Search Results for Cryptography - Narrowed by: Online Library
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?
2024-11-05T05:33:47Z
Cryptography for developers
ent://SD_ILS/0/SD_ILS:147686
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author St. Denis, Tom. Johnson, Simon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491044">http://www.sciencedirect.com/science/book/9781597491044</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Quantum Cryptography
ent://SD_ILS/0/SD_ILS:191072
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Kollmitzer, Christian. editor. Pivk, Mario. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04831-9">http://dx.doi.org/10.1007/978-3-642-04831-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography
ent://SD_ILS/0/SD_ILS:189106
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Bernstein, Daniel J. editor. Buchmann, Johannes. editor. Dahmen, Erik. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88702-7">http://dx.doi.org/10.1007/978-3-540-88702-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Group-based Cryptography
ent://SD_ILS/0/SD_ILS:198157
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Myasnikov, Alexei. author. Ushakov, Alexander. author. Shpilrain, Vladimir. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-7643-8827-0">http://dx.doi.org/10.1007/978-3-7643-8827-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fault Analysis in Cryptography
ent://SD_ILS/0/SD_ILS:196746
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Joye, Marc. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29656-7">http://dx.doi.org/10.1007/978-3-642-29656-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of applied cryptography
ent://SD_ILS/0/SD_ILS:287889
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Menezes, A. J. (Alfred J.), 1965- Van Oorschot, Paul C. Vanstone, Scott A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/ISBN/9781439821916">book distributed by CRC Press. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Algebraic curves in cryptography
ent://SD_ILS/0/SD_ILS:290669
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Ling, San, 1964- Wang, Huaxiong. Xing, Chaoping, 1963-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420079470">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum communications and cryptography
ent://SD_ILS/0/SD_ILS:290332
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Sergienko, Alexander V.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420026603">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Beginning cryptography with Java
ent://SD_ILS/0/SD_ILS:144203
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Hook, David, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security and cryptography
ent://SD_ILS/0/SD_ILS:296865
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An introduction to cryptography
ent://SD_ILS/0/SD_ILS:289408
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Mollin, Richard A., 1947-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420011241">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptography Principles and Applications
ent://SD_ILS/0/SD_ILS:518569
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Delfs, Hans. author. Knebl, Helmut. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518569.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-47974-2">https://doi.org/10.1007/978-3-662-47974-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography in Constant Parallel Time
ent://SD_ILS/0/SD_ILS:488823
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Applebaum, Benny. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-17367-7">https://doi.org/10.1007/978-3-642-17367-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of financial cryptography and security
ent://SD_ILS/0/SD_ILS:287829
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Rosenberg, Burton.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420059823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptography Principles and Applications
ent://SD_ILS/0/SD_ILS:185185
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Delfs, Hans. author. Knebl, Helmut. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Classical and Modern Cryptography for Beginners
ent://SD_ILS/0/SD_ILS:520471
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Banoth, Rajkumar. author. Regar, Rekha. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520471.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-32959-3">https://doi.org/10.1007/978-3-031-32959-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercryptography: Applicable Cryptography for Cyberspace Security
ent://SD_ILS/0/SD_ILS:484533
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography, Security and Privacy
ent://SD_ILS/0/SD_ILS:487070
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Jajodia, Sushil. editor. Samarati, Pierangela. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
QC-LDPC Code-Based Cryptography
ent://SD_ILS/0/SD_ILS:488413
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Baldi, Marco. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-02556-8">https://doi.org/10.1007/978-3-319-02556-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Bitcoin Cryptography, Engineering and Economics.
ent://SD_ILS/0/SD_ILS:342159
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Franco, Pedro.<br/>Preferred Shelf Number ONLINE(342159.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781119019138">http://dx.doi.org/10.1002/9781119019138</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1822536">http://swb.eblib.com/patron/FullRecord.aspx?p=1822536</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public key cryptography applications and attacks
ent://SD_ILS/0/SD_ILS:249342
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Batten, Lynn Margaret.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptography with Maple
ent://SD_ILS/0/SD_ILS:333533
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Gómez Pardo, José Luis. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333533.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32166-5">http://dx.doi.org/10.1007/978-3-642-32166-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
New directions of modern cryptography
ent://SD_ILS/0/SD_ILS:344263
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Cao, Zhenfu.<br/>Preferred Shelf Number ONLINE(344263.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Visual cryptography and secret image sharing
ent://SD_ILS/0/SD_ILS:291582
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Cimato, Stelvio. Yang, Ching-Nung.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439837221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational number theory and modern cryptography
ent://SD_ILS/0/SD_ILS:299126
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Yan, Song Y.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602</a>
Wiley Online Library <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118188606">http://onlinelibrary.wiley.com/book/10.1002/9781118188606</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118188606">http://dx.doi.org/10.1002/9781118188606</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1120602">http://swb.eblib.com/patron/FullRecord.aspx?p=1120602</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum Cryptography and Secret-Key Distillation
ent://SD_ILS/0/SD_ILS:235140
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Assche, Gilles van .<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511617744">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Everyday Cryptography Fundamental Principles and Applications
ent://SD_ILS/0/SD_ILS:279211
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Martin, Keith M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:172455
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author van Tilborg, Henk C. A. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Finite Automata and Application to Cryptography
ent://SD_ILS/0/SD_ILS:188068
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Tao, Renji. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78257-5">http://dx.doi.org/10.1007/978-3-540-78257-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Gröbner Bases, Coding, and Cryptography
ent://SD_ILS/0/SD_ILS:189513
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Sala, Massimiliano. editor. Sakata, Shojiro. editor. Mora, Teo. editor. Traverso, Carlo. editor. Perret, Ludovic. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-93806-4">http://dx.doi.org/10.1007/978-3-540-93806-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elementary Number Theory, Cryptography and Codes
ent://SD_ILS/0/SD_ILS:185736
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Baldoni, Maria Welleda. author. Ciliberto, Ciro. author. Cattaneo, Giulia Maria Piacentini. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69200-3">http://dx.doi.org/10.1007/978-3-540-69200-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Disappearing cryptography information hiding : steganography & watermarking
ent://SD_ILS/0/SD_ILS:146450
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Wayner, Peter, 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An Introduction to Mathematical Cryptography
ent://SD_ILS/0/SD_ILS:167545
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Silverman, J.H. author. Pipher, Jill. author. Hoffstein, Jeffrey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elliptic curves number theory and cryptography
ent://SD_ILS/0/SD_ILS:288710
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Washington, Lawrence C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420071474">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Number Story From Counting to Cryptography
ent://SD_ILS/0/SD_ILS:175665
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Higgins, Peter M. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84800-001-8">http://dx.doi.org/10.1007/978-1-84800-001-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Elliptic Curve Cryptography
ent://SD_ILS/0/SD_ILS:236058
