Search Results for Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026ps$003d300$0026isd$003dtrue?dt=list 2026-01-07T15:53:49Z PRACTICAL MATHEMATICAL CRYPTOGRAPHY ent://SD_ILS/0/SD_ILS:574057 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Gjosteen, Kristian.<br/>Preferred Shelf Number&#160;Z103<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003149422">https://www.taylorfrancis.com/books/9781003149422</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography for developers ent://SD_ILS/0/SD_ILS:147686 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;St. Denis, Tom.&#160;Johnson, Simon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491044">http://www.sciencedirect.com/science/book/9781597491044</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to cryptography ent://SD_ILS/0/SD_ILS:106301 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Buchmann, Johannes.<br/>Preferred Shelf Number&#160;QA268 B83 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Introduction to cryptography ent://SD_ILS/0/SD_ILS:93536 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Buchmann, Johannes.<br/>Preferred Shelf Number&#160;QA 268 .B83 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Applied Quantum Cryptography ent://SD_ILS/0/SD_ILS:191072 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kollmitzer, Christian. editor.&#160;Pivk, Mario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04831-9">http://dx.doi.org/10.1007/978-3-642-04831-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography ent://SD_ILS/0/SD_ILS:189106 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Bernstein, Daniel J. editor.&#160;Buchmann, Johannes. editor.&#160;Dahmen, Erik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88702-7">http://dx.doi.org/10.1007/978-3-540-88702-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Group-based Cryptography ent://SD_ILS/0/SD_ILS:198157 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Myasnikov, Alexei. author.&#160;Ushakov, Alexander. author.&#160;Shpilrain, Vladimir. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-7643-8827-0">http://dx.doi.org/10.1007/978-3-7643-8827-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of applied cryptography ent://SD_ILS/0/SD_ILS:109547 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Menezes, Alfred J.&#160;Van Oorschot, Paul C., ort. yaz.&#160;Vanstone, Scott A., ort. yaz.<br/>Preferred Shelf Number&#160;QA76.9.A25 M46 1997<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Fault Analysis in Cryptography ent://SD_ILS/0/SD_ILS:196746 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Joye, Marc. editor.&#160;Tunstall, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29656-7">http://dx.doi.org/10.1007/978-3-642-29656-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:364315 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Katz, Jonathan, 1974-&#160;Lindell, Yehuda.<br/>Preferred Shelf Number&#160;QA76.9.A25 K36 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:386241 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kahate, Atul.<br/>Preferred Shelf Number&#160;TK5105.59 K12 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cryptography for Payment Professionals ent://SD_ILS/0/SD_ILS:561838 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Dubinsky, Ilya, author.<br/>Preferred Shelf Number&#160;HG1710<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003371366">https://www.taylorfrancis.com/books/9781003371366</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum communications and cryptography ent://SD_ILS/0/SD_ILS:543504 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Sergienko, Alexander V.<br/>Preferred Shelf Number&#160;TK5102.94 .Q36 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420026603">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Beginning cryptography with Java ent://SD_ILS/0/SD_ILS:144203 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Hook, David, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:557931 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Alencar, Marcelo S., 1957- author.<br/>Preferred Shelf Number&#160;TK5102.94 .A44 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337768">https://www.taylorfrancis.com/books/9781003337768</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Applied Cryptography ent://SD_ILS/0/SD_ILS:546435 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Menezes, Alfred J., author.&#160;Katz, Jonathan, author.&#160;van Oorschot, Paul C., author.&#160;Vanstone, Scott A., author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429466335">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algebraic curves in cryptography ent://SD_ILS/0/SD_ILS:544162 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ling, San, 1964, author.&#160;Wang, Huaxiong.&#160;Xing, Chaoping, 1963-<br/>Preferred Shelf Number&#160;QA268 .L545 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420079470">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> An introduction to cryptography ent://SD_ILS/0/SD_ILS:110595 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Mollin, Richard A., 1947-<br/>Preferred Shelf Number&#160;QA268 .M65 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:296865 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a> John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to cryptography ent://SD_ILS/0/SD_ILS:543005 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Mollin, Richard A., 1947- author.<br/>Preferred Shelf Number&#160;QA268 .M65 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420011241">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:518569 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Delfs, Hans. author.&#160;Knebl, Helmut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-47974-2">https://doi.org/10.1007/978-3-662-47974-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography in Constant Parallel Time ent://SD_ILS/0/SD_ILS:488823 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Applebaum, Benny. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-17367-7">https://doi.org/10.1007/978-3-642-17367-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:185185 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Delfs, Hans. author.&#160;Knebl, Helmut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of financial cryptography and security ent://SD_ILS/0/SD_ILS:542098 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Rosenberg, Burton.<br/>Preferred Shelf Number&#160;HG1710 .H34 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420059823">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Classical and Modern Cryptography for Beginners ent://SD_ILS/0/SD_ILS:520471 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Banoth, Rajkumar. author.&#160;Regar, Rekha. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-32959-3">https://doi.org/10.1007/978-3-031-32959-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercryptography: Applicable Cryptography for Cyberspace Security ent://SD_ILS/0/SD_ILS:484533 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:487070 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> QC-LDPC Code-Based Cryptography ent://SD_ILS/0/SD_ILS:488413 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Baldi, Marco. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-02556-8">https://doi.org/10.1007/978-3-319-02556-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Bitcoin Cryptography, Engineering and Economics. ent://SD_ILS/0/SD_ILS:342159 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Franco, Pedro.<br/>Preferred Shelf Number&#160;ONLINE(342159.1)<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781119019138">http://dx.doi.org/10.1002/9781119019138</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1822536">http://swb.eblib.com/patron/FullRecord.aspx?p=1822536</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to number theory with cryptography ent://SD_ILS/0/SD_ILS:364648 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kraft, James S., author.&#160;Washington, Lawrence C., author.<br/>Preferred Shelf Number&#160;QA241 K73 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Introduction to Cryptography with Maple ent://SD_ILS/0/SD_ILS:333533 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;G&oacute;mez Pardo, Jos&eacute; Luis. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333533.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32166-5">http://dx.doi.org/10.1007/978-3-642-32166-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:344263 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Cao, Zhenfu.<br/>Preferred Shelf Number&#160;ONLINE(344263.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public key cryptography applications and attacks ent://SD_ILS/0/SD_ILS:249342 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Batten, Lynn Margaret.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational number theory and modern cryptography ent://SD_ILS/0/SD_ILS:299126 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Yan, Song Y.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602</a> Wiley Online Library <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118188606">http://onlinelibrary.wiley.com/book/10.1002/9781118188606</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118188606">http://dx.doi.org/10.1002/9781118188606</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1120602">http://swb.eblib.com/patron/FullRecord.aspx?p=1120602</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Everyday Cryptography Fundamental Principles and Applications ent://SD_ILS/0/SD_ILS:279211 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Martin, Keith M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Cryptography and Secret-Key Distillation ent://SD_ILS/0/SD_ILS:235140 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Assche, Gilles van .<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511617744">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:539468 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Cimato, Stelvio.