6122 | 2010 | Intelligence and Security Informatics :: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 2 |
6121 | 2012 | Data Security and Security Data :: 27th British National Conference on Databases, BNCOD 27, Dundee, |
6110 | 2010 | Advances in Cryptology – EUROCRYPT 2010 :: 29th Annual International Conference on the Theory and Ap |
6109 | 2010 | Communications and Multimedia Security :: 11th IFIP TC 6/TC 11 International Conference, CMS 2010, L |
6061 | 2010 | Post-Quantum Cryptography :: Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25 |
6056 | 2010 | Public Key Cryptography – PKC 2010 :: 13th International Conference on Practice and Theory in Public |
6055 | 2010 | Progress in Cryptology – AFRICACRYPT 2010 :: Third International Conference on Cryptology in Africa, |
6054 | 2010 | Financial Cryptography and Data Security :: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, |
6052 | 2010 | Financial Cryptography and Data Security :: 14th International Conference, FC 2010, Tenerife, Canary |
6047 | 2010 | Information Security, Practice and Experience :: 6th International Conference, ISPEC 2010, Seoul, Ko |
6033 | 2010 | Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devic |
6027 | 2010 | Critical Information Infrastructures Security :: 4th International Workshop, CRITIS 2009, Bonn, Germ |
6010 | 2010 | Transactions on Data Hiding and Multimedia Security V |
5985 | 2010 | Topics in Cryptology - CT-RSA 2010 :: The Cryptographers’ Track at the RSA Conference 2010, San Fran |
5984 | 2010 | Information, Security and Cryptology – ICISC 2009 :: 12th International Conference, Seoul, Korea, De |
5983 | 2010 | Formal Aspects in Security and Trust :: 6th International Workshop, FAST 2009, Eindhoven, The Nether |
5978 | 2010 | Theory of Cryptography :: 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, Febr |
5973 | 2010 | Information Theoretic Security :: 4th International Conference, ICITS 2009, Shizuoka, Japan, Decembe |
5965 | 2010 | Engineering Secure Software and Systems :: Second International Symposium, ESSoS 2010, Pisa, Italy, |
5964 | 2010 | Security Protocols :: 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised |
5939 | 2010 | Data Privacy Management and Autonomous Spontaneous Security :: 4th International Workshop, DPM 2009 |
5932 | 2009 | Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August |
5927 | 2009 | Information and Communications Security 11th International Conference, ICICS 2009, Beijing, Chi |
5922 | 2009 | Progress in Cryptology - INDOCRYPT 2009 10th International Conference on Cryptology in India, N |
5921 | 2009 | Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cire |
5913 | 2009 | Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Comput |
5912 | 2009 | Advances in Cryptology ASIACRYPT 2009 15th International Conference on the Theory and Applicat |
5906 | 2009 | Theory of Quantum Computation, Communication, and Cryptography 4th Workshop,TQC 2009, Waterloo, |
5905 | 2009 | Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December |
5888 | 2009 | Cryptology and Network Security 8th International Conference, CANS 2009, Kanazawa, Japan, Decem |
5873 | 2009 | Stabilization, Safety, and Security of Distributed Systems 11th International Symposium, SSS 20 |
5867 | 2009 | Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, |
5848 | 2009 | Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11 |
5838 | 2009 | Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2 |
5824 | 2009 | Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 200 |
5789 | 2010 | Computer Security ESORICS 2009 14th European Symposium on Research in Computer Security, Saint |
5776 | 2009 | Secure Data Management 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings |
5775 | 2009 | Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hambur |
5747 | 2009 | Cryptographic Hardware and Embedded Systems - CHES 2009 11th International Workshop Lausanne, S |
5746 | 2009 | Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Netw |
5735 | 2009 | Information Security 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 200 |
5705 | 2009 | Foundations of Security Analysis and Design V FOSAD 2007/2008/2009 Tutorial Lectures |
5695 | 2009 | Trust, Privacy and Security in Digital Business 6th International Conference, TrustBus 2009, Li |
5677 | 2009 | Advances in Cryptology - CRYPTO 2009 29th Annual International Cryptology Conference, Santa Bar |
5672 | 2009 | Privacy Enhancing Technologies 9th International Symposium, PETS 2009, Seattle, WA, USA, August |
5671 | 2009 | Pairing-Based Cryptography Pairing 2009 Third International Conference Palo Alto, CA, USA, Aug |
5665 | 2009 | Fast Software Encryption 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, |
5661 | 2009 | Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy an |
5645 | 2009 | Data and Applications Security XXIII 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Can |
5637 | 2009 | Scalability of Networks and Services Third International Conference on Autonomous Infrastructur |
5628 | 2009 | Financial Cryptography and Data Security 13th International Conference, FC 2009, Accra Beach, B |
5599 | 2009 | Privacy in Location-Based Applications Research Issues and Emerging Trends |
5594 | 2009 | Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, |
5580 | 2009 | Progress in Cryptology AFRICACRYPT 2009 Second International Conference on Cryptology in Afric |
5576 | 2009 | Advances in Information Security and Assurance Third International Conference and Workshops, IS |
5557 | 2009 | Coding and Cryptology Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, |
5536 | 2009 | Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocque |
5511 | 2009 | Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Sec |
5510 | 2009 | Transactions on Data Hiding and Multimedia Security IV |
5508 | 2009 | Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, I |
5491 | 2009 | Formal Aspects in Security and Trust 5th International Workshop, FAST 2008 Malaga, Spain, Octob |
5487 | 2009 | Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China |
5479 | 2009 | Advances in Cryptology - EUROCRYPT 2009 28th Annual International Conference on the Theory and |
5477 | 2009 | Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, Apr |
5473 | 2009 | Topics in Cryptology CT-RSA 2009 The Cryptographers Track at the RSA Conference 2009, San Fran |
5461 | 2009 | Information Security and Cryptology ICISC 2008 11th International Conference, Seoul, Korea, De |
5458 | 2009 | Formal to Practical Security Papers Issued from the 2005-2008 French-Japanese Collaboration |
5456 | 2009 | Privacy, Security, and Trust in KDD Second ACM SIGKDD International Workshop, PinKDD 2008, Las |
5451 | 2009 | Information Security Practice and Experience 5th International Conference, ISPEC 2009 Xian, Chi |
5444 | 2009 | Theory of Cryptography 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, US |
5443 | 2009 | Public Key Cryptography PKC 2009 12th International Conference on Practice and Theory in Publi |
5430 | 2009 | Transactions on Computational Science IV Special Issue on Security in Computing |
5429 | 2009 | Engineering Secure Software and Systems First International Symposium ESSoS 2009, Leuven, Belgi |