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Blake, Ian F.. Seroussi, Gadiel. Smart, Nigel P..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography in C and C++
ent://SD_ILS/0/SD_ILS:170731
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Welschenbach, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-0026-0">http://dx.doi.org/10.1007/978-1-4302-0026-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:164930
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
RSA and public-key cryptography
ent://SD_ILS/0/SD_ILS:285855
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Mollin, Richard A., 1947-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420035247">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Disappearing cryptography information hiding : steganography & watermarking
ent://SD_ILS/0/SD_ILS:253900
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Wayner, Peter, 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Analog Side Channels Using Cryptography Algorithms
ent://SD_ILS/0/SD_ILS:520646
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Zajić, Alenka. author. Prvulovic, Milos. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520646.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-38579-7">https://doi.org/10.1007/978-3-031-38579-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical cryptography : algorithms and implementations using C++
ent://SD_ILS/0/SD_ILS:356620
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Azad, Saiful, editor. Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number ONLINE(356620.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482228908">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Chaos-Based Cryptography Theory,Algorithms and Applications
ent://SD_ILS/0/SD_ILS:194408
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Kocarev, Ljupco. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20542-2">http://dx.doi.org/10.1007/978-3-642-20542-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing SSL/TLS using cryptography and PKI
ent://SD_ILS/0/SD_ILS:303838
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a>
<a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a>
Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless security and cryptography specifications and implementations
ent://SD_ILS/0/SD_ILS:287504
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Sklavos, Nicolas. Zhang, Xinmiao.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780849387692">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Geometry, Coding Theory and Cryptography
ent://SD_ILS/0/SD_ILS:169437
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Garcia, Arnaldo. editor. Stichtenoth, Henning. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of elliptic and hyperelliptic curve cryptography
ent://SD_ILS/0/SD_ILS:289476
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Cohen, Henri. Frey, Gerhard, 1944- Avanzi, Roberto.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420034981">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Exercise Book
ent://SD_ILS/0/SD_ILS:165571
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Baigèneres, Thomas. author. Lu, Yi. author. Vaudenay, Serge. author. Junod, Pascal. author. Monnerat, Jean. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Cryptography Volume 2. Basic Applications.
ent://SD_ILS/0/SD_ILS:236754
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Goldreich, Oded.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511721656">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Java cryptography extensions practical guide for programmers
ent://SD_ILS/0/SD_ILS:253797
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Weiss, Jason (Jason R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780127427515">http://www.sciencedirect.com/science/book/9780127427515</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Cryptography Volume 1. Basic Tools.
ent://SD_ILS/0/SD_ILS:237721
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Goldreich, Oded.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511546891">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography - PKC 2023 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:520852
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Boldyreva, Alexandra. editor. Kolesnikov, Vladimir. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520852.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-31368-4">https://doi.org/10.1007/978-3-031-31368-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography - PKC 2023 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:520853
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Boldyreva, Alexandra. editor. Kolesnikov, Vladimir. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520853.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-31371-4">https://doi.org/10.1007/978-3-031-31371-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security Workshops ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521216
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Zhou, Jianying. editor. (orcid) Batina, Lejla. editor. Li, Zengpeng. editor. Lin, Jingqiang. editor. Losiouk, Eleonora. editor.<br/>Preferred Shelf Number XX(521216.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-41181-6">https://doi.org/10.1007/978-3-031-41181-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:520950
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Tibouchi, Mehdi. editor. Wang, XiaoFeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520950.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-33488-7">https://doi.org/10.1007/978-3-031-33488-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521065
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Johansson, Thomas. editor. Smith-Tone, Daniel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521065.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-40003-2">https://doi.org/10.1007/978-3-031-40003-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:521084
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Tibouchi, Mehdi. editor. Wang, XiaoFeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521084.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-33491-7">https://doi.org/10.1007/978-3-031-33491-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Homomorphic Encryption for Financial Cryptography Recent Inventions and Challenges
ent://SD_ILS/0/SD_ILS:520438
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Seethalakshmi, V. editor. Dhanaraj, Rajesh Kumar. editor. Suganyadevi, S. editor. Ouaissa, Mariya. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520438.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-35535-6">https://doi.org/10.1007/978-3-031-35535-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Code-Based Cryptography 10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29-30, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520916
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Deneuville, Jean-Christophe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520916.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-29689-5">https://doi.org/10.1007/978-3-031-29689-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Code-Based Cryptography 11th International Workshop, CBCrypto 2023, Lyon, France, April 22-23, 2023, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:521266
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Esser, Andre. editor. Santini, Paolo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521266.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-46495-9">https://doi.org/10.1007/978-3-031-46495-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:521347
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Rothblum, Guy. editor. Wee, Hoeteck. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521347.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-48615-9">https://doi.org/10.1007/978-3-031-48615-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:521348
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Rothblum, Guy. editor. Wee, Hoeteck. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521348.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-48618-0">https://doi.org/10.1007/978-3-031-48618-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29-December 2, 2023, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:521349
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Rothblum, Guy. editor. Wee, Hoeteck. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521349.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-48621-0">https://doi.org/10.1007/978-3-031-48621-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29-December 2, 2023, Proceedings, Part IV
ent://SD_ILS/0/SD_ILS:521350
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Rothblum, Guy. editor. Wee, Hoeteck. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521350.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-48624-1">https://doi.org/10.1007/978-3-031-48624-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security. FC 2022 International Workshops CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:521301
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Matsuo, Shin'ichiro. editor. Gudgeon, Lewis. editor. Klages-Mundt, Ariah. editor. Perez Hernandez, Daniel. editor. Werner, Sam. editor.<br/>Preferred Shelf Number XX(521301.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-32415-4">https://doi.org/10.1007/978-3-031-32415-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484186
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Dolev, Shlomi. editor. Hendler, Danny. editor. Lodha, Sachin. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484585
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Zohar, Aviv. editor. Eyal, Ittay. editor. Teague, Vanessa. editor. (orcid)0000-0003-2648-2565 Clark, Jeremy. editor. Bracciali, Andrea. editor. (orcid)0000-0003-1451-9260<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-58820-8">https://doi.org/10.1007/978-3-662-58820-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485010