&#160;Yang, Ching-Nung.<br/>Preferred Shelf Number&#160;TA1637 .V544 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315217659">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:172455 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;van Tilborg, Henk C. A. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, Automata and Learning Theory ent://SD_ILS/0/SD_ILS:365541 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Thomas, D. Gnanaraj, ed. lit.&#160;Jeyanthi, P. Abisha, ed. lit.<br/>Preferred Shelf Number&#160;QA76.9.A25 C79 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:146450 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Finite Automata and Application to Cryptography ent://SD_ILS/0/SD_ILS:188068 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Tao, Renji. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78257-5">http://dx.doi.org/10.1007/978-3-540-78257-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gr&ouml;bner Bases, Coding, and Cryptography ent://SD_ILS/0/SD_ILS:189513 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Sala, Massimiliano. editor.&#160;Sakata, Shojiro. editor.&#160;Mora, Teo. editor.&#160;Traverso, Carlo. editor.&#160;Perret, Ludovic. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-93806-4">http://dx.doi.org/10.1007/978-3-540-93806-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elementary Number Theory, Cryptography and Codes ent://SD_ILS/0/SD_ILS:185736 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Baldoni, Maria Welleda. author.&#160;Ciliberto, Ciro. author.&#160;Cattaneo, Giulia Maria Piacentini. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69200-3">http://dx.doi.org/10.1007/978-3-540-69200-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Story From Counting to Cryptography ent://SD_ILS/0/SD_ILS:175665 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Higgins, Peter M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-001-8">http://dx.doi.org/10.1007/978-1-84800-001-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An Introduction to Mathematical Cryptography ent://SD_ILS/0/SD_ILS:167545 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Silverman, J.H. author.&#160;Pipher, Jill. author.&#160;Hoffstein, Jeffrey. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information theory, coding and cryptography ent://SD_ILS/0/SD_ILS:386137 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Bose, Ranjan.<br/>Preferred Shelf Number&#160;QA268 B743 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Elliptic curves : number theory and cryptography ent://SD_ILS/0/SD_ILS:539008 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Washington, Lawrence C., author.<br/>Preferred Shelf Number&#160;QA567.2 .E44 W37 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420071474">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:164930 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Tilborg, Henk C. A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography in C and C++ ent://SD_ILS/0/SD_ILS:170731 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Welschenbach, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-0026-0">http://dx.doi.org/10.1007/978-1-4302-0026-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Elliptic Curve Cryptography ent://SD_ILS/0/SD_ILS:236058 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Blake, Ian F..&#160;Seroussi, Gadiel.&#160;Smart, Nigel P..<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RSA and public-key cryptography ent://SD_ILS/0/SD_ILS:543985 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Mollin, Richard A., 1947, author.<br/>Preferred Shelf Number&#160;QA268 .M655 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420035247">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:253900 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Analog Side Channels Using Cryptography Algorithms ent://SD_ILS/0/SD_ILS:520646 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Zaji&#263;, Alenka. author.&#160;Prvulovic, Milos. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-38579-7">https://doi.org/10.1007/978-3-031-38579-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern cryptography with proof techniques and implementations. ent://SD_ILS/0/SD_ILS:577000 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Hwang, Seong Oun, author.&#160;Kim, Intae, author.&#160;Lee, Wai Kong, author.<br/>Preferred Shelf Number&#160;TK5102.94 .M63 2021<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003152569">https://www.taylorfrancis.com/books/9781003152569</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical cryptography : algorithms and implementations using C++ ent://SD_ILS/0/SD_ILS:540133 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Azad, Saiful, editor.&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P725 2015<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482228908">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> An introduction to number theory with cryptography ent://SD_ILS/0/SD_ILS:544089 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kraft, James S., eauthor.&#160;Washington, Lawrence C., author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;QA241<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482214420">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Chaos-Based Cryptography Theory,Algorithms and Applications ent://SD_ILS/0/SD_ILS:194408 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kocarev, Ljupco. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20542-2">http://dx.doi.org/10.1007/978-3-642-20542-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:303838 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a> <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a> Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Geometry, Coding Theory and Cryptography ent://SD_ILS/0/SD_ILS:169437 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Garcia, Arnaldo. editor.&#160;Stichtenoth, Henning. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless security and cryptography : specifications and implementations ent://SD_ILS/0/SD_ILS:543513 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Sklavos, Nicolas.&#160;Zhang, Xinmiao.<br/>Preferred Shelf Number&#160;TK5103.2 .W57415 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315222202">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:165571 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Baig&egrave;neres, Thomas. author.&#160;Lu, Yi. author.&#160;Vaudenay, Serge. author.&#160;Junod, Pascal. author.&#160;Monnerat, Jean. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of elliptic and hyperelliptic curve cryptography ent://SD_ILS/0/SD_ILS:547539 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Cohen, Henri.&#160;Frey, Gerhard, 1944-&#160;Avanzi, Roberto.<br/>Preferred Shelf Number&#160;QA567.2 .E44 H36 2006 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781420034981">https://www.taylorfrancis.com/books/9781420034981</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367801625">https://www.taylorfrancis.com/books/9780367801625</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Cryptography Volume 2. Basic Applications. ent://SD_ILS/0/SD_ILS:236754 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Goldreich, Oded.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511721656">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Java cryptography extensions practical guide for programmers ent://SD_ILS/0/SD_ILS:253797 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Weiss, Jason (Jason R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780127427515">http://www.sciencedirect.com/science/book/9780127427515</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Cryptography Volume 1. Basic Tools. ent://SD_ILS/0/SD_ILS:237721 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Goldreich, Oded.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511546891">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The confluence of cryptography, blockchain and artificial intelligence ent://SD_ILS/0/SD_ILS:566001 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ankita.&#160;Nayancy.&#160;Verma, Rajat.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711515">https://www.taylorfrancis.com/books/9781032711515</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2023 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:520852 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Boldyreva, Alexandra. editor.&#160;Kolesnikov, Vladimir. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31368-4">https://doi.org/10.1007/978-3-031-31368-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:521084 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Tibouchi, Mehdi. editor.&#160;Wang, XiaoFeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-33491-7">https://doi.org/10.1007/978-3-031-33491-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Homomorphic Encryption for Financial Cryptography Recent Inventions and Challenges ent://SD_ILS/0/SD_ILS:520438 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Seethalakshmi, V. editor.&#160;Dhanaraj, Rajesh Kumar. editor.&#160;Suganyadevi, S. editor.&#160;Ouaissa, Mariya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-35535-6">https://doi.org/10.1007/978-3-031-35535-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code-Based Cryptography 10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29-30, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520916 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Deneuville, Jean-Christophe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-29689-5">https://doi.org/10.1007/978-3-031-29689-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:520950 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Tibouchi, Mehdi. editor.&#160;Wang, XiaoFeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-33488-7">https://doi.org/10.1007/978-3-031-33488-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521065 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Johansson, Thomas. editor.