5381 | 2009 | Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, |
5379 | 2009 | Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, Se |
5376 | 2008 | Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark |
5365 | 2008 | Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kh |
5354 | 2008 | Biosurveillance and Biosecurity International Workshop, BioSecure 2008, Raleigh, NC, USA, Decem |
5352 | 2008 | Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, Decemb |
5350 | 2008 | Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Applica |
5340 | 2008 | Stabilization, Safety, and Security of Distributed Systems 10th International Symposium, SSS 20 |
5339 | 2008 | Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, Dece |
5324 | 2008 | Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 |
5312 | 2008 | Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2 |
5310 | 2008 | Principles, Systems and Applications of IP Telecommunications. Services and Security for Next G |
5308 | 2008 | Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, U |
5299 | 2008 | Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, O |
5283 | 2008 | Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Mála |
5262 | 2008 | Privacy in Statistical Databases UNESCO Chair in Data Privacy International Conference, PSD 200 |
5229 | 2008 | Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, S |
5222 | 2008 | Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18 |
5219 | 2008 | Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcast |
5210 | 2008 | Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA |
5209 | 2008 | Pairing-Based Cryptography Pairing 2008 Second International Conference, Egham, UK, September |
5185 | 2008 | Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Tur |
5159 | 2008 | Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. P |
5157 | 2008 | Advances in Cryptology CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barb |
5155 | 2008 | Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, Aug |
5154 | 2008 | Cryptographic Hardware and Embedded Systems CHES 2008 10th International Workshop, Washington, |
5143 | 2008 | Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexic |
5134 | 2008 | Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23- |
5127 | 2008 | Resilient Networks and Services Second International Conference on Autonomous Infrastructure, |
5111 | 2008 | Secure Transaction Protocol Analysis Models and Applications Qingfeng Chen, Chengqi Zhang and |
5107 | 2008 | Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australi |
5106 | 2008 | Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, |
5094 | 2008 | Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and App |
5086 | 2008 | Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February |
5075 | 2008 | Intelligence and Security Informatics IEEE ISI 2008 International Workshops: PAISI, PACCF, and |
5057 | 2008 | Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondhei |
5045 | 2008 | Reliable Implementation of Real Number Algorithms: Theory and Practice International Seminar Da |
5037 | 2008 | Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY |
5023 | 2008 | Progress in Cryptology AFRICACRYPT 2008 First International Conference on Cryptology in Africa |
5019 | 2008 | Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Netwo |
5011 | 2008 | Algorithmic Number Theory 8th International Symposium, ANTS-VIII Banff, Canada, May 17-22, 2008 |
4991 | 2008 | Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, A |
4990 | 2008 | Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, Augu |
4986 | 2008 | New Stream Cipher Designs The eSTREAM Finalists [spacer.gif] Add to marked items |
4965 | 2008 | Advances in Cryptology EUROCRYPT 2008 27th Annual International Conference on the Theory and A |
4964 | 2008 | Topics in Cryptology CT-RSA 2008 The Cryptographers Track at the RSA Conference 2008, San Fran |
4948 | 2008 | Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March |
4945 | 2008 | Research in Cryptology Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4 |
4939 | 2008 | Public Key Cryptography PKC 2008 11th International Workshop on Practice and Theory in Public- |
4920 | 2008 | Transactions on Data Hiding and Multimedia Security III [spacer.gif] Add to marked items |
4890 | 2008 | Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San J |
4887 | 2007 | Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2 |
4886 | 2008 | Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st Intern |
4876 | 2007 | Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16 |
4867 | 2008 | Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, Au |
4861 | 2008 | Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, Ch |
4859 | 2007 | Progress in Cryptology INDOCRYPT 2007 8th International Conference on Cryptology in India, Che |
4856 | 2007 | Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8- |
4846 | 2008 | Advances in Computer Science ASIAN 2007. Computer and Network Security 12th Asian Computing |
4838 | 2007 | Stabilization, Safety, and Security of Distributed Systems 9th International Symposium, SSS 200 |
4833 | 2008 | Advances in Cryptology ASIACRYPT 2007 13th International Conference on the Theory and Applicat |
4817 | 2007 | Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, N |
4812 | 2007 | Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December |
4784 | 2007 | Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, Novemb |
4779 | 2007 | Information Security 10th International Conference, ISC 2007, Valparaso, Chile, October 9-12, |
4776 | 2007 | Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22 |
4752 | 2007 | Advances in Information and Computer Security Second International Workshop on Security, IWSEC |
4734 | 2008 | Computer Security ESORICS 2007 12th European Symposium On Research In Computer Security, Dresd |
4727 | 2007 | Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Aus |
4721 | 2007 | Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. P |
4691 | 2007 | Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontari |
4680 | 2008 | Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremb |
4677 | 2007 | Foundations of Security Analysis and Design IV FOSAD 2006/2007 Tutorial Lectures [spacer.gif] |
4657 | 2007 | Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Re |
4631 | 2007 | Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Sel |
4622 | 2007 | Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Bar |
4602 | 2007 | Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Appl |
4593 | 2007 | Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March |
4586 | 2007 | Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australi |
4582 | 2007 | Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma d |
4575 | 2007 | Pairing-Based Cryptography Pairing 2007 First International Conference, Tokyo, Japan, July 2-4 |
4572 | 2007 | Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, |
4543 | 2007 | Inter-Domain Management First International Conference on Autonomous Infrastructure, Manageme |
4521 | 2007 | Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, Chin |
4515 | 2007 | Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and |