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Bhasin, Shivam. editor. (orcid)0000-0002-6903-5127 Mendelson, Avi. editor. Nandi, Mridul. editor. (orcid)0000-0002-1029-6576 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-35869-3">https://doi.org/10.1007/978-3-030-35869-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:486060
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Hofheinz, Dennis. editor. Rosen, Alon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Code-Based Cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486426
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Baldi, Marco. editor. (orcid)0000-0002-8754-5526 Persichetti, Edoardo. editor. (orcid)0000-0002-1895-377X Santini, Paolo. editor. (orcid)0000-0003-0631-3668 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-25922-8">https://doi.org/10.1007/978-3-030-25922-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:483128
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Hofheinz, Dennis. editor. Rosen, Alon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483295
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Ding, Jintai. editor. Steinwandt, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483366
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Cid, Carlos. editor. (orcid)0000-0001-5761-8694 Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483608
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Albrecht, Martin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484047
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:483055
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Lin, Dongdai. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483504
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Deng, Robert H. editor. (orcid)0000-0003-3491-8146 Gauthier-Umaña, Valérie. editor. (orcid)0000-0003-0909-7091 Ochoa, Martín. editor. (orcid)0000-0002-7816-5775 Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486319
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Goldberg, Ian. editor. Moore, Tyler. editor. (orcid)0000-0002-8771-8191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:486955
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Lin, Dongdai. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography – SAC 2017 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:402041
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Adams, Carlisle. editor. Camenisch, Jan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72565-9">https://doi.org/10.1007/978-3-319-72565-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security
ent://SD_ILS/0/SD_ILS:399520
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Baldi, Marco. editor. (orcid)0000-0002-8754-5526 Quaglia, Elizabeth A. editor. Tomasin, Stefano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399906
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983 Rebeiro, Chester. editor. (orcid)0000-0001-8063-0026 Yarom, Yuval. editor. (orcid)0000-0003-0401-4197 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399957
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Meiklejohn, Sarah. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-58387-6">https://doi.org/10.1007/978-3-662-58387-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:400334
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Beimel, Amos. editor. Dziembowski, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fault Tolerant Architectures for Cryptography and Hardware Security
ent://SD_ILS/0/SD_ILS:400923
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author PATRANABIS, SIKHAR. editor. Mukhopadhyay, Debdeep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-1387-4">https://doi.org/10.1007/978-981-10-1387-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401487
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Preneel, Bart. editor. (orcid)0000-0003-2005-9651 Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography – PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:401426
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Abdalla, Michel. editor. (orcid)0000-0002-2447-4329 Dahab, Ricardo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-76578-5">https://doi.org/10.1007/978-3-319-76578-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project
ent://SD_ILS/0/SD_ILS:401558
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Takagi, Tsuyoshi. editor. Wakayama, Masato. editor. Tanaka, Keisuke. editor. Kunihiro, Noboru. editor. Kimoto, Kazufumi. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography – PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:401823
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Abdalla, Michel. editor. (orcid)0000-0002-2447-4329 Dahab, Ricardo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-76581-5">https://doi.org/10.1007/978-3-319-76581-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399450
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Dinur, Itai. editor. Dolev, Shlomi. editor. Lodha, Sachin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399578
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Lange, Tanja. editor. Steinwandt, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-79063-3">https://doi.org/10.1007/978-3-319-79063-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399614
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Catalano, Dario. editor. De Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms
ent://SD_ILS/0/SD_ILS:400424
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Dooley, John F. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-90443-6">https://doi.org/10.1007/978-3-319-90443-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:400566
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Beimel, Amos. editor. Dziembowski, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:518872
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Ors, Berna. editor. Preneel, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518872.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-21356-9">https://doi.org/10.1007/978-3-319-21356-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings
ent://SD_ILS/0/SD_ILS:518897
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Groth, Jens. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518897.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-27239-9">https://doi.org/10.1007/978-3-319-27239-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:518908
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Böhme, Rainer. editor. Okamoto, Tatsuaki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518908.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-47854-7">https://doi.org/10.1007/978-3-662-47854-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:519095
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Malkin, Tal. editor. Kolesnikov, Vladimir. editor. Lewko, Allison. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519095.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-28166-7">https://doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:519134
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Katz, Jonathan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519134.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-46447-2">https://doi.org/10.1007/978-3-662-46447-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:519305
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Eisenbarth, Thomas. editor. Öztürk, Erdinç. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519305.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-16363-5">https://doi.org/10.1007/978-3-319-16363-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:519308
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Chakraborty, Rajat Subhra. editor. Schwabe, Peter. editor. Solworth, Jon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519308.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-24126-5">https://doi.org/10.1007/978-3-319-24126-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:519217
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Brenner, Michael. editor. Christin, Nicolas. editor. Johnson, Benjamin. editor. Rohloff, Kurt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519217.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-48051-9">https://doi.org/10.1007/978-3-662-48051-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Visual Cryptography for Image Processing and Security Theory, Methods, and Applications
ent://SD_ILS/0/SD_ILS:518462
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Liu, Feng. author. Yan, Wei Qi. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518462.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-23473-1">https://doi.org/10.1007/978-3-319-23473-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:518982
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Dodis, Yevgeniy. editor. Nielsen, Jesper Buus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518982.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-46494-6">https://doi.org/10.1007/978-3-662-46494-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:519027
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Dodis, Yevgeniy. editor. Nielsen, Jesper Buus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519027.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-46497-7">https://doi.org/10.1007/978-3-662-46497-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:484564
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Abdalla, Michel. editor. (orcid)0000-0002-2447-4329 De Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486893
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Cao, Zhenfu. editor. Zhang, Fangguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:486912
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Chakraborty, Rajat Subhra. editor. Matyas, Vashek. editor. Schaumont, Patrick. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488916
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Boureanu, Ioana. editor. Owesarski, Philippe. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488971
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Böhme, Rainer. editor. Brenner, Michael. editor. Moore, Tyler. editor. Smith, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488975