&#160;Smith-Tone, Daniel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-40003-2">https://doi.org/10.1007/978-3-031-40003-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2023 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:520853 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Boldyreva, Alexandra. editor.&#160;Kolesnikov, Vladimir. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31371-4">https://doi.org/10.1007/978-3-031-31371-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:521347 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Rothblum, Guy. editor.&#160;Wee, Hoeteck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-48615-9">https://doi.org/10.1007/978-3-031-48615-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:521348 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Rothblum, Guy. editor.&#160;Wee, Hoeteck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-48618-0">https://doi.org/10.1007/978-3-031-48618-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29-December 2, 2023, Proceedings, Part III ent://SD_ILS/0/SD_ILS:521349 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Rothblum, Guy. editor.&#160;Wee, Hoeteck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-48621-0">https://doi.org/10.1007/978-3-031-48621-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29-December 2, 2023, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:521350 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Rothblum, Guy. editor.&#160;Wee, Hoeteck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-48624-1">https://doi.org/10.1007/978-3-031-48624-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&amp;P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521216 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Zhou, Jianying. editor. (orcid)&#160;Batina, Lejla. editor.&#160;Li, Zengpeng. editor.&#160;Lin, Jingqiang. editor.&#160;Losiouk, Eleonora. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41181-6">https://doi.org/10.1007/978-3-031-41181-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code-Based Cryptography 11th International Workshop, CBCrypto 2023, Lyon, France, April 22-23, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:521266 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Esser, Andre. editor.&#160;Santini, Paolo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-46495-9">https://doi.org/10.1007/978-3-031-46495-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security. FC 2022 International Workshops CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:521301 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Matsuo, Shin'ichiro. editor.&#160;Gudgeon, Lewis. editor.&#160;Klages-Mundt, Ariah. editor.&#160;Perez Hernandez, Daniel. editor.&#160;Werner, Sam. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-32415-4">https://doi.org/10.1007/978-3-031-32415-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> HANDBOOK OF FORMAL ANALYSIS AND VERIFICATION IN CRYPTOGRAPHY ent://SD_ILS/0/SD_ILS:552799 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Akleylek, Sedat.&#160;Dundua, Besik.<br/>Preferred Shelf Number&#160;QA76.9 .D335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003090052">https://www.taylorfrancis.com/books/9781003090052</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security using modern technologies : artificial intelligence, blockchain and quantum cryptography ent://SD_ILS/0/SD_ILS:587827 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Pal, Om, editor.&#160;Kumar, Vinod (Professor of electronics and communication), editor.&#160;Khan, Rijwan, 1981- editor.&#160;Alam, Bashir, editor.&#160;Alam, Mansaf, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003267812">https://www.taylorfrancis.com/books/9781003267812</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Holistic approach to quantum cryptography in cyber security ent://SD_ILS/0/SD_ILS:578140 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Shashi Bhushan, 1928- editor.<br/>Preferred Shelf Number&#160;QA76.9 .D335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003296034">https://www.taylorfrancis.com/books/9781003296034</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in applications of computational intelligence and the Internet of Things (IoT) : cryptography and network security in IoTs ent://SD_ILS/0/SD_ILS:577899 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Chowdhury, Rajdeep, editor.&#160;Niranjan, S. K., editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003127482">https://www.taylorfrancis.com/books/9781003127482</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:483128 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Hofheinz, Dennis. editor.&#160;Rosen, Alon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography &ndash; SAC 2018 25th International Conference, Calgary, AB, Canada, August 15&ndash;17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483366 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Cid, Carlos. editor. (orcid)0000-0001-5761-8694&#160;Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484047 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432&#160;Deng, Robert. editor. (orcid)0000-0003-3491-8146&#160;Li, Zhou. editor.&#160;Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484186 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Dolev, Shlomi. editor.&#160;Hendler, Danny. editor.&#160;Lodha, Sachin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura&ccedil;ao, March 2, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484585 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Zohar, Aviv. editor.&#160;Eyal, Ittay. editor.&#160;Teague, Vanessa. editor. (orcid)0000-0003-2648-2565&#160;Clark, Jeremy. editor.&#160;Bracciali, Andrea. editor. (orcid)0000-0003-1451-9260<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-58820-8">https://doi.org/10.1007/978-3-662-58820-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18&ndash;22, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486319 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Goldberg, Ian. editor.&#160;Moore, Tyler. editor. (orcid)0000-0002-8771-8191&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:483055 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Lin, Dongdai. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483504 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Deng, Robert H. editor. (orcid)0000-0003-3491-8146&#160;Gauthier-Uma&ntilde;a, Val&eacute;rie. editor. (orcid)0000-0003-0909-7091&#160;Ochoa, Mart&iacute;n. editor. (orcid)0000-0002-7816-5775&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483608 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Albrecht, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 9th International Conference, SPACE 2019, Gandhinagar, India, December 3&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485010 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Bhasin, Shivam. editor. (orcid)0000-0002-6903-5127&#160;Mendelson, Avi. editor.&#160;Nandi, Mridul. editor. (orcid)0000-0002-1029-6576&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-35869-3">https://doi.org/10.1007/978-3-030-35869-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486060 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Hofheinz, Dennis. editor.&#160;Rosen, Alon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8&ndash;10, 2019 Revised Selected Papers ent://SD_ILS/0/SD_ILS:483295 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ding, Jintai. editor.&#160;Steinwandt, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code-Based Cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18&ndash;19, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486426 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526&#160;Persichetti, Edoardo. editor. (orcid)0000-0002-1895-377X&#160;Santini, Paolo. editor. (orcid)0000-0003-0631-3668&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25922-8">https://doi.org/10.1007/978-3-030-25922-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486955 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Lin, Dongdai. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:399520 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526&#160;Quaglia, Elizabeth A. editor.&#160;Tomasin, Stefano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399614 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Catalano, Dario. editor.&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399906 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983&#160;Rebeiro, Chester. editor. (orcid)0000-0001-8063-0026&#160;Yarom, Yuval. editor. (orcid)0000-0003-0401-4197&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401487 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651&#160;Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project ent://SD_ILS/0/SD_ILS:401558 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Wakayama, Masato. editor.&#160;Tanaka, Keisuke. editor.&#160;Kunihiro, Noboru. editor.&#160;Kimoto, Kazufumi. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:401823 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-76581-5">https://doi.org/10.1007/978-3-319-76581-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399578 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Lange, Tanja. editor.&#160;Steinwandt, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-79063-3">https://doi.org/10.1007/978-3-319-79063-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 22nd International Conference, FC 2018, Nieuwpoort, Cura&ccedil;ao, February 26 &ndash; March 2, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399957 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Meiklejohn, Sarah. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-58387-6">https://doi.org/10.1007/978-3-662-58387-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography &ndash; SAC 2017 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402041 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Adams, Carlisle. editor.