4506 | 2007 | Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 200 |
4499 | 2007 | Transactions on Data Hiding and Multimedia Security II No Access to content Add to marked ite |
4464 | 2007 | Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong K |
4462 | 2007 | Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems |
4456 | 2007 | Computational Intelligence and Security International Conference, CIS 2006, Guangzhou, China, N |
4450 | 2007 | Public Key Cryptography PKC 2007 10th International Conference on Practice and Theory in Publi |
4435 | 2008 | Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Comp |
4430 | 2007 | Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April |
4392 | 2007 | Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Nether |
4377 | 2006 | Topics in Cryptology CT-RSA 2007 The Cryptographers Track at the RSA Conference 2007, San Fran |
4357 | 2006 | Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg, |
4356 | 2007 | Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August |
4347 | 2006 | Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, |
4341 | 2006 | Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam |
4332 | 2006 | Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, Decem |
4329 | 2006 | Progress in Cryptology - INDOCRYPT 2006 7th International Conference on Cryptology in India, Ko |
4318 | 2006 | Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, No |
4307 | 2006 | Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, |
4302 | 2006 | Privacy in Statistical Databases CENEX-SDC Project International Conference, PSD 2006, Rome, It |
4301 | 2006 | Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, Decembe |
4300 | 2006 | Transactions on Data Hiding and Multimedia Security I |
4298 | 2007 | Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, Au |
4296 | 2006 | Information Security and Cryptology ICISC 2006 9th International Conference, Busan, Korea, Nov |
4284 | 2006 | Advances in Cryptology ASIACRYPT 2006 12th International Conference on the Theory and Applicat |
4280 | 2006 | Stabilization, Safety, and Security of Distributed Systems 8th International Symposium, SSS 200 |
4266 | 2006 | Advances in Information and Computer Security First International Workshop on Security, IWSEC 2 |
4258 | 2006 | Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, |
4249 | 2006 | Cryptographic Hardware and Embedded Systems - CHES 2006 8th International Workshop, Yokohama, J |
4237 | 2006 | Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006, |
4236 | 2006 | Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama |
4189 | 2006 | Computer Security ESORICS 2006 11th European Symposium on Research in Computer Security, Hambu |
4176 | 2006 | Information Security 9th International Conference, ISC 2006, Samos Island, Greece, August 30 |
4166 | 2006 | Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk |
4165 | 2006 | Secure Data Management Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Pr |
4127 | 2006 | Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Appli |
4117 | 2006 | Advances in Cryptology - CRYPTO 2006 26th Annual International Cryptology Conference, Santa Bar |
4116 | 2006 | Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, S |
4107 | 2006 | Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, Briti |
4105 | 2006 | Multimedia Content Representation, Classification and Security International Workshop, MRCS 200 |
4083 | 2006 | Trust and Privacy in Digital Business Third International Conference, TrustBus 2006, Krakow, Po |
4076 | 2006 | Algorithmic Number Theory 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, |
4074 | 2006 | Secure Mobile Ad-hoc Networks and Sensors First International Workshop, MADNES 2005, Singapore, |
4058 | 2006 | Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia |
4047 | 2006 | Fast Software Encryption 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2 |
4043 | 2006 | Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin |
4004 | 2006 | Advances in Cryptology - EUROCRYPT 2006 24th Annual International Conference on the Theory and |
3995 | 2006 | Emerging Trends in Information and Communication Security International Conference, ETRICS 2006 |
3989 | 2006 | Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, J |
3975 | 2006 | Intelligence and Security Informatics IEEE International Conference on Intelligence and Securit |
3969 | 2006 | Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. |
3958 | 2006 | Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Publi |
3957 | 2006 | Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Sel |
3956 | 2006 | Construction and Analysis of Safe, Secure, and Interoperable Smart Devices Second Internation |
3935 | 2006 | Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, De |
3934 | 2006 | Security in Pervasive Computing Third International Conference, SPC 2006, York, UK, April 18-21 |
3917 | 2006 | Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 20 |
3903 | 2006 | Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangz |
3897 | 2006 | Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, Aug |
3895 | 2006 | Theoretical Computer Science Essays in Memory of Shimon Even |
3876 | 2006 | Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, |
3866 | 2006 | Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Ty |
3860 | 2006 | Topics in Cryptology CT-RSA 2006 The Cryptographers Track at the RSA Conference 2006, San Jose |
3856 | 2006 | Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-Ju |
3822 | 2005 | Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, Decembe |
3813 | 2005 | Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegra |
3810 | 2005 | Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, Decembe |
3803 | 2005 | Information Systems Security First International Conference, ICISS 2005, Kolkata, India, Decemb |
3802 | 2005 | Computational Intelligence and Security International Conference, CIS 2005, Xian, China, Decemb |
3801 | 2005 | Computational Intelligence and Security International Conference, CIS 2005, Xian, China, Decemb |
3797 | 2005 | Progress in Cryptology - INDOCRYPT 2005 6th International Conference on Cryptology in India, Ba |
3796 | 2005 | Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2 |
3788 | 2005 | Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Applica |
3786 | 2006 | Information Security Applications 6th International Workshop, WISA 2005, Jeju Island, Korea, Au |
3783 | 2005 | Information and Communications Security 7th International Conference, ICICS 2005, Beijing, Chin |
3715 | 2005 | Progress in Cryptology Mycrypt 2005 First International Conference on Cryptology in Malaysia, |
3688 | 2005 | Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredri |
3685 | 2005 | Computer Network Security Third International Workshop on Mathematical Methods, Models, and A |
3679 | 2005 | Computer Security ESORICS 2005 10th European Symposium on Research in Computer Security, Milan |
3677 | 2005 | Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, S |
3674 | 2005 | Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30 Septembe |
3659 | 2005 | Cryptographic Hardware and Embedded Systems CHES 2005 7th International Workshop, Edinburgh, U |