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Lindell, Yehuda. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489261
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Lange, Tanja. editor. Lauter, Kristin. editor. Lisoněk, Petr. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43414-7">https://doi.org/10.1007/978-3-662-43414-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487453
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Mosca, Michele. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11659-4">https://doi.org/10.1007/978-3-319-11659-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Visual Cryptography for Image Processing and Security Theory, Methods, and Applications
ent://SD_ILS/0/SD_ILS:487455
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Liu, Feng. author. Yan, Wei Qi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09644-5">https://doi.org/10.1007/978-3-319-09644-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488136
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Kotulski, Zbigniew. editor. Ksiezopolski, Bogdan. editor. Mazur, Katarzyna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise
ent://SD_ILS/0/SD_ILS:488308
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Pape, Sebastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-658-07116-5">https://doi.org/10.1007/978-3-658-07116-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography
ent://SD_ILS/0/SD_ILS:489032
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Shi, Yun Q. editor. Liu, Feng. editor. Yan, Weiqi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485776
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Joux, Antoine. editor. Youssef, Amr. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488984
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Christin, Nicolas. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488961
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Krawczyk, Hugo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Quantum Computation, Communication, and Cryptography 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489063
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Bacon, Dave. editor. Martin-Delgado, Miguel. editor. Roetteler, Martin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54429-3">https://doi.org/10.1007/978-3-642-54429-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for wireless sensor networks using identity-based cryptography
ent://SD_ILS/0/SD_ILS:286252
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Patil, Harsh Kupwade. Szygenda, Stephen A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439869024">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Quantum Computation, Communication, and Cryptography 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334022
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Iwama, Kazuo. editor. Kawano, Yasuhito. editor. Murao, Mio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334022.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35656-8">http://dx.doi.org/10.1007/978-3-642-35656-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography – Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334179
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Abdalla, Michel. editor. Lange, Tanja. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334179.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334184
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Kurosawa, Kaoru. editor. Hanaoka, Goichiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334184.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334242
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Sahai, Amit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334242.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335197
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Stam, Martijn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335197.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334097
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Knudsen, Lars R. editor. Wu, Huapeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334097.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334707
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Jacobson, Michael. editor. Locasto, Michael. editor. Mohassel, Payman. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334707.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335088
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Adams, Andrew A. editor. Brenner, Michael. editor. Smith, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335088.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334635
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Gaborit, Philippe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334635.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334863
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334863.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334938
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Avoine, Gildas. editor. Kara, Orhun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334938.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335076
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Gierlichs, Benedikt. editor. Guilley, Sylvain. editor. Mukhopadhyay, Debdeep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335076.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Modern Cryptography Primer Theoretical Foundations and Practical Applications
ent://SD_ILS/0/SD_ILS:335099
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Kościelny, Czesław. author. Kurkowski, Mirosław. author. Srebrny, Marian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335099.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
ent://SD_ILS/0/SD_ILS:335154
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Fischlin, Marc. editor. Katzenbeisser, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335154.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196459
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Miri, Ali. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28496-0">http://dx.doi.org/10.1007/978-3-642-28496-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196791
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Danezis, George. editor. Dietrich, Sven. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29889-9">http://dx.doi.org/10.1007/978-3-642-29889-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptography – PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196822
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Fischlin, Marc. editor. Buchmann, Johannes. editor. Manulis, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30057-8">http://dx.doi.org/10.1007/978-3-642-30057-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197053
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Bao, Feng. editor. Samarati, Pierangela. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197536
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Blyth, Jim. editor. Dietrich, Sven. editor. Camp, L. Jean. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34638-5">http://dx.doi.org/10.1007/978-3-642-34638-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196237
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Danezis, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27576-0">http://dx.doi.org/10.1007/978-3-642-27576-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday
ent://SD_ILS/0/SD_ILS:196428
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Naccache, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196562
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Cramer, Ronald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-28914-9">http://dx.doi.org/10.1007/978-3-642-28914-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197299
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Visconti, Ivan. editor. Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32928-9">http://dx.doi.org/10.1007/978-3-642-32928-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197303
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Keromytis, Angelos D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32946-3">http://dx.doi.org/10.1007/978-3-642-32946-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197516
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Bogdanov, Andrey. editor. Sanadhya, Somitra. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34416-9">http://dx.doi.org/10.1007/978-3-642-34416-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195937
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Yang, Bo-Yin. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25405-5">http://dx.doi.org/10.1007/978-3-642-25405-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195967
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Chen, Liqun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptography – PKC 2011 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194024
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Catalano, Dario. editor. Fazio, Nelly. editor. Gennaro, Rosario. editor. Nicolosi, Antonio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19379-8">http://dx.doi.org/10.1007/978-3-642-19379-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194086
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Ishai, Yuval. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19571-6">http://dx.doi.org/10.1007/978-3-642-19571-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194087
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Biryukov, Alex. editor. Gong, Guang. editor. Stinson, Douglas R. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19574-7">http://dx.doi.org/10.1007/978-3-642-19574-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194738
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Lopez, Javier. editor. Tsudik, Gene. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman
ent://SD_ILS/0/SD_ILS:195100
