- Privacy, security, and trust within the context of pervasive computingRobinson, Philip;Wagealla, Waleed;Vogt, HaraldRead
- Security for telecommunications networksTraynor, Patrick;La Porta, Thomas F;McDaniel, PatrickRead
- Mathematical methods in computer science : essays in memory of Thomas BethCalmet, Jacques;Geiselmann, Willi;Müller-Quade, JörnRead
- Cryptographic hardware and embedded systems--CHES 2011 : 13th international workshop, Nara, Japan, September 28-October 1, 2011 : proceedingsPreneel, Bart;Takagi, TsuyoshiRead
- High performance networking, computing, and communication systems : Second International Conference, ICHCC 2011, Singapore, May 5-6, 2011 : selected papersWu, YanwenRead
- Block cipher companion, TheKnudsen, Lars;Robshaw, MatthewRead
- Applied information security : a hands-on approachBasin, David;Schaller, Patrick;Schläpfer, MichaelRead
- Theoretical and mathematical foundations of computer science : second International Conference, ICTMF 2011, Singapore, May 5-6, 2011, selected papersZhou, QihaiRead
- Encyclopedia of cryptography and securityJajodia, Sushil;Tilborg, Henk C. A. vanRead
- Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedingsQing, SihanRead
- Cryptography and coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011 : proceedingsChen, LiqunRead
- Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedingsLin, Dongdai;Tsudik, G;Wang, XiaoyunRead
- Analysis of rare categoriesHe, JingruiRead
- Engineering secure software and systems : 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012 : proceedingsBarthe, Gilles;Livshits, Benjamin;Scandariato, RiccardoRead
- E-Business and telecommunications : 7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised selected papersFilipe, Joaquim;Obaidat, Mohammad S;Tsihrintzis, George ARead
- Survey of data leakage detection and prevention solutions, AShabtai, Asaf;Elovici, Yuval;Rokach, LiorRead
- Applications of algebra to communications, control, and signal processingBoston, NigelRead
- Information security technology for applications : 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised selected papersLaud, PeeterRead
- Theory and applications of models of computation : 9th annual conference, TAMC 2012, Beijing, China, May 16-21, 2012 : proceedingsAgrawal, Manindra;Cooper, S. B;Li, AngshengRead
- Crittografia nel Paese delle MeraviglieVenturi, DanieleRead
- Information security theory and practice : security, privacy and trust in computing systems and ambient intelligent ecosystems ; 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20Askoxylakis, Ioannis;Pöhls, Henrich C;Posegga, JoachimRead
- Progress in cryptology -- AFRICACRYPT 2012 : 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. ProceedingsMitrokotsa, Aikaterini;Vaudenay, SergeRead
- Fault analysis in cryptographyJoye, Marc;Tunstall, MichaelRead
- Arithmetic of finite fields : 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012. ProceedingsÖzbudak, Ferruh;Rodríguez-Henríquez, FranciscoRead
- Digital forensics and watermarking : 10th International Workshop, IWDW 2011, Atlantic City, NY, October 23-26, 2011, Revised selected papersKim, Hyoung Joong;Pérez-González, F;Shi, Yun QRead
- Engineering secure two-party computation protocols : design, optimization, and applications of efficient secure function evaluationSchneider, ThomasRead
- Operational semantics and verification of security protocolsCremers, Cas;Mauw, SRead
- Network science and cybersecurityPino, Robinson ERead
- Cryptography in constant parallel timeApplebaum, BennyRead
- Biometrics in the new world : the cloud, mobile technology and pervasive identityAshbourn, JulianRead
- Trustworthy reconfigurable systems : enhancing the security capabilities of reconfigurable hardware architecturesFeller, ThomasRead
- Authentication in insecure environments : using visual cryptography and non-transferable credentials in practisePape, SebastianRead
- Medicine - All Feeds
- Allergology and Immunology
- Anatomy and Physiology
- Anesthesiology and Intensive Care
- Biochemistry
- Bioengineering
- Biophysics
- Biotechnology
- Cardiology
- Cardiothoracic Surgery
- Clinical Chemistry
- Clinical Medicine
- Complementary Medicine
- Cytology and Histology
- Dentistry
- Dermatology
- Endocrinology
- Forensic Medicine
- Gastroenterology
- General Practice
- Genetics
- Geriatrics
- Health services and Administration
- Hematology
- Infectious Diseases
- Internal Medicine
- Logopedics
- Medical Education and Humanities
- Medical Microbiology
- Medicine - Other
- Nephrology
- Neurology
- Neurosurgery
- Nursing
- Nutritional Sciences
- Obstetrics and Gynecology
- Occupational Health
- Oncology
- Ophthalmology
- Oral and Maxillofacial Surgery
- Orthopedics and Traumatology
- Otorhinolaryngology and Phoniatrics
- Pathology
- Pediatrics
- Pharmacology and Pharmacotherapy
- Physical and Rehabilitation Medicine
- Plastic Surgery
- Psychiatry
- Psychology
- Public Health
- Radiology
- Respiratory Medicine
- Rheumatology
- Sports Medicine
- Surgery
- Urology