3655 | 2005 | Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lectures |
3654 | 2005 | Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Appl |
3650 | 2005 | Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005 |
3621 | 2005 | Advances in Cryptology CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barb |
3592 | 2005 | Trust, Privacy and Security in Digital Business Second International Conference, TrustBus 2005, |
3574 | 2005 | Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, |
3570 | 2005 | Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Com |
3557 | 2005 | Fast Software Encryption 12th International Workshop, FSE 2005, Paris, France, February 21-23, |
3545 | 2005 | Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005 |
3531 | 2005 | Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, |
3506 | 2005 | Information Security and Cryptology ICISC 2004 7th International Conference, Seoul, Korea, Dec |
3495 | 2005 | Intelligence and Security Informatics IEEE International Conference on Intelligence and Securit |
3494 | 2005 | Advances in Cryptology EUROCRYPT 2005 24th Annual International Conference on the Theory and A |
3450 | 2005 | Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, Ap |
3439 | 2005 | Information Security Practice and Experience First International Conference, ISPEC 2005, Singap |
3424 | 2005 | Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28 |
3386 | 2005 | Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public |
3378 | 2005 | Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA |
3376 | 2005 | Topics in Cryptology CT-RSA 2005 The Cryptographers Track at the RSA Conference 2005, San Fran |
3373 | 2005 | Advanced Encryption Standard AES 4th International Conference, AES 2004, Bonn, Germany, May 10 |
3364 | 2005 | Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selec |
3362 | 2005 | Construction and Analysis of Safe, Secure, and Interoperable Smart Devices International Work |
3357 | 2004 | Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August |
3352 | 2005 | Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, Septe |
3348 | 2004 | Progress in Cryptology - INDOCRYPT 2004 5th International Conference on Cryptology in India, Ch |
3329 | 2004 | Advances in Cryptology - ASIACRYPT 2004 10th International Conference on the Theory and Applica |
3325 | 2005 | Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, Au |
3313 | 2005 | Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, |
3269 | 2004 | Information and Communications Security 6th International Conference, ICICS 2004, Malaga, Spain |
3233 | 2004 | Software Security - Theories and Systems Second Mext-NSF-JSPS International Symposium, ISSS 200 |
3225 | 2004 | Information Security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27 |
3219 | 2004 | Computer Safety, Reliability, and Security 23rd International Conference, SAFECOMP 2004, Potsda |
3193 | 2004 | Computer Security ESORICS 2004 9th European Symposium on Research in Computer Security, Sophia |
3184 | 2004 | Trust and Privacy in Digital Business First International Conference, TrustBus 2004, Zaragoza, |
3178 | 2004 | Secure Data Management VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004. Procee |
3156 | 2004 | Cryptographic Hardware and Embedded Systems - CHES 2004 6th International Workshop Cambridge, M |
3152 | 2004 | Advances in Cryptology CRYPTO 2004 24th Annual International Cryptology Conference, Santa Barb |
3110 | 2004 | Financial Cryptography 8th International Conference, FC 2004, Key West, FL, USA, February 9-1 |
3108 | 2004 | Information Security and Privacy 9th Australasian Conference, ACISP 2004, Sydney, Australia, Ju |
3093 | 2004 | Public Key Infrastructure First European PKI Workshop: Research and Applications, EuroPKI 2004, |
3089 | 2004 | Applied Cryptography and Network Security Second International Conference, ACNS 2004, Yellow Mo |
3076 | 2004 | Algorithmic Number Theory 6th International Symposium, ANTS-VI, Burlington, VT, USA, June 13-18 |
3073 | 2004 | Intelligence and Security Informatics Second Symposium on Intelligence and Security Informatics |
3050 | 2004 | Privacy in Statistical Databases CASC Project International Workshop, PSD 2004, Barcelona, Spai |
3028 | 2004 | Probabilistic and Statistical Methods in Cryptology An Introduction by Selected Topics |
3027 | 2004 | Advances in Cryptology - EUROCRYPT 2004 International Conference on the Theory and Applications |
3017 | 2004 | Fast Software Encryption 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2 |
3006 | 2004 | Selected Areas in Cryptography 10th Annual International Workshop, SAC 2003, Ottawa, Canada, Au |
2971 | 2004 | Information Security and Cryptology -ICISC 2003 6th International Conference, Seoul, Korea, Nov |
2964 | 2004 | Topics in Cryptology CT-RSA 2004 |
2951 | 2004 | Theory of Cryptography First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, |
2947 | 2004 | Public Key Cryptography PKC 2004 7th International Workshop on Theory and Practice in Public K |
2946 | 2004 | Foundations of Security Analysis and Design II FOSAD 2001/2002 Tutorial Lectures |
2908 | 2003 | Information Security Applications |
2904 | 2003 | Progress in Cryptology - INDOCRYPT 2003 4th International Conference on Cryptology in India, Ne |
2898 | 2003 | Cryptography and Coding |
2894 | 2003 | Advances in Cryptology - ASIACRYPT 2003 9th International Conference on the Theory and Applicat |
2887 | 2003 | Fast Software Encryption :: 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 200 |
2874 | 2003 | Global Computing Programming Environments, Languages, , Security, and Analysis of Systems, IS |
2851 | 2003 | Information Security 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003. |
2846 | 2003 | Applied Cryptography and Network Security |
2845 | 2003 | Security Protocols 10th International Workshop, Cambridge, UK, April 17-19, 2002. Revised Pap |
2836 | 2003 | Information and Communications Security |
2828 | 2003 | Communications and Multimedia Security |
2815 | 2003 | Composition of Secure Multi-Party Protocols A Comprehensive Study |
2808 | 2003 | Computer Security ESORICS 2003 8th European Symposium on Research in Computer Security, Gjøvik |
2802 | 2004 | Security in Pervasive Computing First International Conference, Boppard, Germany, March 12-14, |
2788 | 2003 | Computer Safety, Reliability, and Security |
2779 | 2003 | Cryptographic Hardware and Embedded Systems - CHES 2003 5th International Workshop, Colo |
2776 | 2003 | Computer Network Security Second International Workshop on Mathematical Methods, Models, and |
2760 | 2003 | Privacy Enhancing Technologies Third International Workshop, PET 2003, Dresden, Germany, March |
2754 | 2003 | Security Engineering with Patterns :: Origins, Theoretical Model, and New Applications |
2742 | xxxx | Financial Cryptography |
2729 | 2003 | Advances in Cryptology - CRYPTO 2003 |
2727 | 2003 | Information Security and Privacy 8th Australasian Conference, ACISP 2003 Wollongong, Australia, |
2665 | 2003 | Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June |
2656 | 2003 | Advances in Cryptology - EUROCRPYT 2003: International Conference on the Theory and Application |