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Goldreich, Oded. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22670-0">http://dx.doi.org/10.1007/978-3-642-22670-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Quantum Computation, Communication, and Cryptography 5th Conference, TQC 2010, Leeds, UK, April 13-15, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193796
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Dam, Wim. editor. Kendon, Vivien M. editor. Severini, Simone. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-18073-6">http://dx.doi.org/10.1007/978-3-642-18073-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Nonlinear laser dynamics from quantum dots to cryptography
ent://SD_ILS/0/SD_ILS:306141
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Lüdge, Kathy. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9783527639823">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Chaos synchronization and cryptography for secure communications applications for encryption
ent://SD_ILS/0/SD_ILS:277940
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Banerjee, Santo, 1976- IGI Global.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191801
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Micciancio, Daniele. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11799-2">http://dx.doi.org/10.1007/978-3-642-11799-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum Information, Computation and Cryptography An Introductory Survey of Theory, Technology and Experiments
ent://SD_ILS/0/SD_ILS:191835
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Benatti, Fabio. editor. Fannes, Mark. editor. Floreanini, Roberto. editor. Petritis, Dimitri. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11914-9">http://dx.doi.org/10.1007/978-3-642-11914-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192157
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Sendrier, Nicolas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12929-2">http://dx.doi.org/10.1007/978-3-642-12929-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptography – PKC 2010 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192187
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Nguyen, Phong Q. editor. Pointcheval, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13013-7">http://dx.doi.org/10.1007/978-3-642-13013-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192838
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Sion, Radu. editor. Curtmola, Reza. editor. Dietrich, Sven. editor. Kiayias, Aggelos. editor. Miret, Josep M. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14992-4">http://dx.doi.org/10.1007/978-3-642-14992-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192932
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Garay, Juan A. editor. Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15317-4">http://dx.doi.org/10.1007/978-3-642-15317-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Cryptography A Textbook for Students and Practitioners
ent://SD_ILS/0/SD_ILS:190836
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Paar, Christof. author. Pelzl, Jan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04101-3">http://dx.doi.org/10.1007/978-3-642-04101-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192420
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Zhou, Jianying. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192701
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Sion, Radu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14577-3">http://dx.doi.org/10.1007/978-3-642-14577-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193606
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Joye, Marc. editor. Miyaji, Atsuko. editor. Otsuka, Akira. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17455-1">http://dx.doi.org/10.1007/978-3-642-17455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography – Pairing 2009 Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190581
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Shacham, Hovav. editor. Waters, Brent. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03298-1">http://dx.doi.org/10.1007/978-3-642-03298-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Quantum Computation, Communication, and Cryptography 4th Workshop,TQC 2009, Waterloo, Canada, May 11-13, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191450
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Childs, Andrew. editor. Mosca, Michele. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10698-9">http://dx.doi.org/10.1007/978-3-642-10698-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189693
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Reingold, Omer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00457-5">http://dx.doi.org/10.1007/978-3-642-00457-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptography – PKC 2009 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189697
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Jarecki, Stanisław. editor. Tsudik, Gene. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00468-1">http://dx.doi.org/10.1007/978-3-642-00468-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190173
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Abdalla, Michel. editor. Pointcheval, David. editor. Fouque, Pierre-Alain. editor. Vergnaud, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190657
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Dingledine, Roger. editor. Golle, Philippe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03549-4">http://dx.doi.org/10.1007/978-3-642-03549-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191273
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Jacobson, Michael J. editor. Rijmen, Vincent. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05445-7">http://dx.doi.org/10.1007/978-3-642-05445-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191500
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Parker, Matthew G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Number Theory in Science and Communication With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity
ent://SD_ILS/0/SD_ILS:188668
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Schroeder, Manfred. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85298-8">http://dx.doi.org/10.1007/978-3-540-85298-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190855
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Avanzi, Roberto Maria. editor. Keliher, Liam. editor. Sica, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04159-4">http://dx.doi.org/10.1007/978-3-642-04159-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primality Testing and Integer Factorization in Public-Key Cryptography
ent://SD_ILS/0/SD_ILS:167452
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography
ent://SD_ILS/0/SD_ILS:297432
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Dube, Roger. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:188645
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Tsudik, Gene. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography – Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188716
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Galbraith, Steven D. editor. Paterson, Kenneth G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188792
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Ostrovsky, Rafail. editor. Prisco, Roberto. editor. Visconti, Ivan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Networked RFID Systems and Lightweight Cryptography Raising Barriers to Product Counterfeiting
ent://SD_ILS/0/SD_ILS:186333
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Cole, Peter H. editor. Ranasinghe, Damith C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-71641-9">http://dx.doi.org/10.1007/978-3-540-71641-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptography – PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188130
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Cramer, Ronald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189241
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Kawano, Yasuhito. editor. Mosca, Michele. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185647
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Bellovin, Steven M. editor. Gennaro, Rosario. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188159
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Canetti, Ran. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:189044
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Buchmann, Johannes. editor. Ding, Jintai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Codes: An Introduction to Information Communication and Cryptography
ent://SD_ILS/0/SD_ILS:175791
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Biggs, N.L. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptography – PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186340
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Okamoto, Tatsuaki. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186640
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Katz, Jonathan. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186107
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Vadhan, Salil P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
ent://SD_ILS/0/SD_ILS:187165
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Biham, Eli. editor. Youssef, Amr M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187827
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Galbraith, Steven D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:187851
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Adams, Carlisle. editor. Miri, Ali. editor. Wiener, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:187854
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Dietrich, Sven. editor. Dhamija, Rachna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography – Pairing 2007 First International Conference, Tokyo, Japan, July 2-4, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186868
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Takagi, Tsuyoshi. editor. Okamoto, Tatsuaki. editor. Okamoto, Eiji. editor. Okamoto, Takeshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Number Theory in Science and Communication With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity
ent://SD_ILS/0/SD_ILS:180834
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Schroeder, Manfred R. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137861">http://dx.doi.org/10.1007/b137861</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:184658
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Prisco, Roberto. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:183856
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Yung, Moti. editor. Dodis, Yevgeniy. editor. Kiayias, Aggelos. editor. Malkin, Tal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:184906
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Breveglieri, Luca. editor. Koren, Israel. editor. Naccache, David. editor. Seifert, Jean-Pierre. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers
ent://SD_ILS/0/SD_ILS:184908
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Crescenzo, Giovanni. editor. Rubin, Avi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Applications for Communications Security
ent://SD_ILS/0/SD_ILS:165205
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Vaudenay, Serge. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:183489
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Halevi, Shai. editor. Rabin, Tal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:183624
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Preneel, Bart. editor. Tavares, Stafford. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11693383">http://dx.doi.org/10.1007/11693383</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:184150
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Zhou, Jianying. editor. Yung, Moti. editor. Bao, Feng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:184267
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Ytrehus, Øyvind. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography, information theory, and error-correction a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:301860
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:182373
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Kilian, Joe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:182377
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:182721
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Ioannidis, John. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 – March 3, 2005. Revised Papers
ent://SD_ILS/0/SD_ILS:182827
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Patrick, Andrew S. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:182361
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Handschuh, Helena. editor. Hasan, M. Anwar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105103">http://dx.doi.org/10.1007/b105103</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:183360
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Smart, Nigel P. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Signal Design for Good Correlation For Wireless Communication, Cryptography, and Radar
ent://SD_ILS/0/SD_ILS:236641
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Golomb, Solomon W.. Gong, Guang.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511546907">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of coding theory and applications of error-correcting codes, with an introduction to cryptography and information theory
ent://SD_ILS/0/SD_ILS:300313
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Adámek, Jiří, ing. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033265">An electronic book accessible through the World Wide Web; click for information</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/22660845.html">http://catalog.hathitrust.org/api/volumes/oclc/22660845.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Modelling and Verification of Secure Exams
ent://SD_ILS/0/SD_ILS:401571
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Giustolisi, Rosario. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-67107-9">https://doi.org/10.1007/978-3-319-67107-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Hash Function BLAKE
ent://SD_ILS/0/SD_ILS:488367
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Aumasson, Jean-Philippe. author. Meier, Willi. author. Phan, Raphael C.-W. author. Henzen, Luca. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Operational Semantics and Verification of Security Protocols
ent://SD_ILS/0/SD_ILS:188195
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Cremers, Cas. author. Mauw, Sjouke. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78636-8">http://dx.doi.org/10.1007/978-3-540-78636-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Block Cipher Companion
ent://SD_ILS/0/SD_ILS:193573
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Knudsen, Lars R. author. Robshaw, Matthew J.B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17342-4">http://dx.doi.org/10.1007/978-3-642-17342-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The LLL Algorithm Survey and Applications
ent://SD_ILS/0/SD_ILS:190278
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Nguyen, Phong Q. editor. Vallée, Brigitte. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02295-1">http://dx.doi.org/10.1007/978-3-642-02295-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Signcryption
ent://SD_ILS/0/SD_ILS:189264
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Dent, Alexander W. editor. Zheng, Yuliang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89411-7">http://dx.doi.org/10.1007/978-3-540-89411-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Efficient Secure Two-Party Protocols Techniques and Constructions
ent://SD_ILS/0/SD_ILS:192608
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Hazay, Carmit. author. Lindell, Yehuda. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14303-8">http://dx.doi.org/10.1007/978-3-642-14303-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Statistical Steganalysis
ent://SD_ILS/0/SD_ILS:192611
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Böhme, Rainer. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14313-7">http://dx.doi.org/10.1007/978-3-642-14313-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Locally Decodable Codes and Private Information Retrieval Schemes
ent://SD_ILS/0/SD_ILS:192626
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Yekhanin, Sergey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14358-8">http://dx.doi.org/10.1007/978-3-642-14358-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Towards Hardware-Intrinsic Security Foundations and Practice
ent://SD_ILS/0/SD_ILS:192659
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Sadeghi, Ahmad-Reza. editor. Naccache, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14452-3">http://dx.doi.org/10.1007/978-3-642-14452-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An Introduction to Secret Sharing A Systematic Overview and Guide for Protocol Selection
ent://SD_ILS/0/SD_ILS:520451
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Krenn, Stephan. author. Lorünser, Thomas. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520451.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-28161-7">https://doi.org/10.1007/978-3-031-28161-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptanalysis of RSA and its variants
ent://SD_ILS/0/SD_ILS:291418
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Hinek, M. Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420075199">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Algorithmic cryptanalysis
ent://SD_ILS/0/SD_ILS:286903
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Joux, Antoine.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420070033">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal Correctness of Security Protocols With 62 Figures and 4 Tables
ent://SD_ILS/0/SD_ILS:185368
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Bella, Giampaolo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Concurrent Zero-Knowledge With Additional Background by Oded Goldreich
ent://SD_ILS/0/SD_ILS:183559
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Rosen, Alon. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-32939-0">http://dx.doi.org/10.1007/3-540-32939-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook on soft computing for video surveillance
ent://SD_ILS/0/SD_ILS:290796
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Pal, Sankar K. Petrosino, Alfredo. Maddalena, Lucia.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439856857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Networking Architecture and Technologies First International Conference, ICENAT 2022, Shenzhen, China, November 15-17, 2022, Proceedings
ent://SD_ILS/0/SD_ILS:520200
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Quan, Wei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520200.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-9697-9">https://doi.org/10.1007/978-981-19-9697-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ubiquitous Security Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520210
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Wang, Guojun. editor. Choo, Kim-Kwang Raymond. editor. Wu, Jie. editor. Damiani, Ernesto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520210.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-0272-9">https://doi.org/10.1007/978-981-99-0272-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Internet of Things, Smart Spaces, and Next Generation Networks and Systems 22nd International Conference, NEW2AN 2022, Tashkent, Uzbekistan, December 15-16, 2022, Proceedings
ent://SD_ILS/0/SD_ILS:520839
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Koucheryavy, Yevgeni. editor. (orcid) Aziz, Ahmed. editor. (orcid) SpringerLink (Online service)<br/>Preferred Shelf Number XX(520839.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-30258-9">https://doi.org/10.1007/978-3-031-30258-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Innovative Security Solutions for Information Technology and Communications 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers.
