Search Results for - Narrowed by: Electronic Library - Coding theory. - Computer science. - Data structures (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026te$003dILS$0026rt$003dfalse$00257C$00257C$00257CISBN$00257C$00257C$00257CISBN$0026ps$003d300?
2024-08-28T09:19:43Z
Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334707
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Jacobson, Michael. editor. Locasto, Michael. editor. Mohassel, Payman. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334707.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335197
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Stam, Martijn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335197.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197478
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Chim, Tat Wing. editor. Yuen, Tsz Hon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197603
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Pieprzyk, Josef. editor. Sadeghi, Ahmad-Reza. editor. Manulis, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35404-5">http://dx.doi.org/10.1007/978-3-642-35404-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
ent://SD_ILS/0/SD_ILS:198953
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196303
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Aura, Tuomas. editor. Järvinen, Kimmo. editor. Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196738
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Laud, Peeter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197053
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Bao, Feng. editor. Samarati, Pierangela. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197072
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Mitrokotsa, Aikaterini. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31410-0">http://dx.doi.org/10.1007/978-3-642-31410-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems – CHES 2012 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197310
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Prouff, Emmanuel. editor. Schaumont, Patrick. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33027-8">http://dx.doi.org/10.1007/978-3-642-33027-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 – November 2, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197492
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Jøsang, Audun. editor. Carlsson, Bengt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34210-3">http://dx.doi.org/10.1007/978-3-642-34210-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
e-Business and Telecommunications 7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195876
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Obaidat, Mohammad S. editor. Tsihrintzis, George A. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25206-8">http://dx.doi.org/10.1007/978-3-642-25206-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
e-Business and Telecommunications 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194254
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Obaidat, Mohammad S. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20077-9">http://dx.doi.org/10.1007/978-3-642-20077-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195249
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Robles, Rosslin John. editor. Balitanas, Maricel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23141-4">http://dx.doi.org/10.1007/978-3-642-23141-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identity-Based Encryption
ent://SD_ILS/0/SD_ILS:173195
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Chatterjee, Sanjit. author. Sarkar, Palash. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-9383-0">http://dx.doi.org/10.1007/978-1-4419-9383-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Watermarking 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193883
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Kim, Hyoung-Joong. editor. Shi, Yun Qing. editor. Barni, Mauro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-18405-5">http://dx.doi.org/10.1007/978-3-642-18405-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195966
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Lin, Dongdai. editor. Tsudik, Gene. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25513-7">http://dx.doi.org/10.1007/978-3-642-25513-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195967
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Chen, Liqun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:172455
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author van Tilborg, Henk C. A. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Combinatorial Algorithms 21st International Workshop, IWOCA 2010, London, UK, July 26-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193973
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Iliopoulos, Costas S. editor. Smyth, William F. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19222-7">http://dx.doi.org/10.1007/978-3-642-19222-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems – CHES 2011 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195497
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Preneel, Bart. editor. Takagi, Tsuyoshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23951-9">http://dx.doi.org/10.1007/978-3-642-23951-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195888
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Qing, Sihan. editor. Susilo, Willy. editor. Wang, Guilin. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Game Start! Strumenti per comprendere i videogiochi
ent://SD_ILS/0/SD_ILS:204562
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Alinovi, Francesco. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-88-470-1956-0">http://dx.doi.org/10.1007/978-88-470-1956-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems, CHES 2010 12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192851
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Mangard, Stefan. editor. Standaert, François-Xavier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15031-9">http://dx.doi.org/10.1007/978-3-642-15031-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193656
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Heng, Swee-Huay. editor. Wright, Rebecca N. editor. Goi, Bok-Min. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17619-7">http://dx.doi.org/10.1007/978-3-642-17619-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security
ent://SD_ILS/0/SD_ILS:167094
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Huang, Scott C.-H. editor. MacCallum, David. editor. Du, Ding-Zhu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-73821-5">http://dx.doi.org/10.1007/978-0-387-73821-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encryption for Digital Content
ent://SD_ILS/0/SD_ILS:171850
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Kiayias, Aggelos. author. Pehlivanoglu, Serdar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Signatures
ent://SD_ILS/0/SD_ILS:165432
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Katz, Jonathan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-27712-7">http://dx.doi.org/10.1007/978-0-387-27712-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191712
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Gu, Qijun. editor. Zang, Wanyu. editor. Yu, Meng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193666
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Soriano, Miguel. editor. Qing, Sihan. editor. López, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection IV Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193415
