Search Results for Cryptography - Narrowed by: Data structures (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography$0026qf$003dSUBJECT$002509Konu$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026ps$003d300?
2026-05-14T21:41:01Z
Cryptography Made Simple
ent://SD_ILS/0/SD_ILS:617695
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Smart, Nigel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-21936-3">https://doi.org/10.1007/978-3-319-21936-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fault Analysis in Cryptography
ent://SD_ILS/0/SD_ILS:196746
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Joye, Marc. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29656-7">http://dx.doi.org/10.1007/978-3-642-29656-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography in Constant Parallel Time
ent://SD_ILS/0/SD_ILS:488823
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Applebaum, Benny. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-17367-7">https://doi.org/10.1007/978-3-642-17367-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptography Principles and Applications
ent://SD_ILS/0/SD_ILS:185185
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Delfs, Hans. author. Knebl, Helmut. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography, Security and Privacy
ent://SD_ILS/0/SD_ILS:606898
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X Samarati, Pierangela. editor. Yung, Moti. editor. (orcid)0000-0003-0848-0873 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-71522-9">https://doi.org/10.1007/978-3-030-71522-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercryptography: Applicable Cryptography for Cyberspace Security
ent://SD_ILS/0/SD_ILS:484533
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography, Security and Privacy
ent://SD_ILS/0/SD_ILS:487070
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Jajodia, Sushil. editor. Samarati, Pierangela. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptography with Maple
ent://SD_ILS/0/SD_ILS:333533
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Gómez Pardo, José Luis. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333533.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32166-5">http://dx.doi.org/10.1007/978-3-642-32166-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:172455
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author van Tilborg, Henk C. A. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elementary Number Theory, Cryptography and Codes
ent://SD_ILS/0/SD_ILS:185736
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Baldoni, Maria Welleda. author. Ciliberto, Ciro. author. Cattaneo, Giulia Maria Piacentini. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69200-3">http://dx.doi.org/10.1007/978-3-540-69200-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An Introduction to Mathematical Cryptography
ent://SD_ILS/0/SD_ILS:167545
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Silverman, J.H. author. Pipher, Jill. author. Hoffstein, Jeffrey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography in C and C++
ent://SD_ILS/0/SD_ILS:170731
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Welschenbach, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-0026-0">http://dx.doi.org/10.1007/978-1-4302-0026-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:164930
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tutorials on the Foundations of Cryptography Dedicated to Oded Goldreich
ent://SD_ILS/0/SD_ILS:617808
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Lindell, Yehuda. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-57048-8">https://doi.org/10.1007/978-3-319-57048-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Boolean Functions and Their Applications in Cryptography
ent://SD_ILS/0/SD_ILS:617119
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Wu, Chuan-Kun. author. Feng, Dengguo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-48865-2">https://doi.org/10.1007/978-3-662-48865-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Chaos-Based Cryptography Theory,Algorithms and Applications
ent://SD_ILS/0/SD_ILS:194408
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Kocarev, Ljupco. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20542-2">http://dx.doi.org/10.1007/978-3-642-20542-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Exercise Book
ent://SD_ILS/0/SD_ILS:165571
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Baigèneres, Thomas. author. Lu, Yi. author. Vaudenay, Serge. author. Junod, Pascal. author. Monnerat, Jean. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:606283
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Boyle, Elette. editor. Mahmoody, Mohammad. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-78020-2">https://doi.org/10.1007/978-3-031-78020-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:606319
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Boyle, Elette. editor. Mahmoody, Mohammad. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-78011-0">https://doi.org/10.1007/978-3-031-78011-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part IV
ent://SD_ILS/0/SD_ILS:606350
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Boyle, Elette. editor. Mahmoody, Mohammad. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-78023-3">https://doi.org/10.1007/978-3-031-78023-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:608986
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Fischlin, Marc. editor. (orcid)0000-0003-0597-8297 Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-95764-2">https://doi.org/10.1007/978-3-031-95764-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:609005
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Fischlin, Marc. editor. (orcid)0000-0003-0597-8297 Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-95767-3">https://doi.org/10.1007/978-3-031-95767-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:606243
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Boyle, Elette. editor. Mahmoody, Mohammad. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-78017-2">https://doi.org/10.1007/978-3-031-78017-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:609039
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Fischlin, Marc. editor. (orcid)0000-0003-0597-8297 Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-95761-1">https://doi.org/10.1007/978-3-031-95761-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 19th IMA International Conference, IMACC 2023, London, UK, December 12-14, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:602089
