<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/themes/root/assets/xsl/rss.xsl"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Results for "Computer security"</title>
    <description>Showing 1 - 50 results of 2153</description>
    <generator>Laminas_Feed_Writer 2 (https://getlaminas.org)</generator>
    <link>https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;lookfor=%22Computer+security%22&amp;type=AllFields&amp;lng=en</link>
    <opensearch:totalResults>2153</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="%22Computer%20security%22" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" title="Go to First Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Computer+security%22&amp;type=AllFields&amp;lng=en"/>
    <atom:link rel="next" type="application/rss+xml" title="Go to Next Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Computer+security%22&amp;type=AllFields&amp;lng=en&amp;page=2"/>
    <atom:link rel="last" type="application/rss+xml" title="Go to Last Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Computer+security%22&amp;type=AllFields&amp;lng=en&amp;page=44"/>
    <item>
      <title>Handbook on Data Centers</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4939-2092-1</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4939-2092-1</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Trusted Computing for Embedded Systems</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-09420-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-09420-5</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advanced Research in Data Privacy</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-09885-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-09885-2</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Game Theoretic Analysis of Congestion, Safety and Security Traffic and Transportation Theory /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-11674-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-11674-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Distributed Computing and Internet Technology 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-14977-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-14977-6</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security Issues in Mobile NFC Devices</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-15488-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-15488-6</guid>
      <author>Roland, Michael</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Roland, Michael</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Passive and Active Measurement 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-15509-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-15509-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-15943-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-15943-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security Planning An Applied Approach /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16027-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16027-6</guid>
      <author>Lincke, Susan</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Lincke, Susan</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Aspect-Oriented Security Hardening of UML Design Models</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16106-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16106-8</guid>
      <author>Mouheb, Djedjiga</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Mouheb, Djedjiga</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Protecting Privacy in Data Release</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16109-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16109-9</guid>
      <author>Livraga, Giovanni</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Livraga, Giovanni</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16295-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16295-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16363-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16363-5</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Self- and Co-regulation in Cybercrime, Cybersecurity and National Security</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16447-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16447-2</guid>
      <author>Tropina, Tatiana</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Tropina, Tatiana</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Pattern and Security Requirements Engineering-Based Establishment of Security Standards /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16664-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16664-3</guid>
      <author>Beckers, Kristian</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Beckers, Kristian</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16715-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16715-2</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16745-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16745-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16763-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16763-3</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-17016-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-17016-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Counterterrorism and Cybersecurity Total Information Awareness /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-17244-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-17244-6</guid>
      <author>Lee, Newton</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Lee, Newton</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Leakage Resilient Password Systems</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-17503-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-17503-4</guid>
      <author>Li, Yingjiu</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Li, Yingjiu</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-17533-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-17533-1</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyber Security: Analytics, Technology and Automation</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18302-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18302-2</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18455-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18455-5</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18467-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18467-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18491-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18491-3</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18500-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18500-2</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Privacy and Identity Management for the Future Internet in the Age of Globalisation 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18621-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18621-4</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18681-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18681-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cybersecurity in Israel</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18986-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18986-4</guid>
      <author>Tabansky, Lior</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Tabansky, Lior</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Future Network Systems and Security First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-19210-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-19210-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advanced Information Systems Engineering Workshops CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-19243-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-19243-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-19321-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-19321-2</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Intelligent Cloud Computing First International Conference, ICC 2014, Muscat, Oman, February 24-26, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-19848-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-19848-4</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Digital Defense A Cybersecurity Primer /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-19953-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-19953-5</guid>
      <author>Pelton, Joseph</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Pelton, Joseph</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-19962-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-19962-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Intelligent Mechanisms for Network Configuration and Security 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-20034-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-20034-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Detection of Intrusions and Malware, and Vulnerability Assessment 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-20550-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-20550-2</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Data and Applications Security and Privacy XXIX 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-20810-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-20810-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Encrypted Email The History and Technology of Message Privacy /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21344-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21344-6</guid>
      <author>Orman, Hilarie</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Orman, Hilarie</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21356-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21356-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21476-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21476-4</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Stabilization, Safety, and Security of Distributed Systems 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21741-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21741-3</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21966-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21966-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Interactive Theorem Proving 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22102-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22102-1</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22174-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22174-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22270-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22270-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22425-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22425-1</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22846-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22846-4</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Trust, Privacy and Security in Digital Business 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 19:36:21 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22906-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22906-5</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