2631 | 2003 | Trust, Reputation, and Security: Theories and Practice AAMAS 2002 InternationalWorkshop Bologna |
2629 | 2003 | Formal Aspects of Security First International Conference, FASec 2002, London, UK, December 1 |
2612 | 2003 | Topics in Cryptology - CT-RSA 2003: The Cryptographers' Track at the RSA Conference 2003, San F |
2609 | 2003 | Software Security - Theories and Systems Mext-NSF-JSPS International Symposium, ISSS 2002 Tokyo |
2595 | 2003 | Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002, St. John's, Newfou |
2587 | 2003 | Information Security and Cryptology - ICISC 2002: 5th International Conference, Seoul, Korea, N |
2576 | 2003 | Security in Communication Networks: Third International Conference, SCN 2002, Amalfi, Italy, Se |
2567 | 2003 | Public Key Cryptography - PKC 2003: 6th International Workshop on Practice and Theory in Public |
2551 | 2002 | Progress in Cryptology - INDOCRYPT 2002: Third International Conference on Cryptology in India |
2523 | 2003 | Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop Redwood Sho |
2513 | 2002 | Information and Communications Security: 4th International Conference, ICICS 2002, Singapore, D |
2502 | 2002 | Computer Security - ESORICS 2002: 7th European Symposium on Research in Computer Security Zuric |
2501 | 2002 | Advances in Cryptology - ASIACRYPT 2002: 8th International Conference on the Theory and Applica |
2482 | 2003 | Privacy Enhancing Technologies Second InternationalWorkshop, PET 2002 San Francisco, CA, USA, A |
2467 | 2002 | Security Protocols: 9th International Workshop Cambridge, UK, April 25-27, 2001. Revised Papers |
2442 | 2002 | Advances in Cryptology - CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Bar |
2437 | 2002 | Infrastructure Security: International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 |
2434 | 2002 | Computer Safety, Reliability and Security: 21st International Conference, SAFECOMP 2002, Catani |
2433 | 2002 | Information Security 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - |
2384 | 2002 | Information Security and Privacy: 7th Australasian Conference, ACISP 2002 Melbourne, Australia, |
2369 | 2002 | Algorithmic Number Theory: 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2 |
2365 | 2002 | Fast Software Encryption :: 9th International Workshop, FSE 2002 Leuven, Belgium, February 4–6, 2002 |
2357 | 2003 | Financial Cryptography 6th International Conference, FC 2002 Southampton, Bermuda, March 2002 Re |
2355 | 2002 | Fast Software Encryption: 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001 |
2339 | 2002 | Financial Cryptography : 5th International Conference, FC 2001, Grand Cayman, British West Indi |
2332 | 2002 | Advances in Cryptology - EUROCRYPT 2002: International Conference on the Theory and Application |
2320 | 2002 | Security and Privacy in Digital Rights Management : ACM CCS-8 Workshop DRM 2001, Philadelphia, |
2288 | 2002 | Information Security and Cryptology - ICISC 2001: 4th International Conference Seoul, Korea, De |
2274 | 2002 | Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Crypto |
2271 | 2002 | Topics in Cryptology - CT-RSA 2002: The Cryptographer's Track at the RSA Conference 2002, San J |
2260 | 2001 | Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17-19, 2001 |
2259 | 2001 | Selected Areas in Cryptography: 8th Annual International Workshop, SAC 2001 Toronto, Ontario, C |
2248 | 2001 | Advances in Cryptology - ASIACRYPT 2001 : 7th International Conference on the Theory and Applic |
2247 | 2001 | Progress in Cryptology - INDOCRYPT 2001 : Second International Conference on Cryptology in Indi |
2229 | 2001 | Information and Communications Security: Third International Conference, ICICS 2001, Xian, Chin |
2200 | 2001 | Information Security 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 |
2187 | 2001 | Computer Safety, Reliability and Security: 20th International Conference, SAFECOMP 2001, Budape |
2171 | 2001 | Foundations of Security Analysis and Design : Tutorial Lectures |
2162 | 2001 | Cryptographic Hardware and Embedded Systems CHES 2001: Third International Workshop, Paris, Fra |
2146 | 2001 | Cryptography and Lattices :: International Conference, CaLC 2001 Providence, RI, USA, March 29–30, 2 |
2140 | 2001 | Smart Card Programming and Security International Conference on Research in Smart Cards, E-smar |
2139 | 2001 | Advances in Cryptology - CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Ba |
2133 | 2001 | Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000, Revised Papers |
2119 | 2001 | Information Security and Privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia, |
2053 | 2001 | Program as Data Objects: International Conference on the Theory and Application of Cryptographi |
2052 | 2001 | Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Secu |
2045 | 2001 | Advances in Cryptology - EUROCRYPT 2001: Second Symposium, PADO 2001, Aarhus, Denmark, May 21-2 |
2041 | 2001 | Java on Smart Cards: Programming and Security: First International Workshop, Java Card 2000, Ca |
2033 | 2001 | E-Commerce Agents: Marketplace Solutions, Security Issues, and Supply and Demand: |
2020 | 2001 | Progress in Cryptology - CT-RSA 2001: The Cryptographers' Track at RSA Conference 2001 San Fran |
2015 | 2001 | Information Security and Cryptology - ICISC 2000 : Third International Conference, Seoul, Korea |
2012 | 2001 | Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, |
2009 | 2001 | Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity |
1992 | 2000 | Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Crypto |
1978 | 2001 | Fast Software Encryption: 7th International Workshop, FSE 2000, New York, NY, USA, April 2000. |
1977 | 2000 | Progress in Cryptology - INDOCRYPT 2000: First International Conference in Cryptology in India, |
1976 | 2000 | Advances in Cryptology - ASIACRYPT 2000: 6th International Conference on the Theory and Applica |
1975 | 2000 | Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 2 |
1965 | 2000 | Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop, Worcest |
1962 | 2001 | Financial Cryptography: 4th International Conference, FC 2000, Anguilla, British West Indies, F |
1958 | 2001 | Natural Language Processing and Information Systems: 5th International Conference on Applicatio |
1943 | 2000 | Computer Safety, Reliability and Security: 19th International Conference, SAFECOMP 2000, Rotter |
1895 | 2000 | Computer Security - ESORICS 2000 6th European Symposium on Research in Computer Security, Toulo |
1880 | 2000 | Advances in Cryptology - CRYPTO 2000: 20th Annual International Cryptology Conference, Santa Ba |
1854 | 2004 | SEMPER - Secure Electronic Marketplace for Europe |
1841 | 2000 | Information Security and Privacy 5th Australasian Conference, ACISP 2000, Brisbane, Australia, |
1838 | 2000 | Algorithmic Number Theory 4th International Symposium, ANTS-IV Leiden, The Netherlands, July |
1807 | 2000 | Advances in Cryptology - EUROCRYPT 2000: International Conference on the Theory and Application |
1758 | 2000 | Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99, Kingston, Ontario, C |
1751 | 2004 | Public Key Cryptography Third International Workshop on Practice and Theory in Public Key Cry |