&#160;Camenisch, Jan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72565-9">https://doi.org/10.1007/978-3-319-72565-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21&ndash;22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399450 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Dinur, Itai. editor.&#160;Dolev, Shlomi. editor.&#160;Lodha, Sachin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:400334 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Beimel, Amos. editor.&#160;Dziembowski, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms ent://SD_ILS/0/SD_ILS:400424 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Dooley, John F. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-90443-6">https://doi.org/10.1007/978-3-319-90443-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:400566 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Beimel, Amos. editor.&#160;Dziembowski, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fault Tolerant Architectures for Cryptography and Hardware Security ent://SD_ILS/0/SD_ILS:400923 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;PATRANABIS, SIKHAR. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-1387-4">https://doi.org/10.1007/978-981-10-1387-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:401426 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-76578-5">https://doi.org/10.1007/978-3-319-76578-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518872 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ors, Berna. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21356-9">https://doi.org/10.1007/978-3-319-21356-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:518897 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Groth, Jens. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-27239-9">https://doi.org/10.1007/978-3-319-27239-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518908 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Okamoto, Tatsuaki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-47854-7">https://doi.org/10.1007/978-3-662-47854-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:518982 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Dodis, Yevgeniy. editor.&#160;Nielsen, Jesper Buus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46494-6">https://doi.org/10.1007/978-3-662-46494-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:519027 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Dodis, Yevgeniy. editor.&#160;Nielsen, Jesper Buus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46497-7">https://doi.org/10.1007/978-3-662-46497-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519095 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Malkin, Tal. editor.&#160;Kolesnikov, Vladimir. editor.&#160;Lewko, Allison. editor.&#160;Polychronakis, Michalis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28166-7">https://doi.org/10.1007/978-3-319-28166-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Why Cryptography Should Not Rely on Physical Attack Complexity ent://SD_ILS/0/SD_ILS:529557 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kr&auml;mer, Juliane. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-287-787-1">https://doi.org/10.1007/978-981-287-787-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Timing Channels in Cryptography A Micro-Architectural Perspective ent://SD_ILS/0/SD_ILS:529640 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Rebeiro, Chester. author.&#160;Mukhopadhyay, Debdeep. author.&#160;Bhattacharya, Sarani. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12370-7">https://doi.org/10.1007/978-3-319-12370-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:518462 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Liu, Feng. author.&#160;Yan, Wei Qi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-23473-1">https://doi.org/10.1007/978-3-319-23473-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519134 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Katz, Jonathan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46447-2">https://doi.org/10.1007/978-3-662-46447-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519305 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Eisenbarth, Thomas. editor.&#160;&Ouml;zt&uuml;rk, Erdin&ccedil;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-16363-5">https://doi.org/10.1007/978-3-319-16363-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519308 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Schwabe, Peter. editor.&#160;Solworth, Jon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24126-5">https://doi.org/10.1007/978-3-319-24126-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519217 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Brenner, Michael. editor.&#160;Christin, Nicolas. editor.&#160;Johnson, Benjamin. editor.&#160;Rohloff, Kurt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-48051-9">https://doi.org/10.1007/978-3-662-48051-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486893 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Cao, Zhenfu. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise ent://SD_ILS/0/SD_ILS:488308 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Pape, Sebastian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-07116-5">https://doi.org/10.1007/978-3-658-07116-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:484564 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485776 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Joux, Antoine. editor.&#160;Youssef, Amr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487453 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11659-4">https://doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:489032 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Shi, Yun Q. editor.&#160;Liu, Feng. editor.&#160;Yan, Weiqi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489063 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Bacon, Dave. editor.&#160;Martin-Delgado, Miguel. editor.&#160;Roetteler, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54429-3">https://doi.org/10.1007/978-3-642-54429-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:486912 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Matyas, Vashek. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488916 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Boureanu, Ioana. editor.&#160;Owesarski, Philippe. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488984 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Christin, Nicolas. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488961 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Krawczyk, Hugo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488971 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Brenner, Michael. editor.&#160;Moore, Tyler. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488975 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Lindell, Yehuda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489261 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Lange, Tanja. editor.&#160;Lauter, Kristin. editor.&#160;Lison&#283;k, Petr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43414-7">https://doi.org/10.1007/978-3-662-43414-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:487455 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Liu, Feng. author.&#160;Yan, Wei Qi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09644-5">https://doi.org/10.1007/978-3-319-09644-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488136 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kotulski, Zbigniew. editor.&#160;Ksiezopolski, Bogdan. editor.&#160;Mazur, Katarzyna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334097 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Knudsen, Lars R. editor.&#160;Wu, Huapeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334097.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334635 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Gaborit, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334635.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334863 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334863.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334938 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Avoine, Gildas. editor.&#160;Kara, Orhun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334938.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334707.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday ent://SD_ILS/0/SD_ILS:335154 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Fischlin, Marc. editor.&#160;Katzenbeisser, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335154.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334022 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Iwama, Kazuo. editor.&#160;Kawano, Yasuhito. editor.&#160;Murao, Mio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334022.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35656-8">http://dx.doi.org/10.1007/978-3-642-35656-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334179 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Abdalla, Michel. editor.&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334179.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334184 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kurosawa, Kaoru. editor.&#160;Hanaoka, Goichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334184.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334242 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Sahai, Amit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334242.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335076 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Gierlichs, Benedikt. editor.&#160;Guilley, Sylvain. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335076.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335088 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Adams, Andrew A. editor.