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Moore, Tyler. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16806-2">http://dx.doi.org/10.1007/978-3-642-16806-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190173
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Abdalla, Michel. editor. Pointcheval, David. editor. Fouque, Pierre-Alain. editor. Vergnaud, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal to Practical Security Papers Issued from the 2005-2008 French-Japanese Collaboration
ent://SD_ILS/0/SD_ILS:190185
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Cortier, Véronique. editor. Kirchner, Claude. editor. Okada, Mitsuhiro. editor. Sakurada, Hideki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02002-5">http://dx.doi.org/10.1007/978-3-642-02002-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191273
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Jacobson, Michael J. editor. Rijmen, Vincent. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05445-7">http://dx.doi.org/10.1007/978-3-642-05445-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Security Technology International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191311
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Kim, Haeng-kon. editor. Kim, Tai-hoon. editor. Kiumi, Akingbehin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10240-0">http://dx.doi.org/10.1007/978-3-642-10240-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - INDOCRYPT 2009 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191427
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Roy, Bimal. editor. Sendrier, Nicolas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10628-6">http://dx.doi.org/10.1007/978-3-642-10628-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191592
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Qing, Sihan. editor. Mitchell, Chris J. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11145-7">http://dx.doi.org/10.1007/978-3-642-11145-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primality Testing and Integer Factorization in Public-Key Cryptography
ent://SD_ILS/0/SD_ILS:167452
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Key Establishment
ent://SD_ILS/0/SD_ILS:167859
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Choo, Kim-Kwang Raymond. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-87969-7">http://dx.doi.org/10.1007/978-0-387-87969-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
String Processing and Information Retrieval 15th International Symposium, SPIRE 2008, Melbourne, Australia, November 10-12, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189202
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Amir, Amihood. editor. Turpin, Andrew. editor. Moffat, Alistair. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89097-3">http://dx.doi.org/10.1007/978-3-540-89097-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190377
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Park, Jong Hyuk. editor. Chen, Hsiao-Hwa. editor. Atiquzzaman, Mohammed. editor. Lee, Changhoon. editor. Kim, Tai-hoon. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02617-1">http://dx.doi.org/10.1007/978-3-642-02617-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190382
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Park, Jong Hyuk. editor. Zhan, Justin. editor. Lee, Changhoon. editor. Wang, Guilin. editor. Kim, Tai-hoon. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02633-1">http://dx.doi.org/10.1007/978-3-642-02633-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection II
ent://SD_ILS/0/SD_ILS:167881
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Papa, Mauricio. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust Management III Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190202
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Ferrari, Elena. editor. Li, Ninghui. editor. Bertino, Elisa. editor. Karabulut, Yuecel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02056-8">http://dx.doi.org/10.1007/978-3-642-02056-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes 18th International Symposium, AAECC-18 2009, Tarragona, Spain, June 8-12, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190242
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Bras-Amorós, Maria. editor. Høholdt, Tom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02181-7">http://dx.doi.org/10.1007/978-3-642-02181-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fast Software Encryption 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190589
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Dunkelman, Orr. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03317-9">http://dx.doi.org/10.1007/978-3-642-03317-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190634
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Degano, Pierpaolo. editor. Viganò, Luca. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03459-6">http://dx.doi.org/10.1007/978-3-642-03459-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings
ent://SD_ILS/0/SD_ILS:190785
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Markowitch, Olivier. editor. Bilas, Angelos. editor. Hoepman, Jaap-Henk. editor. Mitchell, Chris J. editor. Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems - CHES 2009 11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190848
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Clavier, Christophe. editor. Gaj, Kris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04138-9">http://dx.doi.org/10.1007/978-3-642-04138-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190855
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Avanzi, Roberto Maria. editor. Keliher, Liam. editor. Sica, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04159-4">http://dx.doi.org/10.1007/978-3-642-04159-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Hiding 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190946
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Katzenbeisser, Stefan. editor. Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04431-1">http://dx.doi.org/10.1007/978-3-642-04431-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Watermarking 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008. Selected Papers
ent://SD_ILS/0/SD_ILS:190948
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Kim, Hyoung-Joong. editor. Katzenbeisser, Stefan. editor. Ho, Anthony T. S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04438-0">http://dx.doi.org/10.1007/978-3-642-04438-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190950
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Backes, Michael. editor. Ning, Peng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191012
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Pieprzyk, Josef. editor. Zhang, Fangguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04642-1">http://dx.doi.org/10.1007/978-3-642-04642-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191053
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Jøsang, Audun. editor. Maseng, Torleiv. editor. Knapskog, Svein Johan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04766-4">http://dx.doi.org/10.1007/978-3-642-04766-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection III Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191062
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Palmer, Charles. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04798-5">http://dx.doi.org/10.1007/978-3-642-04798-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