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Quaglia, Elizabeth A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-47818-5">https://doi.org/10.1007/978-3-031-47818-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:602721
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Pöpper, Christina. editor. Batina, Lejla. editor. (orcid)0000-0003-0727-3573 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-54773-7">https://doi.org/10.1007/978-3-031-54773-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:602730
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Pöpper, Christina. editor. Batina, Lejla. editor. (orcid)0000-0003-0727-3573 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-54776-8">https://doi.org/10.1007/978-3-031-54776-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:602753
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Pöpper, Christina. editor. Batina, Lejla. editor. (orcid)0000-0003-0727-3573 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-54770-6">https://doi.org/10.1007/978-3-031-54770-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Timing Channels in Cryptography A Micro-Architectural Perspective
ent://SD_ILS/0/SD_ILS:529640
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Rebeiro, Chester. author. Mukhopadhyay, Debdeep. author. Bhattacharya, Sarani. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12370-7">https://doi.org/10.1007/978-3-319-12370-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise
ent://SD_ILS/0/SD_ILS:488308
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Pape, Sebastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-658-07116-5">https://doi.org/10.1007/978-3-658-07116-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335197
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Stam, Martijn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335197.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334707
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Jacobson, Michael. editor. Locasto, Michael. editor. Mohassel, Payman. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334707.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Modern Cryptography Primer Theoretical Foundations and Practical Applications
ent://SD_ILS/0/SD_ILS:335099
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Kościelny, Czesław. author. Kurkowski, Mirosław. author. Srebrny, Marian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335099.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197053
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Bao, Feng. editor. Samarati, Pierangela. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195967
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Chen, Liqun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Cryptography A Textbook for Students and Practitioners
ent://SD_ILS/0/SD_ILS:190836
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Paar, Christof. author. Pelzl, Jan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04101-3">http://dx.doi.org/10.1007/978-3-642-04101-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:190855
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Avanzi, Roberto Maria. editor. Keliher, Liam. editor. Sica, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04159-4">http://dx.doi.org/10.1007/978-3-642-04159-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191273
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Jacobson, Michael J. editor. Rijmen, Vincent. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-05445-7">http://dx.doi.org/10.1007/978-3-642-05445-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191500
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Parker, Matthew G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primality Testing and Integer Factorization in Public-Key Cryptography
ent://SD_ILS/0/SD_ILS:167452
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190173
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Abdalla, Michel. editor. Pointcheval, David. editor. Fouque, Pierre-Alain. editor. Vergnaud, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography – Pairing 2009 Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190581
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Shacham, Hovav. editor. Waters, Brent. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03298-1">http://dx.doi.org/10.1007/978-3-642-03298-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Codes: An Introduction to Information Communication and Cryptography
ent://SD_ILS/0/SD_ILS:175791
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Biggs, N.L. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography – Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188716
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Galbraith, Steven D. editor. Paterson, Kenneth G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Classical Introduction to Cryptography Applications for Communications Security
ent://SD_ILS/0/SD_ILS:165205
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Vaudenay, Serge. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SCION: A Secure Internet Architecture
ent://SD_ILS/0/SD_ILS:613238
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Perrig, Adrian. author. Szalachowski, Pawel. author. Reischuk, Raphael M. author. Chuat, Laurent. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-67080-5">https://doi.org/10.1007/978-3-319-67080-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Deletion
ent://SD_ILS/0/SD_ILS:617190
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Reardon, Joel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Operational Semantics and Verification of Security Protocols
ent://SD_ILS/0/SD_ILS:188195
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Cremers, Cas. author. Mauw, Sjouke. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78636-8">http://dx.doi.org/10.1007/978-3-540-78636-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Block Cipher Companion
ent://SD_ILS/0/SD_ILS:193573
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Knudsen, Lars R. author. Robshaw, Matthew J.B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17342-4">http://dx.doi.org/10.1007/978-3-642-17342-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Towards Hardware-Intrinsic Security Foundations and Practice
ent://SD_ILS/0/SD_ILS:192659
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Sadeghi, Ahmad-Reza. editor. Naccache, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14452-3">http://dx.doi.org/10.1007/978-3-642-14452-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Signcryption
ent://SD_ILS/0/SD_ILS:189264