1746 | 1999 | Cryptography and Coding: 7th IMA International Conference, Cirencester, UK, December 1999. Proc |
1740 | 1999 | Secure Networking - CQRE [Secure] '99: International Exhibition and Congress, Düsseldorf, Germa |
1729 | 1999 | Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1 |
1726 | 2004 | Information and Communication Security Second International Conference, ICICS99, Sydney, Austra |
1717 | 1999 | Cryptographic Hardware and Embedded Systems: First International Workshop, CHES'99, Worcester, |
1716 | 2004 | Advances in Cryptology - ASIACRYPT99 International Conference on the Theory and Application of |
1698 | 1999 | Computer Safety, Reliability and Security: 18th International Conference, SAFECOMP'99, Toulouse |
1666 | 1999 | Advances in Cryptology - CRYPTO'99: 19th Annual International Cryptology Conference, Santa Barb |
1648 | 1999 | Financial Cryptography: Third International Conference, FC'99, Anguilla, British West Indies, F |
1636 | 1999 | Fast Software Encryption :: 6th International Workshop, FSE’99 Rome, Italy, March 24–26, 1999 Procee |
1592 | 1999 | Advances in Cryptology - EUROCRYPT '99 International Conference on the Theory and Application o |
1587 | 1999 | Information Security and Privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Austr |
1561 | 1999 | Lectures on Data Security: Modern Cryptology in Theory and Practice |
1560 | 1999 | Public Key Cryptography: Second International Workshop on Practice and Theory in Public Key Cry |
1556 | 1999 | Selected Areas in Cryptography: 5th Annual International Workshop, SAC'98, Kingston, Ontario, C |
1550 | 1998 | Security Protocols: 6th International Workshop, Cambridge, UK, April 1998. Proceedings |
1528 | 1998 | State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptograp |
1516 | 1998 | Computer Safety, Reliability and Security: 17th International Conference, SAFECOMP'98, Heidelbe |
1514 | 1998 | Advances in Cryptology - ASIACRYPT'98: International Conference on the Theory and Application o |
1485 | 1998 | Computer Security ESORICS 98 5th European Symposium on Research in Computer Security Louvain |
1465 | 1998 | Financial Cryptography Second International Conference, FC '98 Anguilla, British West Indies |
1462 | 1998 | Advances in Cryptology CRYPTO '98 18th Annual International Cryptology Conference Santa Barbar |
1440 | 1999 | Advances in Cryptology 1981 – 1997 :: Electronic Proceedings and Index of the CRYPTO and EUROCRYPT C |
1438 | 1998 | Information Security and Privacy Third Australasian Conference, ACISP98 Brisbane, Australia, Ju |
1431 | 1998 | Public Key Cryptography First International Workshop on Practice and Theory in Public Key Cry |
1423 | 1998 | Algorithmic Number Theory Third International Symposiun, ANTS-III Portland, Oregon, USA, June |
1419 | 1998 | Mobile Agents and Security |
1403 | 1998 | Advances in Cryptology EUROCRYPT'98 International Conference on the Theory and Application of |
1396 | 1998 | Information Security First International Workshop, ISW'97 Tatsunokuchi, Ishikawa, Japan Septe |
1372 | 1998 | Fast Software Encryption: 5th International Workshop, FSE'98, Paris, France, March 1998. Procee |
1361 | 1998 | Security Protocols 5th International Workshop Paris, France, April 79, 1997 Proceedings |
1355 | 1997 | Cryptography and Coding 6th IMA International Conference Cirencester, UK, December 1719, 1997 |
1334 | 1997 | Information and Communications Security First International Conference, ICIS '97 Beijing, China |
1318 | 1997 | Financial Cryptography First International Conference, FC '97 Anguilla, British West Indies F |
1294 | 1997 | Advances in Cryptology CRYPTO '97 17th Annual International Cryptology Conference Santa Barbar |
1270 | 1997 | Information Security and Privacy Second Australasian Conference, ACISP'97 Sydney, NSW, Australi |
1267 | 1997 | Fast Software Encryption 4th International Workshop, FSE97 Haifa, Israel, January 2022 1997 P |
1233 | 1997 | Advances in Cryptology - EUROCRYPT '97: International Conference on the Theory and Application |
1189 | 1997 | Security Protocols International Workshop Cambridge, United Kingdom, April 1012, 1996 Proceed |
1179 | 1996 | Concurrency and Parallelism, Programming, Networking, and Security Second Asian Computing Scien |
1172 | 1996 | Information Security and Privacy First Australasian Conference, ACISP'96 Wollongong, NSW, Austr |
1163 | 1996 | Advances in Cryptology ASIACRYPT '96 International Conference on the Theory and Applications o |
1146 | 1996 | Computer Security ESORICS 96 4th European Symposium on Research in Computer Security Rome, Ita |
1122 | 1996 | Algorithmic Number Theory Second International Symposium, ANTS-II Talence, France, May 1823, |
1109 | 1996 | Advances in Cryptology - CRYPTO '96: 16th Annual International Cryptology Conference, Santa Bar |
1070 | 1996 | Advances in Cryptology - EUROCRYPT '96: International Conference on the Theory and Application |
1039 | 1996 | Fast Software Encryption Third International Workshop Cambridge, UK, February 2123 1996 Proce |
1029 | 1996 | Cryptography: Policy and Algorithms International Conference Brisbane, Queensland, Australia, J |
1025 | 1995 | Cryptography and Coding 5th IMA Conference Cirencester, UK, December 1820, 1995 Proceedings |
1008 | 1995 | Fast Software Encryption Second International Workshop Leuven, Belgium, December 1416, 1994 P |
1007 | 1995 | Integrity Primitives for Secure Information Systems Final Report of RACE Integrity Primitives E |
963 | 1995 | Advances in Cryptology - CRYPTO '95: 15th Annual International Cryptology Conference, Santa Bar |
950 | 1995 | Advances in Cryptology EUROCRYPT'94 Workshop on the Theory and Application of Cryptographic Te |
921 | 1995 | Advances in Cryptology - EUROCRYPT '95: International Conference on the Theory and Application |
917 | 1995 | Advances in Cryptology ASIACRYPT'94 4th International Conferences on the Theory and Applicatio |
877 | 1994 | Algorithmic Number Theory First International Symposium, ANTS-I Ithaca, NY, USA, May 69, 1994 |
875 | 1994 | Computer Security ESORICS 94 Third European Symposium on Research in Computer Security Brighto |
870 | 1994 | Distributed Programming Paradigms with Cryptography Applications |
839 | 1994 | Advances in Cryptology - CRYPTO '94: 14th Annual International Cryptology Conference, Santa Bar |
829 | 1994 | Error Control, Cryptology, and Speech Compression Workshop on Information Protection Moscow, Ru |
809 | 1994 | Fast Software Encryption Cambridge Security Workshop Cambridge, U. K., December 911,1993 Proc |
773 | 1994 | Advances in Cryptology - CRYPTO '93: 13th Annual International Cryptology Conference, Santa Bar |
765 | 1994 | Advances in Cryptology - EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic |
741 | 1993 | Computer Security and Industrial Cryptography State of the Art and Evolution ESAT Course, Leuve |
740 | 1993 | Advances in Cryptology - CRYPTO '92: 12th Annual International Cryptology Conference, Santa Bar |
739 | 1993 | Advances in Cryptology ASIACRYPT '91 International Conference on the Theory and Application of |
718 | 1993 | Advances in Cryptology AUSCRYPT '92 Workshop on the Theory and Application of Cryptographic Te |