e-Business and Telecommunications International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191190
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Filipe, Joaquim. editor. Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05197-5">http://dx.doi.org/10.1007/978-3-642-05197-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191494
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Ślęzak, Dominik. editor. Kim, Tai-hoon. editor. Fang, Wai-Chi. editor. Arnett, Kirk P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191500
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Parker, Matthew G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - CRYPTO 2009 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190600
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Halevi, Shai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03356-8">http://dx.doi.org/10.1007/978-3-642-03356-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Watermarking 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190703
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Ho, Anthony T. S. editor. Shi, Yun Q. editor. Kim, H. J. editor. Barni, Mauro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03688-0">http://dx.doi.org/10.1007/978-3-642-03688-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematical Methods in Computer Science Essays in Memory of Thomas Beth
ent://SD_ILS/0/SD_ILS:189380
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Calmet, Jacques. editor. Geiselmann, Willi. editor. Müller-Quade, Jörn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89994-5">http://dx.doi.org/10.1007/978-3-540-89994-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings
ent://SD_ILS/0/SD_ILS:189415
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Shi, Yun Q. editor. Kim, Hyoung-Joong. editor. Katzenbeisser, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:186153
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-71039-4">http://dx.doi.org/10.1007/978-3-540-71039-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptanalytic Attacks on RSA
ent://SD_ILS/0/SD_ILS:166422
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Cards, Tokens, Security and Applications
ent://SD_ILS/0/SD_ILS:166922
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Mayes, Keith E. author. Markantonakis, Konstantinos. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Processing and Protection
ent://SD_ILS/0/SD_ILS:167026
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Pejaś, Jerzy. editor. Saeed, Khalid. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:189090
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Chen, Liqun. editor. Ryan, Mark D. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptography Principles and Applications
ent://SD_ILS/0/SD_ILS:185185
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Delfs, Hans. author. Knebl, Helmut. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
String Processing and Information Retrieval 14th International Symposium, SPIRE 2007 Santiago, Chile, October 29-31, 2007 Proceedings
ent://SD_ILS/0/SD_ILS:187440
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Ziviani, Nivio. editor. Baeza-Yates, Ricardo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75530-2">http://dx.doi.org/10.1007/978-3-540-75530-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware Detection
ent://SD_ILS/0/SD_ILS:166294
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Christodorescu, Mihai. editor. Jha, Somesh. editor. Maughan, Douglas. editor. Song, Dawn. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Electronic Postage Systems Technology, Security, Economics
ent://SD_ILS/0/SD_ILS:166296
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Bleumer, Gerrit. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ent://SD_ILS/0/SD_ILS:166337
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Poovendran, Radha. editor. Roy, Sumit. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Wireless Sensor Networks
ent://SD_ILS/0/SD_ILS:166353
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Liu, Donggang. author. Ning, Peng. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Applications for Communications Security
ent://SD_ILS/0/SD_ILS:165205
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Vaudenay, Serge. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Computer Security
ent://SD_ILS/0/SD_ILS:175390
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Salomon, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
String Processing and Information Retrieval 13th International Conference, SPIRE 2006, Glasgow, UK, October 11-13, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:184864
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Crestani, Fabio. editor. Ferragina, Paolo. editor. Sanderson, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11880561">http://dx.doi.org/10.1007/11880561</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Wireless Network Security
ent://SD_ILS/0/SD_ILS:165680
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Vacca, John R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Viruses and Malware
ent://SD_ILS/0/SD_ILS:166010
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CryptoGraphics Exploiting Graphics Cards for Security
ent://SD_ILS/0/SD_ILS:166011
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Cook, Debra L. author. Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Algebraic Aspects of the Advanced Encryption Standard
ent://SD_ILS/0/SD_ILS:166179
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Cid, Carlos. author. Murphy, Sean. author. Robshaw, Matthew. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36842-9">http://dx.doi.org/10.1007/978-0-387-36842-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multivariate Public Key Cryptosystems
ent://SD_ILS/0/SD_ILS:166190
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Ding, Jintai. author. Gower, Jason E. author. Schmidt, Dieter S. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Exercise Book
ent://SD_ILS/0/SD_ILS:165571
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Baigèneres, Thomas. author. Lu, Yi. author. Vaudenay, Serge. author. Junod, Pascal. author. Monnerat, Jean. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hop Integrity in the Internet
ent://SD_ILS/0/SD_ILS:165645
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Huang, Chin-Tser. author. Gouda, Mohamed G. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Coding for Data and Computer Communications
ent://SD_ILS/0/SD_ILS:164977
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Salomon, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:164930
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
ent://SD_ILS/0/SD_ILS:164931
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Pejaś, Jerzy. editor. Piegat, Andrzej. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer viruses: from theory to applications
ent://SD_ILS/0/SD_ILS:176342
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Filiol, Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection and Correlation Challenges and Solutions
ent://SD_ILS/0/SD_ILS:164919
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Kruegel, Christopher. author. Valeur, Fredrik. author. Vigna, Giovanni. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Contemporary Cryptology
ent://SD_ILS/0/SD_ILS:197889
2024-08-28T09:19:43Z
2024-08-28T09:19:43Z
Author Catalano, Dario. author. Cramer, Ronald. author. Crescenzo, Giovanni. author. Darmgård, Ivan. author. Pointcheval, David. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>