ent://SD_ILS/0/SD_ILS:520859
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Doinea, Mihai. editor. Janicke, Helge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520859.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-32636-3">https://doi.org/10.1007/978-3-031-32636-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Codes, Cryptology and Information Security 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:520866
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author El Hajji, Said. editor. Mesnager, Sihem. editor. Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520866.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-33017-9">https://doi.org/10.1007/978-3-031-33017-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Card Research and Advanced Applications 21st International Conference, CARDIS 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520887
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Buhan, Ileana. editor. Schneider, Tobias. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520887.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-25319-5">https://doi.org/10.1007/978-3-031-25319-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2022 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520920
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Seo, Seung-Hyun. editor. Seo, Hwajeong. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520920.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-29371-9">https://doi.org/10.1007/978-3-031-29371-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521115
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Shikata, Junji. editor. Kuzuno, Hiroki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521115.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-41326-1">https://doi.org/10.1007/978-3-031-41326-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - LATINCRYPT 2023 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3-6, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521179
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Aly, Abdelrahaman. editor. Tibouchi, Mehdi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521179.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-44469-2">https://doi.org/10.1007/978-3-031-44469-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Internet Security 6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520516
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author You, Ilsun. editor. Kim, Hwankuk. editor. Angin, Pelin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520516.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-4430-9">https://doi.org/10.1007/978-981-99-4430-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Business and Telecommunications 18th International Conference, ICETE 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520517
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Samarati, Pierangela. editor. van Sinderen, Marten. editor. Vimercati, Sabrina De Capitani di. editor. Wijnhoven, Fons. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520517.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-36840-0">https://doi.org/10.1007/978-3-031-36840-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:520995
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Simpson, Leonie. editor. Rezazadeh Baee, Mir Ali. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520995.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-35486-1">https://doi.org/10.1007/978-3-031-35486-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multi-disciplinary Trends in Artificial Intelligence 16th International Conference, MIWAI 2023, Hyderabad, India, July 21-22, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521001
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Morusupalli, Raghava. editor. Dandibhotla, Teja Santosh. editor. Atluri, Vani Vathsala. editor. Windridge, David. editor. Lingras, Pawan. editor.<br/>Preferred Shelf Number XX(521001.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-36402-0">https://doi.org/10.1007/978-3-031-36402-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations and Practice of Security 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520922
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Jourdan, Guy-Vincent. editor. Mounier, Laurent. editor. Adams, Carlisle. editor. Sèdes, Florence. editor. Garcia-Alfaro, Joaquin. editor.<br/>Preferred Shelf Number XX(520922.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-30122-3">https://doi.org/10.1007/978-3-031-30122-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Science and Its Applications - ICCSA 2023 Workshops Athens, Greece, July 3-6, 2023, Proceedings, Part VI
ent://SD_ILS/0/SD_ILS:521012
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Gervasi, Osvaldo. editor. (orcid) Murgante, Beniamino. editor. (orcid) Rocha, Ana Maria A. C. editor. (orcid) Garau, Chiara. editor. (orcid) Scorza, Francesco. editor.<br/>Preferred Shelf Number XX(521012.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-37120-2">https://doi.org/10.1007/978-3-031-37120-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and System Security 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521067
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Li, Shujun. editor. Manulis, Mark. editor. Miyaji, Atsuko. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521067.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-39828-5">https://doi.org/10.1007/978-3-031-39828-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - AFRICACRYPT 2023 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521092
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author El Mrabet, Nadia. editor. De Feo, Luca. editor. Duquesne, Sylvain. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521092.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-37679-5">https://doi.org/10.1007/978-3-031-37679-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Data Mining and Applications 19th International Conference, ADMA 2023, Shenyang, China, August 21-23, 2023, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:521313
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Yang, Xiaochun. editor. Suhartanto, Heru. editor. Wang, Guoren. editor. Wang, Bin. editor. Jiang, Jing. editor.<br/>Preferred Shelf Number XX(521313.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-46664-9">https://doi.org/10.1007/978-3-031-46664-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computing Science, Communication and Security 4th International Conference, COMS2 2023, Mehsana, Gujarat, India, February 6-7, 2023, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520447
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Chaubey, Nirbhay. editor. Thampi, Sabu M. editor. Jhanjhi, Noor Zaman. editor. Parikh, Satyen. editor. Amin, Kiran. editor.<br/>Preferred Shelf Number XX(520447.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-40564-8">https://doi.org/10.1007/978-3-031-40564-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings
ent://SD_ILS/0/SD_ILS:520658
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Li, Fengjun. editor. Liang, Kaitai. editor. Lin, Zhiqiang. editor. Katsikas, Sokratis K. editor. (orcid) SpringerLink (Online service)<br/>Preferred Shelf Number XX(520658.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-25538-0">https://doi.org/10.1007/978-3-031-25538-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Communication and Intelligent Systems First International Conference, ICACIS 2022, Virtual Event, October 20-21, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520756
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Shaw, Rabindra Nath. editor. Paprzycki, Marcin. editor. Ghosh, Ankush. editor. (orcid) SpringerLink (Online service)<br/>Preferred Shelf Number XX(520756.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-25088-0">https://doi.org/10.1007/978-3-031-25088-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Arithmetic of Finite Fields 9th International Workshop, WAIFI 2022, Chengdu, China, August 29 - September 2, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520791
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Mesnager, Sihem. editor. Zhou, Zhengchun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520791.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-22944-2">https://doi.org/10.1007/978-3-031-22944-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Constructive Side-Channel Analysis and Secure Design 14th International Workshop, COSADE 2023, Munich, Germany, April 3-4, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:520909
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Kavun, Elif Bilge. editor. Pehl, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520909.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-29497-6">https://doi.org/10.1007/978-3-031-29497-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521250
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Wang, Ding. editor. Yung, Moti. editor. (orcid) Liu, Zheli. editor. Chen, Xiaofeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521250.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-7356-9">https://doi.org/10.1007/978-981-99-7356-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Science of Cyber Security 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521332
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Yung, Moti. editor. (orcid) Chen, Chao. editor. Meng, Weizhi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521332.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-45933-7">https://doi.org/10.1007/978-3-031-45933-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521356
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Athanasopoulos, Elias. editor. Mennink, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521356.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-49187-0">https://doi.org/10.1007/978-3-031-49187-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIII
ent://SD_ILS/0/SD_ILS:521373
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(521373.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-8742-9">https://doi.org/10.1007/978-981-99-8742-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic security solutions for the internet of things
ent://SD_ILS/0/SD_ILS:481771
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Banday, Mohammad Tariq, 1969- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
ent://SD_ILS/0/SD_ILS:458788
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Shavers, Brett, author. Bair, John, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128033401">https://www.sciencedirect.com/science/book/9780128033401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware security : design, threats, and safeguards
ent://SD_ILS/0/SD_ILS:356403
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Preferred Shelf Number ONLINE(356403.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439895849">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Computing and Communications Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings
ent://SD_ILS/0/SD_ILS:518347
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Abawajy, Jemal H. editor. Mukherjea, Sougata. editor. Thampi, Sabu M. editor. Ruiz-Martínez, Antonio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518347.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-22915-7">https://doi.org/10.1007/978-3-319-22915-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:518856