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Dent, Alexander W. editor. Zheng, Yuliang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89411-7">http://dx.doi.org/10.1007/978-3-540-89411-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Efficient Secure Two-Party Protocols Techniques and Constructions
ent://SD_ILS/0/SD_ILS:192608
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Hazay, Carmit. author. Lindell, Yehuda. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14303-8">http://dx.doi.org/10.1007/978-3-642-14303-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Locally Decodable Codes and Private Information Retrieval Schemes
ent://SD_ILS/0/SD_ILS:192626
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Yekhanin, Sergey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14358-8">http://dx.doi.org/10.1007/978-3-642-14358-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The LLL Algorithm Survey and Applications
ent://SD_ILS/0/SD_ILS:190278
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Nguyen, Phong Q. editor. Vallée, Brigitte. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02295-1">http://dx.doi.org/10.1007/978-3-642-02295-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal Correctness of Security Protocols With 62 Figures and 4 Tables
ent://SD_ILS/0/SD_ILS:185368
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Bella, Giampaolo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Concurrent Zero-Knowledge With Additional Background by Oded Goldreich
ent://SD_ILS/0/SD_ILS:183559
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Rosen, Alon. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-32939-0">http://dx.doi.org/10.1007/3-540-32939-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Biometrics
ent://SD_ILS/0/SD_ILS:605790
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Jain, Anil K. author. Ross, Arun A. author. (orcid)0000-0001-8850-3013 Nandakumar, Karthik. author. (orcid)0000-0002-6274-9725 Swearingen, Thomas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-61675-4">https://doi.org/10.1007/978-3-031-61675-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2024 27th International Conference, Seoul, South Korea, November 20-22, 2024, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:608931
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Kim, Jongsung. editor. Park, Jungsoo. editor. Lee, Wai-Kong. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-5566-3">https://doi.org/10.1007/978-981-96-5566-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Arithmetic of Finite Fields 10th International Workshop, WAIFI 2024, Ottawa, ON, Canada, June 10-12, 2024, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:607444
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Petkova-Nikova, Svetla. editor. (orcid)0000-0003-3133-9261 Panario, Daniel. editor. (orcid)0000-0003-3551-4063 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-81824-0">https://doi.org/10.1007/978-3-031-81824-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Modelling and Development of Intelligent Systems 9th International Conference, MDIS 2024, Sibiu, Romania, October 17-19, 2024, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:608462
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Simian, Dana. editor. (orcid)0000-0002-5210-1810 Stoica, Laura Florentina. editor. (orcid)0000-0002-4758-6606 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-87386-7">https://doi.org/10.1007/978-3-031-87386-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXXIX 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025, Proceedings
ent://SD_ILS/0/SD_ILS:609053
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683 Shafiq, Basit. editor. (orcid)0000-0002-7862-6682 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-96590-6">https://doi.org/10.1007/978-3-031-96590-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:606674
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683 Xenakis, Christos. editor. (orcid)0000-0001-6718-122X Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596 Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-97-8798-2">https://doi.org/10.1007/978-981-97-8798-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:606675
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683 Xenakis, Christos. editor. (orcid)0000-0001-6718-122X Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596 Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-97-8801-9">https://doi.org/10.1007/978-981-97-8801-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2023 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part I
ent://SD_ILS/0/SD_ILS:602812
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Seo, Hwajeong. editor. (orcid)0000-0003-0069-9061 Kim, Suhri. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-97-1235-9">https://doi.org/10.1007/978-981-97-1235-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2023 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part II
ent://SD_ILS/0/SD_ILS:602813
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Seo, Hwajeong. editor. (orcid)0000-0003-0069-9061 Kim, Suhri. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-97-1238-0">https://doi.org/10.1007/978-981-97-1238-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:613555
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507 Singh, Virendra. editor. (orcid)0000-0002-9113-5167 Vaidya, Jaideep. editor. (orcid)0000-0002-7420-6947 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72598-7">https://doi.org/10.1007/978-3-319-72598-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Compilation for Secure Multi-party Computation
ent://SD_ILS/0/SD_ILS:613253
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Büscher, Niklas. author. Katzenbeisser, Stefan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-67522-0">https://doi.org/10.1007/978-3-319-67522-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Compression-Based Methods of Statistical Analysis and Prediction of Time Series
ent://SD_ILS/0/SD_ILS:614499
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Ryabko, Boris. author. Astola, Jaakko. author. Malyutov, Mikhail. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-32253-7">https://doi.org/10.1007/978-3-319-32253-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology Transmitted Message Protection From Deterministic Chaos up to Optical Vortices
ent://SD_ILS/0/SD_ILS:616596
2026-05-14T21:41:01Z
2026-05-14T21:41:01Z
Author Izmailov, Igor. author. Poizner, Boris. author. Romanov, Ilia. author. Smolskiy, Sergey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-30125-9">https://doi.org/10.1007/978-3-319-30125-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>