&#160;Brenner, Michael. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335088.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern Cryptography Primer Theoretical Foundations and Practical Applications ent://SD_ILS/0/SD_ILS:335099 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ko&#347;cielny, Czes&#322;aw. author.&#160;Kurkowski, Miros&#322;aw. author.&#160;Srebrny, Marian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335099.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335197 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Stam, Martijn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335197.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for wireless sensor networks using identity-based cryptography ent://SD_ILS/0/SD_ILS:544612 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Patil, Harsh Kupwade., author.&#160;Szygenda, Stephen A.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P38 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196562 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Cramer, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28914-9">http://dx.doi.org/10.1007/978-3-642-28914-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196822 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Fischlin, Marc. editor.&#160;Buchmann, Johannes. editor.&#160;Manulis, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30057-8">http://dx.doi.org/10.1007/978-3-642-30057-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196237 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Danezis, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27576-0">http://dx.doi.org/10.1007/978-3-642-27576-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday ent://SD_ILS/0/SD_ILS:196428 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196459 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Miri, Ali. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28496-0">http://dx.doi.org/10.1007/978-3-642-28496-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197053 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Bao, Feng. editor.&#160;Samarati, Pierangela. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197299 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Visconti, Ivan. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32928-9">http://dx.doi.org/10.1007/978-3-642-32928-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197303 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Keromytis, Angelos D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32946-3">http://dx.doi.org/10.1007/978-3-642-32946-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196791 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Danezis, George. editor.&#160;Dietrich, Sven. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29889-9">http://dx.doi.org/10.1007/978-3-642-29889-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197516 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Bogdanov, Andrey. editor.&#160;Sanadhya, Somitra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34416-9">http://dx.doi.org/10.1007/978-3-642-34416-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197536 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Blyth, Jim. editor.&#160;Dietrich, Sven. editor.&#160;Camp, L. Jean. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34638-5">http://dx.doi.org/10.1007/978-3-642-34638-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194086 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ishai, Yuval. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19571-6">http://dx.doi.org/10.1007/978-3-642-19571-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194087 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Biryukov, Alex. editor.&#160;Gong, Guang. editor.&#160;Stinson, Douglas R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19574-7">http://dx.doi.org/10.1007/978-3-642-19574-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 &ndash; December 2, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195937 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Yang, Bo-Yin.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25405-5">http://dx.doi.org/10.1007/978-3-642-25405-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195967 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Chen, Liqun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194738 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Lopez, Javier. editor.&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman ent://SD_ILS/0/SD_ILS:195100 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Goldreich, Oded. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22670-0">http://dx.doi.org/10.1007/978-3-642-22670-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 5th Conference, TQC 2010, Leeds, UK, April 13-15, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193796 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Dam, Wim. editor.&#160;Kendon, Vivien M. editor.&#160;Severini, Simone. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-18073-6">http://dx.doi.org/10.1007/978-3-642-18073-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2011 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194024 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Catalano, Dario. editor.&#160;Fazio, Nelly. editor.&#160;Gennaro, Rosario. editor.&#160;Nicolosi, Antonio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19379-8">http://dx.doi.org/10.1007/978-3-642-19379-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nonlinear laser dynamics from quantum dots to cryptography ent://SD_ILS/0/SD_ILS:306141 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;L&uuml;dge, Kathy.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9783527639823">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Information, Computation and Cryptography An Introductory Survey of Theory, Technology and Experiments ent://SD_ILS/0/SD_ILS:191835 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Benatti, Fabio. editor.&#160;Fannes, Mark. editor.&#160;Floreanini, Roberto. editor.&#160;Petritis, Dimitri. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11914-9">http://dx.doi.org/10.1007/978-3-642-11914-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192701 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Sion, Radu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14577-3">http://dx.doi.org/10.1007/978-3-642-14577-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192838 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Sion, Radu. editor.&#160;Curtmola, Reza. editor.&#160;Dietrich, Sven. editor.&#160;Kiayias, Aggelos. editor.&#160;Miret, Josep M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14992-4">http://dx.doi.org/10.1007/978-3-642-14992-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192932 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Garay, Juan A. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15317-4">http://dx.doi.org/10.1007/978-3-642-15317-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Cryptography A Textbook for Students and Practitioners ent://SD_ILS/0/SD_ILS:190836 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Paar, Christof. author.&#160;Pelzl, Jan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04101-3">http://dx.doi.org/10.1007/978-3-642-04101-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191801 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Micciancio, Daniele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11799-2">http://dx.doi.org/10.1007/978-3-642-11799-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192157 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Sendrier, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12929-2">http://dx.doi.org/10.1007/978-3-642-12929-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2010 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192187 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Nguyen, Phong Q. editor.&#160;Pointcheval, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13013-7">http://dx.doi.org/10.1007/978-3-642-13013-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192420 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings ent://SD_ILS/0/SD_ILS:193606 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Joye, Marc. editor.&#160;Miyaji, Atsuko. editor.&#160;Otsuka, Akira. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17455-1">http://dx.doi.org/10.1007/978-3-642-17455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Chaos synchronization and cryptography for secure communications applications for encryption ent://SD_ILS/0/SD_ILS:277940 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Banerjee, Santo, 1976-&#160;IGI Global.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191500 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Parker, Matthew G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Theory in Science and Communication With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity ent://SD_ILS/0/SD_ILS:188668 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Schroeder, Manfred. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85298-8">http://dx.doi.org/10.1007/978-3-540-85298-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190173 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Abdalla, Michel. editor.&#160;Pointcheval, David. editor.&#160;Fouque, Pierre-Alain. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2009 Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings ent://SD_ILS/0/SD_ILS:190581 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Shacham, Hovav. editor.&#160;Waters, Brent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03298-1">http://dx.doi.org/10.1007/978-3-642-03298-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189693 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Reingold, Omer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00457-5">http://dx.doi.org/10.1007/978-3-642-00457-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2009 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189697 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Jarecki, Stanis&#322;aw. editor.