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Hui, Lucas C. K. editor. Qing, S. H. editor. Shi, Elaine. editor. Yiu, S. M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518856.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-21966-0">https://doi.org/10.1007/978-3-319-21966-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SOFSEM 2015: Theory and Practice of Computer Science 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sněžkou, Czech Republic, January 24-29, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:518910
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Italiano, Giuseppe. editor. Margaria-Steffen, Tiziana. editor. Pokorný, Jaroslav. editor. Quisquater, Jean-Jacques. editor. Wattenhofer, Roger. editor.<br/>Preferred Shelf Number XX(518910.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-46078-8">https://doi.org/10.1007/978-3-662-46078-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:519107
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Rhee, Kyung-Hyune. editor. Yi, Jeong Hyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519107.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-15087-1">https://doi.org/10.1007/978-3-319-15087-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computing and Combinatorics 21st International Conference, COCOON 2015, Beijing, China, August 4-6, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:519301
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Xu, Dachuan. editor. Du, Donglei. editor. Du, Dingzhu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519301.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-21398-9">https://doi.org/10.1007/978-3-319-21398-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology -- INDOCRYPT 2015 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:519302
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Biryukov, Alex. editor. Goyal, Vipul. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519302.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-26617-6">https://doi.org/10.1007/978-3-319-26617-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:518386
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Bishop, Matt. editor. Miloslavskaya, Natalia. editor. Theocharidou, Marianthi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518386.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-18500-2">https://doi.org/10.1007/978-3-319-18500-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Biometrics
ent://SD_ILS/0/SD_ILS:518417
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Li, Stan Z. editor. Jain, Anil K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518417.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4899-7488-4">https://doi.org/10.1007/978-1-4899-7488-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CryptoSchool
ent://SD_ILS/0/SD_ILS:518657
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author von zur Gathen, Joachim. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518657.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-48425-8">https://doi.org/10.1007/978-3-662-48425-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Business and Telecommunications 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:518736
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Obaidat, Mohammad S. editor. Holzinger, Andreas. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518736.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-25915-4">https://doi.org/10.1007/978-3-319-25915-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:518770
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Foo, Ernest. editor. Stebila, Douglas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518770.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-19962-7">https://doi.org/10.1007/978-3-319-19962-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:518790
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Lauter, Kristin. editor. Rodríguez-Henríquez, Francisco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518790.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-22174-8">https://doi.org/10.1007/978-3-319-22174-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:518799
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Joye, Marc. editor. Moradi, Amir. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518799.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-16763-3">https://doi.org/10.1007/978-3-319-16763-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:518811
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Shi, Yun-Qing. editor. Kim, Hyoung Joong. editor. Pérez-González, Fernando. editor. Yang, Ching-Nung. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518811.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-19321-2">https://doi.org/10.1007/978-3-319-19321-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Arithmetic of Finite Fields 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:518984
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Koç, Çetin Kaya. editor. Mesnager, Sihem. editor. Savaş, Erkay. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518984.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-16277-5">https://doi.org/10.1007/978-3-319-16277-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:518993
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Gennaro, Rosario. editor. Robshaw, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518993.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-47989-6">https://doi.org/10.1007/978-3-662-47989-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Reconfigurable Computing 11th International Symposium, ARC 2015, Bochum, Germany, April 13-17, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:519004
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Sano, Kentaro. editor. Soudris, Dimitrios. editor. Hübner, Michael. editor. Diniz, Pedro C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519004.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-16214-0">https://doi.org/10.1007/978-3-319-16214-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:519253
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Lopez, Javier. editor. Wu, Yongdong. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519253.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-17533-1">https://doi.org/10.1007/978-3-319-17533-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:519197
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Qiu, Meikang. editor. Xu, Shouhuai. editor. Yung, Moti. editor. Zhang, Haibo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519197.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-25645-0">https://doi.org/10.1007/978-3-319-25645-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:519227
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Focardi, Riccardo. editor. Myers, Andrew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519227.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-46666-7">https://doi.org/10.1007/978-3-662-46666-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:519314
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Gennaro, Rosario. editor. Robshaw, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519314.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-48000-7">https://doi.org/10.1007/978-3-662-48000-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security literacy staying safe in a digital world
ent://SD_ILS/0/SD_ILS:290839
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Jacobson, Douglas. Idziorek, Joseph.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439856192">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Official (ISC)2 guide to the CISSP CBK
ent://SD_ILS/0/SD_ILS:291743
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Tipton, Harold F., editor of compilation. Hernandez, Steven, editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466569782">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of finite fields
ent://SD_ILS/0/SD_ILS:291673
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Mullen, Gary L. Panario, Daniel, 1959-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439873823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematical and algorithmic foundations of the Internet
ent://SD_ILS/0/SD_ILS:285212
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Luccio, Fabrizio, 1938- Pagli, Linda. Steel, Graham, 1977-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439831397">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Algebraic and stochastic coding theory
ent://SD_ILS/0/SD_ILS:288122
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Kythe, Dave K. Kythe, Prem K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466505629">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Defending whose country? indigenous soldiers in the Pacific war
ent://SD_ILS/0/SD_ILS:241931
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Riseman, Noah J. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780803246164/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Official (ISC)2 guide to the SSCP CBK
ent://SD_ILS/0/SD_ILS:286975
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Tipton, Harold F. International Information Systems Security Certification Consortium.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439804841">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Official (ISC)[superscript 2] guide to the ISSAP CBK
ent://SD_ILS/0/SD_ILS:288794
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Tipton, Harold F. International Information Systems Security Certification Consortium.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439800980">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational aspects of modular forms and Galois representations : how one can compute in polynomial time the value of Ramanujan's tau at a prime
ent://SD_ILS/0/SD_ILS:375462
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Couveignes, Jean-Marc. Edixhoven, B. (Bas), 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt7rzmb">http://www.jstor.org/stable/10.2307/j.ctt7rzmb</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)-
ent://SD_ILS/0/SD_ILS:146922
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Heiderich, Mario.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">http://www.sciencedirect.com/science/book/9781597496049</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Official (ISC)2 guide to the CISSP CBK
ent://SD_ILS/0/SD_ILS:286898
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Tipton, Harold F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439809600">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hashing in computer science fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:298025
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook. Volume 4
ent://SD_ILS/0/SD_ILS:289735
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439819036">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Boolean functions and applications
ent://SD_ILS/0/SD_ILS:147530
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Cusick, Thomas W., 1943- Stănică, Pantelimon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied cryptanalysis breaking ciphers in the real world
ent://SD_ILS/0/SD_ILS:249508
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Stamp, Mark. Low, Richard M., 1967-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data-driven block ciphers for fast telecommunication systems
ent://SD_ILS/0/SD_ILS:287763
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Moldovyan, Nick. Moldovyan, Alex.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420054125">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The history of information security a comprehensive handbook
ent://SD_ILS/0/SD_ILS:145532
2024-11-05T05:33:47Z
2024-11-05T05:33:47Z
Author Leeuw, Karl de. Bergstra, J. A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>