658 | 1993 | Advances in Cryptology - EUROCRYPT '92: Workshop on the Theory and Application of Cryptographic |
648 | 1992 | Computer Security ESORICS 92 Second European Symposium on Research in Computer Security Toulou |
578 | 1992 | Public-Key Cryptography: State of the Art and Future Directions E.I.S.S.Workshop Oberwolfach, G |
576 | 1992 | Advances in Cryptology - CRYPTO '91: Proceedings |
547 | 1991 | Advances in Cryptology - EUROCRYPT '91: Workshop on the Theory and Application of Cryptographic |
537 | 1991 | Advances in Cryptology-CRYPTO '90 :: Proceedings |
473 | 1991 | Advances in Cryptology - EUROCRYPT '90: Workshop on the Theory and Application of Cryptographic |
453 | 1990 | Advances in Cryptology AUSCRYPT '90 International Conference on Cryptology Sydney, Australia, |
435 | 1990 | Advances in Cryptology - CRYPTO '89: Proceedings |
434 | 1990 | Advances in Cryptology - EUROCRYPT '89: Workshop on the Theory and Application of Cryptographic |
403 | 1990 | Advances in Cryptology - CRYPTO '88: Proceedings |
396 | 1989 | Local Area Network Security Workshop LANSEC '89 European Institute for System Security (E.I.S.S |
330 | 1988 | Advances in Cryptology - EUROCRYPT '88: Workshop on the Theory and Application of Cryptographic |
304 | 1988 | Advances in Cryptology - EUROCRYPT '87: Workshop on the Theory and Application of Cryptographic |
293 | 1988 | Advances in Cryptology - CRYPTO '87: Proceedings |
263 | 1987 | Advances in Cryptology - CRYPTO '86: Proceedings |
219 | 1986 | Advances in Cryptology - EUROCRYPT '85: Proceedings of a Workshop on the Theory and Application |
218 | 1986 | Advances in Cryptology — CRYPTO ’85 Proceedings |
209 | 1985 | Advances in Cryptology: Proceedings of EUROCRYPT 84 - A Workshop on the Theory and Application |
196 | 1985 | Advances in Cryptology: Proceedings of CRYPTO 84 |
149 | 1983 | Cryptography: Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - |
Springer has implemented two schemes for linking to SpringerLINK content. One of the schemes is based on the OpenURL standard and it has some nice properties. A periodical published in print usually has an ISSN (International Standard Serial Number). You can use the ISSNs of Springer's publications to build links to their online versions. Here are some examples:
Journal of Cryptology ISSN: 0933-2790 http://www.springerlink.com/openurl.asp?genre=journal&issn=0933-2790 Lecture Notes in Computer Science ISSN: 0302-9743 http://www.springerlink.com/openurl.asp?genre=journal&issn=0302-9743
Proceedings for the conferences listed above are published in the series Lecture Notes in Computer Science. To build a link to a particular proceedings you can use its volume number. For example, here is how to build a link to AsiaCrypt 2003:
Lecture Notes in Computer Science ISSN: 0302-9743 Volume: 2894 Title: Advances in Cryptology - ASIACRYPT 2003 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=2894Notice, in this last URL, the "genre" field has changed from "journal" to "issue".
30-May-2018 | As you may have guessed, this webpage is no longer being
maintained. Thanks goes to the Carleton Computer Security Lab, the
Saint Mary's University Dept of Mathematics and Computer Science, and
the University of Waterloo Faculty of Mathematics for hosting over the
last 14 years. Unfortunately, some infrastructure changes inside the
Carleton Computer Security Lab made maintaining this webpage
difficult. However, I was very happy that so many people found the
content here useful, and that a number of people cared enough about
the webpage to send me corrections and suggestions. |
10-Mar-2013 | The new SpringerLink web-site is a great improvement. The search
interface works very well and the html used to encode each LNCS volume
is fairly easy to parse (sensibile identifiers and structures are
used). Although Springer web-site updates usually break my scripts
(and this update was no exception), I have to say that I really like
this new design :-) My updated scripts now parse the LNCS RSS feed and use its content to trigger updates (I mentioned that I wanted to start using the RSS feed back in 2011). The feed is read and checked for new urls. If any are found, then they are visited and the content is parsed. This method is nice because it doesn't pester the Springer web server unnecessarily -- a new url published in the RSS feed will be visited just once. Because this new method is light-weight, I will increase the frequency of auto updates to every 2 hours. |
4-Mar-2013 | I received a message from RW that some LNCS volumes are missing
from the list above (e.g. CT-RSA 2013, SAC 2012). This is because
Springer has recently updated their web-site, and so my scripts no
longer work. I will work on an update. I should have something ready
in a few days. Stay tuned :-) |
8-Sep-2012 | SC let me know that the table of "Volumes Related to Cryptography
and Security" contained some stray strings picked up from the LNCS
webpage (there were lots of "Book Chapter" strings hanging around).
This was caused by the SpringerLink web server -- it no longer seems to
be interpreting the following url correctly,
http://www.springerlink.com/openurl.asp?genre=journal&issn=0302-9743.
This url should point to the LNCS main web page, but, when I follow
it, the server responds with another page that lists the book chapters
inside an LNCS volume. It looks like Springer broke their OpenURL
interpreter (this has happened a few times). In any case, I've found
a way to work around it. |
18-May-2012 | The Financial Cryptography listing was incorrect because the
workshop proceedings were thrown in with the FC proceedings. I've
updated the filter rule, which should fix the problem. |
9-May-2012 | An error in the ICICS listing was reported by NZ. The WISTP 2011
proceedings were mistakenly caught by the ICICS filter. I've updated
the filter so this hopefully will not happen again. |
28-April-2011 | JH let me know that there was an error in the listing for ICISC.
There was a fictitious "ICISC 2010" link that actually pointed to
LATINCRYPT 2010; the proceedings for ICISC 2010 have not yet been
published. |
8-Feb-2011 | RW noticed that some recent LNCS volumes were not being picked up
by my script. This was due to changes on the LNCS webpage. The
information for LNCS volumes is now displayed in a new format. This
required some updates to my scripts, but it should be back to normal
now. Sometime soon, I will change how the automatic updates are done. Rather than parse SpringerLINK html directly, I will use their RSS feed. This will simplify some things for me. |
14-June-2010 | I've added regular conference entries for "Africacrypt", "Provable
Security", "Pairing-Based Cryptography" and "Cryptography and Coding";
these entries were suggested by AM. |
10-June-2010 | Springer seems to have corrected the problem with their OpenURL
interpreter. The URLs above are now functioning properly. |
9-June-2010 | DS reported yesterday (8 June) that the URLs above are no longer
linking to the appropriate LNCS volumes. Instead, they all point to
the main LNCS page. Unfortunately, this happens from time to time
(see the log entries below) and is due to some change on Springer's
end (e.g. a database update that wipes out their OpenURL interpreter).