&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00468-1">http://dx.doi.org/10.1007/978-3-642-00468-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:190657 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Dingledine, Roger. editor.&#160;Golle, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03549-4">http://dx.doi.org/10.1007/978-3-642-03549-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190855 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Avanzi, Roberto Maria. editor.&#160;Keliher, Liam. editor.&#160;Sica, Francesco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04159-4">http://dx.doi.org/10.1007/978-3-642-04159-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191273 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Jacobson, Michael J. editor.&#160;Rijmen, Vincent. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05445-7">http://dx.doi.org/10.1007/978-3-642-05445-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 4th Workshop,TQC 2009, Waterloo, Canada, May 11-13, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191450 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Childs, Andrew. editor.&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10698-9">http://dx.doi.org/10.1007/978-3-642-10698-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Primality Testing and Integer Factorization in Public-Key Cryptography ent://SD_ILS/0/SD_ILS:167452 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes: An Introduction to Information Communication and Cryptography ent://SD_ILS/0/SD_ILS:175791 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Biggs, N.L. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:188645 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings ent://SD_ILS/0/SD_ILS:189044 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Buchmann, Johannes. editor.&#160;Ding, Jintai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188130 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Cramer, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188159 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Canetti, Ran. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188716 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Galbraith, Steven D. editor.&#160;Paterson, Kenneth G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188792 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ostrovsky, Rafail. editor.&#160;Prisco, Roberto. editor.&#160;Visconti, Ivan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:189241 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kawano, Yasuhito. editor.&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Networked RFID Systems and Lightweight Cryptography Raising Barriers to Product Counterfeiting ent://SD_ILS/0/SD_ILS:186333 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Cole, Peter H. editor.&#160;Ranasinghe, Damith C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71641-9">http://dx.doi.org/10.1007/978-3-540-71641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:297432 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Dube, Roger.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185647 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Bellovin, Steven M. editor.&#160;Gennaro, Rosario. editor.&#160;Keromytis, Angelos. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186340 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Okamoto, Tatsuaki. editor.&#160;Wang, Xiaoyun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2007 First International Conference, Tokyo, Japan, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186868 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Okamoto, Tatsuaki. editor.&#160;Okamoto, Eiji. editor.&#160;Okamoto, Takeshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:187165 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Biham, Eli. editor.&#160;Youssef, Amr M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187827 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Galbraith, Steven D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187851 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Adams, Carlisle. editor.&#160;Miri, Ali. editor.&#160;Wiener, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:187854 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Dietrich, Sven. editor.&#160;Dhamija, Rachna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186107 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Vadhan, Salil P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186640 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Katz, Jonathan. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:165205 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Vaudenay, Serge. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183489 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Halevi, Shai. editor.&#160;Rabin, Tal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:183624 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Preneel, Bart. editor.&#160;Tavares, Stafford. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11693383">http://dx.doi.org/10.1007/11693383</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183856 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Yung, Moti. editor.&#160;Dodis, Yevgeniy. editor.&#160;Kiayias, Aggelos. editor.&#160;Malkin, Tal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184150 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;Bao, Feng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:184267 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ytrehus, &Oslash;yvind. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Theory in Science and Communication With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity ent://SD_ILS/0/SD_ILS:180834 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Schroeder, Manfred R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137861">http://dx.doi.org/10.1007/b137861</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184658 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Prisco, Roberto. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184906 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Breveglieri, Luca. editor.&#160;Koren, Israel. editor.&#160;Naccache, David. editor.&#160;Seifert, Jean-Pierre. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:184908 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Crescenzo, Giovanni. editor.&#160;Rubin, Avi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182721 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ioannidis, John. editor.&#160;Keromytis, Angelos. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183360 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Smart, Nigel P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182361 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Handschuh, Helena. editor.&#160;Hasan, M. Anwar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105103">http://dx.doi.org/10.1007/b105103</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182373 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kilian, Joe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182377 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 &ndash; March 3, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:182827 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Patrick, Andrew S. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction a handbook for the 21st century ent://SD_ILS/0/SD_ILS:301860 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Signal Design for Good Correlation For Wireless Communication, Cryptography, and Radar ent://SD_ILS/0/SD_ILS:236641 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Golomb, Solomon W..&#160;Gong, Guang.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511546907">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice /cWilliam Stallings. ent://SD_ILS/0/SD_ILS:93149 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK 5105.59 S25 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:108014 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Schneier, Bruce.<br/>Preferred Shelf Number&#160;QA76.9.A25 S35 1996<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Foundations of coding theory and applications of error-correcting codes, with an introduction to cryptography and information theory ent://SD_ILS/0/SD_ILS:300313 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ad&aacute;mek, Ji&#345;&iacute;, ing.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033265">An electronic book accessible through the World Wide Web; click for information</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/22660845.html">http://catalog.hathitrust.org/api/volumes/oclc/22660845.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modelling and Verification of Secure Exams ent://SD_ILS/0/SD_ILS:401571 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Giustolisi, Rosario. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67107-9">https://doi.org/10.1007/978-3-319-67107-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Hash Function BLAKE ent://SD_ILS/0/SD_ILS:488367 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Aumasson, Jean-Philippe. author.&#160;Meier, Willi. author.&#160;Phan, Raphael C.-W. author.&#160;Henzen, Luca. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Operational Semantics and Verification of Security Protocols ent://SD_ILS/0/SD_ILS:188195 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Cremers, Cas. author.&#160;Mauw, Sjouke. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78636-8">http://dx.doi.org/10.1007/978-3-540-78636-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Block Cipher Companion ent://SD_ILS/0/SD_ILS:193573 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Knudsen, Lars R. author.&#160;Robshaw, Matthew J.B. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17342-4">http://dx.doi.org/10.1007/978-3-642-17342-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Efficient Secure Two-Party Protocols Techniques and Constructions ent://SD_ILS/0/SD_ILS:192608 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Hazay, Carmit. author.&#160;Lindell, Yehuda. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14303-8">http://dx.doi.org/10.1007/978-3-642-14303-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Statistical Steganalysis ent://SD_ILS/0/SD_ILS:192611 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;B&ouml;hme, Rainer. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14313-7">http://dx.doi.org/10.1007/978-3-642-14313-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Towards Hardware-Intrinsic Security Foundations and Practice ent://SD_ILS/0/SD_ILS:192659 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14452-3">http://dx.doi.org/10.1007/978-3-642-14452-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Signcryption ent://SD_ILS/0/SD_ILS:189264 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Dent, Alexander W. editor.&#160;Zheng, Yuliang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89411-7">http://dx.doi.org/10.1007/978-3-540-89411-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The LLL Algorithm Survey and Applications ent://SD_ILS/0/SD_ILS:190278 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Nguyen, Phong Q. editor.&#160;Vall&eacute;e, Brigitte. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02295-1">http://dx.doi.org/10.1007/978-3-642-02295-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Locally Decodable Codes and Private Information Retrieval Schemes ent://SD_ILS/0/SD_ILS:192626 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Yekhanin, Sergey. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14358-8">http://dx.doi.org/10.1007/978-3-642-14358-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An Introduction to Secret Sharing A Systematic Overview and Guide for Protocol Selection ent://SD_ILS/0/SD_ILS:520451 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Krenn, Stephan. author.&#160;Lor&uuml;nser, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-28161-7">https://doi.org/10.1007/978-3-031-28161-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:185368 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Bella, Giampaolo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Concurrent Zero-Knowledge With Additional Background by Oded Goldreich ent://SD_ILS/0/SD_ILS:183559 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Rosen, Alon. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-32939-0">http://dx.doi.org/10.1007/3-540-32939-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptanalysis of RSA and its variants ent://SD_ILS/0/SD_ILS:542078 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Hinek, M. Jason., author.<br/>Preferred Shelf Number&#160;TK5102.94 .H56 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Algorithmic cryptanalysis ent://SD_ILS/0/SD_ILS:546057 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Joux, Antoine., author.<br/>Preferred Shelf Number&#160;QA76.9 .A43 J693 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420070033">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Handbook on soft computing for video surveillance ent://SD_ILS/0/SD_ILS:539764 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Pal, Sankar K.&#160;Petrosino, Alfredo.&#160;Maddalena, Lucia.<br/>Preferred Shelf Number&#160;QA76.9 .S63 H36 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439856857">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:542831 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> SECURE ONLINE VOTING USING BIOMETRIC AUTHENTICATION AND PUBLIC KEY ENCRYPTION ent://SD_ILS/0/SD_ILS:562910 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;S., AJISH.<br/>Preferred Shelf Number&#160;JF1032<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003432968">https://www.taylorfrancis.com/books/9781003432968</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum algorithms and their applications in cryptology : a practical approach ent://SD_ILS/0/SD_ILS:567884 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Singh, Bhupendra, author.&#160;Mylsamy, Mohankumar, author.&#160;Thangarajan, Thamaraimanalan, author.<br/>Preferred Shelf Number&#160;QA76.9 .D335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606338">https://www.taylorfrancis.com/books/9781003606338</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Communication and Quantum Internet Applications ent://SD_ILS/0/SD_ILS:574592 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Minoli, Daniel, 1952- author.&#160;Occhiogrosso, Benedict, author.<br/>Preferred Shelf Number&#160;TK5103.592 .Q83<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003485612">https://www.taylorfrancis.com/books/9781003485612</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBER SECURITY IN THE AGE OF ARTIFICIAL INTELLIGENCE AND AUTONOMOUS weapons ent://SD_ILS/0/SD_ILS:588996 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Erendor, Mehmet Emin.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003441700">https://www.taylorfrancis.com/books/9781003441700</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The art of cyber defense : from risk assessment to threat intelligence ent://SD_ILS/0/SD_ILS:586305 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Baddi, Youssef, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032714806">https://www.taylorfrancis.com/books/9781032714806</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI and digital forensics ent://SD_ILS/0/SD_ILS:557101 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D345 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003469438">https://www.taylorfrancis.com/books/9781003469438</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> LEVERAGING BLOCKCHAIN TECHNOLOGY governance, risk compliance, security, and benevolent use cases. ent://SD_ILS/0/SD_ILS:568758 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Aghili, Shaun (Professor of management)<br/>Preferred Shelf Number&#160;QA76.9 .B56<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003462033">https://www.taylorfrancis.com/books/9781003462033</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next generation mechanism for data encryption ent://SD_ILS/0/SD_ILS:552326 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kumar, Keshav (Engineer), editor.&#160;Pandey, Bishwajeet, editor.<br/>Preferred Shelf Number&#160;QA76.9 .D335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003508632">https://www.taylorfrancis.com/books/9781003508632</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptosystems ent://SD_ILS/0/SD_ILS:560055 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ba&#351;, Esra, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003514190">https://www.taylorfrancis.com/books/9781003514190</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decentralized music : exploring blockchain for artistic research ent://SD_ILS/0/SD_ILS:575481 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Assis, Paulo de, editor.&#160;&#321;ukawski, Adam, 1997- editor.<br/>Preferred Shelf Number&#160;ML74.7 .D43 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003458227">https://www.taylorfrancis.com/books/9781003458227</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia security : tools, techniques, and applications ent://SD_ILS/0/SD_ILS:551348 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Mondal, Bhaskar, editor.&#160;Rajput, Shyam Singh, editor.<br/>Preferred Shelf Number&#160;QA76.575<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003459040">https://www.taylorfrancis.com/books/9781003459040</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO playbook ent://SD_ILS/0/SD_ILS:587117 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Andreu, Andres, 1968- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003477556">https://www.taylorfrancis.com/books/9781003477556</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> MASTERING CYBERSECURITY a practical guide for professionals. Volume 1. ent://SD_ILS/0/SD_ILS:579460 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Bhardwaj, Akashdeep.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003542520">https://www.taylorfrancis.com/books/9781003542520</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Crypto millionaires : blockchain: a chance for all? ent://SD_ILS/0/SD_ILS:558239 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Mach, Mateusz, author.<br/>Preferred Shelf Number&#160;HG1710.3<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032621456">https://www.taylorfrancis.com/books/9781032621456</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI and cyberbullying ent://SD_ILS/0/SD_ILS:580513 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;HV6773.15 .C92<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032666020">https://www.taylorfrancis.com/books/9781032666020</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Manuscrypt : designed for mankind - anthropocentric information security ent://SD_ILS/0/SD_ILS:579444 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Upadhyaya, Prashant A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003527220">https://www.taylorfrancis.com/books/9781003527220</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security technologies for law enforcement agencies ent://SD_ILS/0/SD_ILS:589138 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Duraklar, Kaz&#305;m author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597445">https://www.taylorfrancis.com/books/9781003597445</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing : a journey into the next frontier of information and communication security ent://SD_ILS/0/SD_ILS:589045 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Hammoudeh, Mohammad, editor.&#160;Essa, Abdullah T., editor.&#160;Sherbeeni, Amro M., editor.&#160;Firth, Clinton M., editor.&#160;Essa, Abdullah S. (Abdullah Saad) editor.