Title: Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings, Author: Willem Jonker
Title: Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, Author: Joan Feigenbaum
Title: Data Transportation and Protection, Author: John E. Hershey
Title: Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, Author: Lynn Batten
Title: Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers, Author: Giovanni Di Crescenzo
Title: Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings, Author: Yun Qing Shi
Title: Advances in Cryptology - ASIACRYPT '96: International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Korea, November 3 - 7, 1996, Proceedings, Author: Kwangjo Kim
Title: Information Hiding: 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, Author: Kaushal Solanki
Title: Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings, Author: Vijav Varadharajan
Title: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Author: Damien Sauveron
Title: Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers, Author: Ingemar J. Cox
Title: Trust, Privacy, and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, Author: Sokratis Katsikas
Title: Digital Watermarking: 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, Author: Mauro Barni
Title: Information Security and Privacy: Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings, Author: Colin Boyd
Title: Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, Author: Sushil Jajodia
Title: Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers, Author: Angelos D. Keromytis
Title: Integrity Primitives for Secure Information Systems: Final RIPE Report of RACE Integrity Primitives Evaluation, Author: Antoon Bosselaers
Title: Research Directions in Database Security, Author: Teresa F. Lunt
Title: Guarding Your Business: A Management Approach to Security, Author: Manu Malek
Title: Data and Applications Security XX: 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, Author: Ernesto Damiani

Pagination Links