I've just sent an email to their support group requesting that they
restore OpenURL functionality. Stay tuned. |
13-May-2010 | AM observed that a number of 2010 lncs volumes were missing from
the list above. This was true even though auto updates were being
carried out. The issue, which has now been resolved, was that
Springer has banned http requests that carry a "Wget" user agent
string. Wget is the utility that I use to fetch web pages from
SpringerLINK. I suspect Springer made this change in January or
February 2010. |
24-June-2009 | JH noticed that one of the proceedings for the newly formed
Inscrypt conference was incorrectly grouped with the ICISC
proceedings. This was due to the fact that both ICISC and Inscrypt
use the phrase "Information Security and Cryptology" in the title of
their proceedings. This has now been corrected. |
22-Dec-2007 | MN just pointed out that the urls to EUROCRYPT 94 and EUROCRYPT 95
were swapped (i.e. the EUROCRYPT 94 url pointed to EUROCRYPT 95, and
the EUROCRYPT 95 url pointed to EUROCRYPT 94). This was due to the
surprising fact that the volume number for EUROCRYPT 94 comes after
the volume number for EUROCRYPT 95. The two urls have now been
corrected. |
2-Nov-2007 | Another previously "missing" lncs volume has appeared on-line.
Financial Cryptography 2002 is now accessible through a url above.
Note that the machine which hosts this web page has changed. This
page now lives on a machine in the Department of Mathematics and
Computing Science at Saint Mary's University. I've just begun a
limited term position there this fall. |
27-Apr-2007 | This morning, DS noticed that all my links were broken. I emailed
Springer and their reply informed me that this was due to some
database issues on their end. This afternoon, everything is
working again. |
7-Jan-2007 | Springer has added some the previously "missing" LNCS volumes to their on-line
library. In particular, ACISP 2000 (vol. 1841) and Information Hiding 1999 (vol. 1768)
are now available. I've added the appropriate links to the listing of regular
conferences. Unfortunately, Financial Cryptography 2002 (vol. 2357) is
still "missing" (note: if you try entering "2357" in the "Enter a volume number" form
above, then the SpringerLINK server replies with "Bad Request".) |
3-Jan-2007 | By request, I've included ESORICS in the list of regular
conferences. |
17-Oct-2006 | I've changed the way that updates are done (again). My last
change made it that so only the first two pages of Springer's LNCS
collection were pulled down each update. The problem with that
approach was that many newly added LNCS volumes first appear farther back in
Springer's LNCS collection (e.g. on page 7, say, rather than on page 1 or 2).
So now my script pulls down the first 50 pages of the LNCS database to
look for new volumes. This should catch proceedings which are
assigned volume numbers but are not published until many months later
(e.g. this is usually the case for the SAC proceedings).
|
10-Oct-2006 | By request, a regular conference entry for Information Hiding has been added. Note that the LNCS volume for Information Hiding 1999
(vol. 1768) is not available in SpringerLINK.
|
1-Oct-2006 | Added a regular conference entry for PET - Privacy Enhancing Technologies. Also, some new volumes which match the key word "privacy" have been added.
|
14-Sep-2006 | My scripts are now adjusted to handle the content on the new
SpringerLINK website. Doing this turned out to be easier than I thought.
One advantage of the change-over is that the data listed for each LNCS
volume on the Springer website is more complete; previously there were
several LNCS volumes (20-30) that did not have titles listed. I now have
a more complete database of all the LNCS volumes. Also, the way I update
the links above is done differently now. Before my scripts pulled down
several SpringerLINK webpages and built an LNCS database from scratch each
week. Now I am just pulling down just two webpages. Because of this
change I think it is safe to increase the update frequency to three times
a week (4am Sunday, Tuesday, Thurday). |
16-Aug-2006 | Springer recently redesigned their SpringerLINK online library.
After the initial change-over, urls which used the OpenURL standard
were not being interpretted correctly. This caused the urls above to
stop working. However, the problem seems to have been quickly fixed
on Springer's end and my urls appear to be functional now. The new
SpringerLINK website poses one other problem -- my auto-update script
will no longer work correctly. I will have to temporarily disable
auto-updates until I get a chance to have a look at the new data
format. |
17-July-2006 | The listing for ACISP has been corrected to include all the
volumes back to 1996. Note that ACISP 2000 (vol. 1841) is not
in the SpringerLINK archive so it is not included in the list. |
18-June-2006 | By request, a regular conference entry has been added for ACNS
(Applied Cryptography and Network Security) -- note that the fourth
ACNS just took place. Also, some errors in links to FSE, ICICS and
ICISC proceedings were fixed (did you know that FSE 1997 is listed in
Springer's LNCS database three times?). Finally, some new volumes
which match the key phrase "public key" have been added. |
25-May-2006 | Added some new volumes to the list, including "Composition of
Secure Multi-Party Protocols" (2815) and others with the word "secure"
in their titles. |
07-Mar-2006 | Added a regular conference entry for TCC - Theory of
Cryptography. |
05-Feb-2006 | The saga continues... Springer has now apparently scratched its
"historical archive". This means that all the pre-1997 LNCS volumes
are now back with the more recent LNCS volumes. This happened
sometime in the week prior to 29-Jan-2006. I've updated my script
(again!) and I think everything is OK now. Thank-you to those people
who pointed out some unusual links (e.g. CRYPTO 2018) after last
week's update. |
14-Jan-2006 | I emailed Springer in early December and asked what happened to
the pre-1997 LNCS volumes. They responded promptly and explained that
the volumes are still available on-line, it's just that they have been
moved into their historical
archive. |
2-Dec-2005 | It appears that Springer has removed all LNCS volumes published
prior to 1997 from their online database! The urls that I had
previously constructed no longer work. This appears to have happened
in the week 20-27 November 2005. I wonder why they did
this... |
21-July-2005 | I've moved the site to a machine inside the School of Computer
Science at Carleton University. I started a postdoctoral fellowship
at Carleton in late June. |
18-July-2005 | Due to an OS upgrade on one of the university machines, the
crontab file which was automatically updating this webpage was dropped
from its queue. This happened about a month ago but I didn't notice
until now. I've restored the crontab file and updated the links.
Weekly updates should continue to work as they did previously.
|
6-May-2005 | Added a regular conference entry for ACISP. |
24-March-2005 | In late January 2005, Springer updated their LNCS webpage. This
caused one of the scripts which I use to update the links above to
stop working. I have finally found time to fix things and so the
automatic updates should continue as before. |
19-June-2004 | Created web page. |