<br/>Preferred Shelf Number&#160;QA76.889<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003475286">https://www.taylorfrancis.com/books/9781003475286</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain technology for cyber defense, cybersecurity, and countermeasures : techniques, solutions, and applications ent://SD_ILS/0/SD_ILS:570600 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kshetri, Naresh, editor.&#160;Pandey, Purnendu Shekhar, editor.&#160;Ahmed, Mohiuddin (Computer scientist), editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B5845 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003449515">https://www.taylorfrancis.com/books/9781003449515</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information technology security and risk management : inductive cases for information security ent://SD_ILS/0/SD_ILS:562664 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Wingreen, Stephen C., editor.&#160;Samandari, Amelia, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264415">https://www.taylorfrancis.com/books/9781003264415</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics and cyber crime investigation : recent advances and future directions ent://SD_ILS/0/SD_ILS:569385 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Abd El-Latif, Ahmed A., 1984- editor.&#160;Tawalbeh, Lo'ai, editor.&#160;Mohanty, Manoranjan (Editor), editor.&#160;Gupta, Brij, 1982- editor.&#160;Psannis, Konstantinos E., editor.<br/>Preferred Shelf Number&#160;HV8079 .C65<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003207573">https://www.taylorfrancis.com/books/9781003207573</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in emerging financial technology &amp; digital money ent://SD_ILS/0/SD_ILS:559221 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Maleh, Yassine, 1987- editor.&#160;Zhang, Justin, editor.&#160;Hansali, Abderrahim, editor.<br/>Preferred Shelf Number&#160;HG1710<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032667478">https://www.taylorfrancis.com/books/9781032667478</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ransomware : penetration testing and contingency planning ent://SD_ILS/0/SD_ILS:584139 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003431633">https://www.taylorfrancis.com/books/9781003431633</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SHORTEST HOUR an applied approach to boardroom governance of cybersecurity. ent://SD_ILS/0/SD_ILS:586100 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Parrish, Lee.<br/>Preferred Shelf Number&#160;HD2745<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003477341">https://www.taylorfrancis.com/books/9781003477341</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : risk management ent://SD_ILS/0/SD_ILS:586024 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dark world : a book on the deep Dark Web ent://SD_ILS/0/SD_ILS:586022 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ali, Atif, author.&#160;Qasim, Muhammad (Computer security expert), author.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404330">https://www.taylorfrancis.com/books/9781003404330</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBER SECURITY FOR NEXT-GENERATION COMPUTING TECHNOLOGIES ent://SD_ILS/0/SD_ILS:586025 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Khan, Inam Ullah.&#160;Ouaissa, Mariya.&#160;Ouaissa, Mariyam.&#160;Abou El Houda, Zakaria.&#160;Ijaz, Muhammad Fazal.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404361">https://www.taylorfrancis.com/books/9781003404361</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and smart cyber-physical systems ent://SD_ILS/0/SD_ILS:554165 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ghosh, Uttam, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003376712">https://www.taylorfrancis.com/books/9781003376712</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ADVANCED TECHNIQUES AND APPLICATIONS OF CYBERSECURITY AND FORENSICS ent://SD_ILS/0/SD_ILS:558996 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Kaushik, Keshav, editor.&#160;Ouaissa, Mariya, editor.&#160;Chaudhary, Aryan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003386926">https://www.taylorfrancis.com/books/9781003386926</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ATTACK-AND-DEFENSE GAMES FOR CONTROL SYSTEMS analysis and synthesis. ent://SD_ILS/0/SD_ILS:576456 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Yuan, Huanhuan.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003483250">https://www.taylorfrancis.com/books/9781003483250</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of security and privacy of AI-enabled healthcare systems and internet of medical things ent://SD_ILS/0/SD_ILS:585039 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Imoize, Agbotiname Lucky, editor.&#160;Balas, Valentina Emilia, editor.&#160;Solanki, Vijender Kumar, 1980- editor.&#160;Lee, Cheng-Chi, editor.&#160;Obaidat, Mohammad S. (Mohammad Salameh), 1952- editor.<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003370321">https://www.taylorfrancis.com/books/9781003370321</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IoT enabled-DC microgrids : architecture, algorithms, applications, and technologies ent://SD_ILS/0/SD_ILS:563865 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Ben Dhaou, Imed, 1972- editor.&#160;Spagnuolo, Giovanni, editor.&#160;Tenhunen, Hannu, editor.<br/>Preferred Shelf Number&#160;TK3111<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003454571">https://www.taylorfrancis.com/books/9781003454571</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advancements in cybercrime investigation and digital forensics ent://SD_ILS/0/SD_ILS:585037 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Harisha, A., editor.&#160;Mishra, Amarnath (Forensic scientist), editor.&#160;Singh, Chandra (Professor of engineering), editor.<br/>Preferred Shelf Number&#160;HV8079 .C65<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003369479">https://www.taylorfrancis.com/books/9781003369479</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime and cybersecurity ent://SD_ILS/0/SD_ILS:585095 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Watters, Paul A., author.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003406730">https://www.taylorfrancis.com/books/9781003406730</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> WEB 3.0 the next generation's internet and understanding the concept of the metaverse. ent://SD_ILS/0/SD_ILS:573559 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Srivastav, Prabhat Kumar.<br/>Preferred Shelf Number&#160;TK5105.875 .I57<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003461418">https://www.taylorfrancis.com/books/9781003461418</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ZERO TRUST FRAMEWORK AND PRIVILEGED ACCESS MANAGEMENT (PAM) ent://SD_ILS/0/SD_ILS:555252 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Das, Ravindra.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003470021">https://www.taylorfrancis.com/books/9781003470021</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Psybersecurity : human factors of cyber defence ent://SD_ILS/0/SD_ILS:570825 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Guidetti, Oliver, author, editor.&#160;&#256;hameda, Mahiuddina, author, editor.&#160;Speelman, Craig P., editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032664859">https://www.taylorfrancis.com/books/9781032664859</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security without obscurity. A guide to PKI operations ent://SD_ILS/0/SD_ILS:569642 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Stapleton, Jeffrey James, author.&#160;Epstein, Clay, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003425298">https://www.taylorfrancis.com/books/9781003425298</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile OS vulnerabilities : quantitative and qualitative analysis ent://SD_ILS/0/SD_ILS:570497 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Garg, Shivi, author.&#160;Baliyan, Niyati, author.<br/>Preferred Shelf Number&#160;QA76.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003354574">https://www.taylorfrancis.com/books/9781003354574</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The fusion of artificial intelligence and soft computing techniques for cybersecurity ent://SD_ILS/0/SD_ILS:587080 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Jabbar, M. A. (PhD), editor.&#160;Tiwari, Sanju, 1979- editor.&#160;Pani, Subhendu Kumar, 1980- editor.&#160;Huang, Stephen (Lecturer in computer science), editor.<br/>Preferred Shelf Number&#160;XX(587080.1)<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003428503">https://www.taylorfrancis.com/books/9781003428503</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Networking Architecture and Technologies First International Conference, ICENAT 2022, Shenzhen, China, November 15-17, 2022, Proceedings ent://SD_ILS/0/SD_ILS:520200 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Quan, Wei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-9697-9">https://doi.org/10.1007/978-981-19-9697-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings ent://SD_ILS/0/SD_ILS:520658 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Li, Fengjun. editor.&#160;Liang, Kaitai. editor.&#160;Lin, Zhiqiang. editor.&#160;Katsikas, Sokratis K. editor. (orcid)&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-25538-0">https://doi.org/10.1007/978-3-031-25538-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Communication and Intelligent Systems First International Conference, ICACIS 2022, Virtual Event, October 20-21, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520756 2026-01-07T15:53:49Z 2026-01-07T15:53:49Z Author&#160;Shaw, Rabindra Nath. editor.&#160;Paprzycki, Marcin. editor.&#160;Ghosh, Ankush. editor. (orcid)&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-25088-0">https://doi.org/10.1007/978-3-031-25088-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>