<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/themes/root/assets/xsl/rss.xsl"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Αποτελέσματα για "Data encryption (Computer science)."</title>
    <description>Εμφανίζονται 1 - 50 Αποτελέσματα από 1614</description>
    <generator>Laminas_Feed_Writer 2 (https://getlaminas.org)</generator>
    <link>https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;lookfor=%22Data+encryption+%28Computer+science%29.%22&amp;type=Subject&amp;lng=el</link>
    <opensearch:totalResults>1614</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="%22Data%20encryption%20%28Computer%20science%29.%22" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" title="Μετάβαση στην Πρώτη Σελίδα" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Data+encryption+%28Computer+science%29.%22&amp;type=Subject&amp;lng=el"/>
    <atom:link rel="next" type="application/rss+xml" title="Μετάβαση στην Επόμενη Σελίδα" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Data+encryption+%28Computer+science%29.%22&amp;type=Subject&amp;lng=el&amp;page=2"/>
    <atom:link rel="last" type="application/rss+xml" title="Μετάβαση στην Τελευταία Σελίδα" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Data+encryption+%28Computer+science%29.%22&amp;type=Subject&amp;lng=el&amp;page=33"/>
    <item>
      <title>Engineering Secure Software and Systems 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-15618-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-15618-7</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-15943-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-15943-0</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Arithmetic of Finite Fields 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16277-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16277-5</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16295-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16295-9</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16363-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16363-5</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16715-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16715-2</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16745-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16745-9</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-16763-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-16763-3</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-17016-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-17016-9</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Leakage Resilient Password Systems</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-17503-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-17503-4</guid>
      <author>Li, Yingjiu</author>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Li, Yingjiu</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-17533-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-17533-1</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18467-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18467-8</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-18681-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-18681-8</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-19321-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-19321-2</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-19962-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-19962-7</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Smart TV Security Media Playback and Digital Video Broadcast /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-20994-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-20994-4</guid>
      <author>Michéle, Benjamin</author>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Michéle, Benjamin</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Encrypted Email The History and Technology of Message Privacy /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21344-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21344-6</guid>
      <author>Orman, Hilarie</author>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Orman, Hilarie</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21356-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21356-9</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21476-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21476-4</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-21966-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-21966-0</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22174-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22174-8</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22270-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22270-7</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22425-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22425-1</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-22846-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-22846-4</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Algebraic Informatics 6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015. Proceedings /</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-23021-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-23021-4</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Diffusion in Social Networks</title>
      <pubDate>Thu, 01 Jan 2015 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-23105-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-23105-1</guid>
      <author>Shakarian, Paulo</author>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Shakarian, Paulo</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Elements of Cloud Computing Security A Survey of Key Practicalities /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-41411-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-41411-9</guid>
      <author>Alani, Mohammed M.</author>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Alani, Mohammed M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-48674-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-48674-1</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-45931-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-45931-8</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>iOS Penetration Testing A Definitive Guide to iOS Security /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4842-2355-0</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4842-2355-0</guid>
      <author>Relan, Kunal</author>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Relan, Kunal</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Digital Watermarking Techniques in Curvelet and Ridgelet Domain</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-32951-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-32951-2</guid>
      <author>Rao, Channapragada Rama Seshagiri</author>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Rao, Channapragada Rama Seshagiri</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-662-49896-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-662-49896-5</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyber-Physical Attack Recovery Procedures A Step-by-Step Preparation and Response Guide /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4842-2065-8</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4842-2065-8</guid>
      <author>Ayala, Luis</author>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Ayala, Luis</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Arithmetic of Finite Fields 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-55227-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-55227-9</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyber-security of SCADA and Other Industrial Control Systems</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-32125-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-32125-7</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Privacy-Enhancing Aggregation Techniques for Smart Grid Communications</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-32899-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-32899-7</guid>
      <author>Lu, Rongxing</author>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Lu, Rongxing</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyber Deception Building the Scientific Foundation /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-32699-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-32699-3</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-32871-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-32871-3</guid>
      <author>Al-Shaer, Ehab</author>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Al-Shaer, Ehab</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-41483-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-41483-6</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applications /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-42644-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-42644-0</guid>
      <author>Liu, Wen Ming</author>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Liu, Wen Ming</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part II /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-44406-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-44406-2</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part I /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-44403-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-44403-1</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-48057-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-48057-2</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Ten Laws for Security</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-42641-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-42641-9</guid>
      <author>Diehl, Eric</author>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Diehl, Eric</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-48671-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-48671-0</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-49145-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-49145-5</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Understanding Social Engineering Based Scams</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4939-6457-4</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4939-6457-4</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-45741-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-45741-3</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-662-49099-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-662-49099-0</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I /</title>
      <pubDate>Fri, 01 Jan 2016 22:17:09 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-40253-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-40253-6</guid>
      <dc:format>Ηλεκτρονική πηγή</dc:format>
      <dc:format>Ηλ. βιβλίο</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
